============== Page 1/1 ============== ! 4. a . SandHACKE PUTERFRO Kae lHAFNERandJohnIVI ti 4 f / r 7evirrr $22.95 Cyberpunk is a fascinating and revealing journey through the computer underground, a world of high-tech rebels and outlaws. For the young cyberpunk hackers this is a world bounded only by the power of their computers and the vastness of the computer networks they cruise—a universe of cyberspace, populated with electronic demons. Katie Hafner and John Markoff teil the stories of three hackers. Kevin Mitnick is the archetypal "dark-side" hacker, the e x "phone phreak" who wreaked havoc with computer networks everywhere and managed to penetrate the top-secret research group of one of the country's leading computer manufacturers. Pengo, a young West Berliner, acted out his outlaw fantasy by offering his hacking services and those of his friends to the Soviet government. Robert Morris achieved notoriety as the brilliant student who wrote a flawed program that brought down an important nationwide computer network, and made us aware of the existence of computer "viruses." Through their compelling psychological portraits, Hafner and Markoff take us inside the minds of these outlaw hackers, making it possible for us to understand what motivates them. They lead us on a tour through a dramatically new computer culture. At the same time, through these stories, Hafner and Markoff show us how dependent we have become on computer networks. Nearly every business, from banks to telephone companies, now relies on computer networks, as does every branch of government. But above all, Cyberpunk is an insightful adventure story set in a brash new world. K AT I E HAFNER AND JOHN MARKOFF SIMON & SCHUSTER ♦ NEWYORK♦ LONDON MEZMINI< • TORONTO • SYDNEY • TOKYO V SINGAPORE • SIMON & SCHUSTER Simon & Schuster Building Rockefeller Center 1230 Avenue of the Americas New York, New York 10020 Copyright © 1991 by Katherine Hafner and John Markoff All rights reserved including the right of reproduction in whole or in part in any form. SIMON & SCHUSTER and colophon are registered trademarks of Simon & Schuster Inc. Designed by Caroline Cunningham Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 Library of Congress Cataloging-in-Publication Data Hafner, Katie. Cyberpunk: outlaws and hackers an the computer frontier/Katie Hafner and John Markoff. p. c m . Includes bibliographical references and Index. 1. Computer security. 2 . Computer crimes. I . Markoff, John. I I . Title QA76.9.A25H34 1991 364.1'68—dc20 9 1 1 1 5 9 8 CIP ISBN 0-671-68322-5 TO O U R PA R E N T S CONTENTS • • • • • • • • INTRODUCTION PART ONE: Kev4.: T4 Neli-Sje 1-frele4. PART TWO: Pte m‚d Neje.4 EiwIzr. PART THREE: UH EPILOGUE NOTES ON SOURCES ACKNOWLEDGMENTS INDEX 9 13 139 251 342 347 353 355 fievelohtazoie% W s e t out to investigate a computer underground that is the real-life version of cyberpunk, science fiction that blends high technology with outlaw culture. In cyberpunk novels high-tech rebels live in a dystopian future, a world dominated by technology and beset by urban decay and overpopulation. It's a world defined by infinitely powerful computers and vast computer networks that create alternative universes filled with electronic demons. Interlopers travel through these computergenerated landscapes. Some of them make their living buying, selling and stealing information, the currency of a computerized future. The television character Max Headroom, who lived in a network of mass media, popping up in computers and television sets everywhere, was considered pure cyberpunk. So was the 1982 movie Blade Runner, which portrays a slick, dark and dangerous world in which technology has triumphed and life is grim. The Inspiration for this book came when we began to see a change in the way computers were being used. We found harbingers of cyberpunk, young people for whom computers and computer networks are an obsession, and who have carried their obsession beyond what computer professionals consider ethical and lawmakers consider acceptable. They were called hackers. As the public viewed them, these computer hackers 10 • 144404e,izes posed a sinister, if also somewhat vague, threat. This is our attempt to explain who they are and what drives them. This book teils three stories. Kevin Mitnick fit the public's perception of an archetypal "dark-side" computer hacker. He was thought to be able to manipulate credit ratings, tap telephones and take complete control of distant computers. He saw himself as a brilliant computer renegade, and he proved to be a formidable adversary for one of the world's leading computer makers. In the end he was trapped by his own arrogance and compulsion. The computer culture of the 1980s was as global as the youth culture of the 1960s. A young West Berliner who called himself Pengo discovered computers in his early teens. Because his parents had no understanding of the electronic world he had entered, no one knew that he was doing anything wrong when he spent hours at a time in front of a computer screen. To play out his outlaw fantasies, Pengo joined a group that sold the fruits of its wanderings through international computer networks to the Soviets. Eventually Pengo and his gang were torn apart in a series of betrayals. Kevin and Pengo represent something close to the cyberpunk idea of the computer "cowboy" who lives outside the law. Robert Tappan Morris was different. The young Cornell University graduate student became notorious when he wrote a program that brought down a nationwide computer network. The son of a leading computer security researcher, he grew up as the ultimate insider, a member of an insular and elfte community of computer scientists. Shy and thoughtful, Robert was hardly a rebel. By releasing a program that crippled several thousand computers in a matter of hours, he permanently altered the course of his life and confirmed everyone's worst fears about what hackers could do. The event marked a turning point: the private world of computer networks was suddenly of concem to the general public. More than stories about computers or technology, this book is about the social consequences of computer networks and the communities that have grown up around them. As the world's computer networks became more closely linked in the 1980s, it was suddenly possible for anyone to travel the electronic corridors that were once the preserve of a small group of researchers. All three young men were seduced by the thrill of exploring these international computer networks, but they all went too far. Each drew national attention and contributed to a growing sense of public unease about the risks that arise from society's increasing dependence an computer networks. 14404evel- • 11 In the 1960s and 1970s, to be a computer hacker was to wear a badge of honor. l t singled one out as an intellectually restless soul compelled to stay awake for forty hours at a stretch in order to refine a program until it could be refined no more. It signified a dedication to computers that was construed as fanatical by outsiders but was a matter of course to the hackers themselves. The hackers from the Massachusetts Institute of Technology in particular adhered to what has been called the Hacker Ethic, which Steven Levy described in his 1984 book Hackers as a code of conduct that championed the free sharing of information and demanded that hackers never harm the data they found. Hacking also meant anything either particularly clever or particularly wacky, with or without a computer, as long as the manipulation of a complex system was involved. Some hacks are legendary. There was the computer program that determined the minimum amount of time it took to cover the entire New York City subway system. After the program was written, a bunch of MIT hackers actually went to New York and tried it out. And there was the legendary hoax during the 1961 Rose Bowl game between Washington and Minnesota, when Cal Tech students made substitutions for the letters an the cards to be held up by the Washington Huskies fans at halftime. Instead of Washington, the cards spelled out Cal Tech. A palindromic music composition was considered a good hack (thus making Haydn, with his Palindrome Symphony, an honorary hacker). So was anything done to establish not merely a new record but a new category altogether in the Guinness Book of World Records. In the 1980s, a new generation appropriated the word "hacker" and, with help from the press, used it to define itself as password pirates and electronic burglars. W i t h that, the public's perception o f hackers changed. Hackers were no longer seen as benign explorers but malicious intruders. These hackers are significant because of what our fear of them says about our unease with new technologies. Arthur C. Clarke once said, "Any sufficiently advanced technology is indistinguishable from magic." For many in this country, hackers have become the new magicians: they have mastered the machines that control modern life. This is a time of transition, a time when young people are comfortable with a new technology that intimidates their elders. It's not surprising that parent-s, federal investigators, prosecutors and judges often panic when confronted with something they believe is too complicated to understand. The fallout from this fear is already apparent. As we were finishing the book, something of a hacker hysteria was sweeping the nation. After 12 • le-144,4eVes• a two-year combined federal and state investigation, in the spring and summer of 1990 more than thirty raids an young computer users took place across the country, followed by a second wave of searches and arrests a few months later. In an attempt to root out the high-tech tools being used by this new breed of "criminal," law-enforcement agents confiscated computers, modems, answering machines, telephones, fax machines and even stereo equipment. Federal agents have gone after computer hackers in 1990 as if they are the next scourge after Communism. Do young people who illegally enter computers really represent such a menace? We hope that from reading the following stories readers will leam that the answer isn't a simple one. All three of the young men we write about were caught up in what society views as criminal activities, yet none saw himself as a criminal. Each felt he was an explorer in a remarkable electronic world where the rules aren't clear. And each paid a price for his actions. lt is possible that once computer networks become as commonplace as our national highway system, we will learn to treat them in much the same .way. Rules of the road will emerge and people will learn to respect them for their own safety and for the common good. We hope that the stories of Kevin Mitnick, Pengo and Robert Morris illustrate not just the risks of computer networks but also their allure. PA R T O N E Kevz.s.%: T4Dite4-Sje 1144€4 Tee geizte C i a o t was partnership, if not exactly friendship, that kept the group together. Each member possessed a special strength considered essential for what needed to be done. Roscoe was the best computer programmer and a natural leader. Susan Thunder prided herself an her knowledge of military Computers and a remarkable ability to manipulate people, especially men. Steven Rhoades was especially good with telephone equipment. And aside from his sheer persistence, Kevin Mitnick had an extraordinary talent for talking his way into anything. For a while, during its early days in 1980, the group was untouchable. Susan was infatuated with Roscoe, but she never cared much for his constant companion, Kevin Mitnick. For his part, Kevin barely gave Susan the time of day. They learned to tolerate one another because of Roscoe. But for all their mutual hostility, Susan and Kevin shared a fascination with telephones and the telephone network; it was a fascination that came to dominate their lives. Susan, Kevin, Roscoe and Steven were "phone phreaks." By their own definition, phreaks were telephone hobbyists more expert at understanding the workings of the Bell System than most Bell employees. The illegality of exploring the nooks and crannies of the phone system added a sense of adventure to phreaking. But the mechanical compo15 16 ♦ C8EVUNK nents of telephone networks were rapidly being replaced by computers that switched calls electronically, opening a new and far more captivating world for the telephone underground. By 1980, the members of this high-tech Los Angeles gang weren't just phone phreaks who talked to each other on party lines and made free telephone calls. Kevin and Roscoe, in particular, were taking phone phreaking into the growing realm of computers. By the time they had leamed how to manipulate the very computers that controlled the phone system, they were calling themselves computer hackers. Kevin was the only one of the original group to go even deeper, to take an adolescent diversion to the point of obsession. Susan, Roscoe and Steve liked the control and the thrill, and they enjoyed seeing their pranks replayed for them in the newspapers. But almost a decade later it would be Kevin, the one who hid from publicity, who would come to personify the public's nightmare vision of the malevolent computer hacker. V • Born in Altona, Illinois, in 1959, Susan was still an infant when her parents, struggling with an unhappy marriage, moved to Tujunga, California, northeast of the San Fernando Valley. Even after the move to paradise, with the implicit promise of a chance to start afresh, Susan's family continued to unravel. Susan was a gawky, buck-toothed little girl. Rejected and abused, at age eight she found solace in the telephone, a place where perfect strangers seemed happy to offer a kind word or two. She made friends with operators, and began calling random numbers in the telephone book, striking up a conversation with whomever she happened to catch. Sometimes she called radio disc jockeys. After her parents divorced, Susan dropped out of the eighth grade, ran away to the streets of Hollywood and adopted the narre Susy Thunder. Susan didn't make many friends, but she did know how to feed herself. Before long, she was walking Sunset Boulevard, looking for men in cars who would pay her for sex. She cut a conspicuous figure next to some of the more diminutive women on the street. Barely out of puberty, Susan was already approaching six feet. When she wasn't walking the streets, she was living in a hazy, drugfiltered world as a hanger-on in the L.A. music scene, a rock-star groupie. Susan was a bruised child developing into a bruised adult. Quaalude was her medium of choice for spiriting her away from reality, and when Quaalude was scarce, she switched to alcohol and heroin. Her mother Ktv4.: T4 Dmii-Sje ffreide4 • 1 7 finally put her into a nine-month rehabilitation program; she was abruptly thrown out midcourse. Conflicting stories of Susan's ouster were in keeping with the blurry line between fact and myth that described her life. As Susan was to teil it, the adulation of power she developed as a groupie compelled her to single out the most powerful male stall member at the treatment center and seduce him. Another story, circulated by Susan's detractors in the phone phreaking gang, is that she was discovered in the men's bathroom on her knees, servicing another patient. Susan found an apartment in Van Nuys and retreated once again to the telephone, taking comfort in knowing that with the telephone she could gain access to a world of her own conjuring and shut it out whenever she chose. She began calling the telephone conference lines that were springing up all over Los Angeles in the late 1970s. By dialing a conference-line number, Susan could connect herself to what sounded like cross talk, except that she was heard by the others and could join in the conversation. Some conference-line callers were teenagers who dialed up after school; others were housewives who stayed on all day, tuning in and out between household chores but never actually hanging up the phone. By nightfall, many of the conference lines turned into telephonic sex parlors, the talk switching from undirected chitchat to explicit propositions. One day in early 1980 Susan discovered HOBO-UFO, one of the first "legitimate" conference lines in Los Angeles in that its owners used their own conferencing equipment instead of piggybacking on the phone company's facilities. Drawing hundreds of people every day, HOBO-UFO was run from the Hollywood apartment of a young college student who called himself Roscoe. A friend of Roscoe's named Barney financed the setup, putting up the money for the multiple phone lines and other equipment while Roscoe provided the technical wherewithal. Susan decided she couldn't rest until she had met Roscoe, the power behind it all. But to achieve that goal, Susan knew she would have to abandon her disembodied telephone persona. She liked describing herself to men over the telephone. She knew from experience that all she had to do was mention that she was a six-foot-two blond and she wouldn't have to wait long for a knock at the door. She was right. No sooner did she deliver the description than Roscoe came calling. The woman who greeted Roscoe was exactly as she had described herself. Susan had dressed up and made her face up carefully for the big date. But she could not conceal certain physical oddities. Her long face displayed a set of teeth so protrusive as to produce a slight speech imped- 18 • CYKEZPUNIC iment. And there was something incongruous about her large frame: her upper torso was narrow and delicate, but it descended to a disproportionate outcropping of hips and heavy thighs. Roscoe, for his part, was thin and pale. His brown-framed glasses met Susan's chin. But if either Susan or Roscoe was disappointed in the other's looks, neither showed it. They went to dinner, and when Roscoe asked Susan about her line of work she told him she did psychological counseling and quickly changed the subject. A business student at the University of Southern California, Roscoe was one of the best-known phone phreaks around Los Angeles. When a reporter from a local newspaper began researching a story about conference lines, he told a few HOBO-UFO regulars that he wanted to meet Roscoe. The next day a caller greeted him by reeling off the billing name an his unlisted phone number, his home address, the year and make of his car, and his driver's license number. Then the caller announced himself: "This is Roscoe." When Susan and Roscoe met in 1980, phone phreaking was by no means a new phenomenon. Phone phreaks had been cheating the American Telephone and Telegraph Company for years. They started out with "blue boxes" as their primary tool. Named for the color of the original device, blue boxes were rectangular gadgets that came in a variety of sizes. Sometimes they were built by electronic hobbyists, at other times by underground entrepreneurs. Occasionally they were even used by the Mafia. One of Silicon Valley's legendary companies even has its roots in blue box manufacturing. Stephen Wozniak and Steven Jobs, who co-founded Apple Computer in 1976, got their start in the consumer electronics business several years earlier, peddling blue boxes in college dormitories. A blue box was universally useful because it could exploit a quirk in the design of the nation's long-distance telephone system. The device emitted a high-pitched squeal, the 2600-hertz tone that, in the heyday of the blue boxers, controlled the AT&T long-distance switching system. When phone company equipment detected the tone, i t readied itself for a new call. A series of special tones from the box allowed the blue box user to dial anywhere in the world. Using these clever devices, phone phreaks navigated through the Bell System from the palms of their hands. Tales abounded of blue boxers who routed calls to nearby pay phones through the long-distance lines of as many as fifteen countries, just for the satisfaction of hearing the Jong series of clicks and kerchunks made by numerous phone companies releasing their circuits. Ke44.: TA Nek-S:k How-4bl • 1 9 Blue boxes were soon joined by succeeding generations of boxes in all colors, each serving a separate function, but all designed to skirt the computerized record-keeping and switching equipment that the phone company uses for billing calls. The phone phreaking movement reached its zenith in the early 1970s. One folk hero among phreaks was John Draper, whose alias, "Captain Crunch," derived from a happy coincidence: he discovered that the toy whistle buried in the Cap'n Crunch cereal box matched the phone company's 2600-hertz tone perfectly. Tending to be as socially maladroit as they were technically proficient, phone phreaks were a bizarre group, driven by a compulsive need to Team all they could about the object of their obsession. One famous blind phreak named Joe Engressia discovered the telephone as a small child; at age eight he could whistle in perfect pitch, easily imitating the 2600-hertz AT&T signal. Joe's lips were his blue box. After graduating from college, in tireless pursuit of knowledge about the phone company, Joe crisscrossed the country by bus, visiting local phone company offices for guided tours. As he was escorted around, he would touch the equipment and learn new aspects of the phone system. Joe's ambition was not to steal revenue from the telephone company but to get a job there. But he had made a name for himself as a phreak, and despite his vast store of knowledge, the phone company could not be moved to hire him. Eventually, Mountain Bell in Denver did give him a job as a troubleshooter in its network service center and his whistling stopped. All that he had wanted was to be part of the system. The Beil System needed people like Joe on its side. By the mid-1970s, AT&T estimated it was losing $30 million a year to telephone fraud. A good percentage of the illegal calls, it tumed out, were being placed by professional white-collar criminals, and even by small businesses trying to cut their long-distance phone bills. But unable to redesign its entire signaling scheme ovemight, AT & T decided to ferret out the bandits. Using monitoring equipment in various fraud "hot spots" throughout the telephone network, AT & T spent years scanning tens of millions of toll calls. By the early 1980s automated scanning had become routine and Bell Laboratories, AT&T's research arm, had devised computer programs that could detect and locate blue box calls. Relying on increasingly sophisticated scanning equipment, detection programs embedded in its electronic switches and a growing network of informants, AT&T caught hundreds of blue boxers. In 1971, phone phreaking ventured briefly into the sphere of politics. 20 Ä CCERPUNK The activist Abbie Hoffman, joined by a phone phreak who called himself Al Bell, started a newsletter called Youth International Party Line—or YIPL for short. With its office at the Yippie headquarters on Bleecker Street in New York City's Greenwich Village, YIPL was meant to be the technical offshoot of the Yippies. Hoffman's theory was that communications were the nerve center of any revolution; liberating communications would be the most important phase of a mass revolt. But Al Bell's outlook was at odds with Hoffman's; Al saw no place for politics in what was essentially a technical journal. In 1973, A l abandoned YIPL and Hoffman and moved uptown to set up shop as TAP, the Technological Assistance Program. Much of the information contained in TAP was culled from AT&T's various in-house technical journals. l t was information that AT & T would rather have kept to itself. And that was the point. Whereas the original phreaks like Captain Crunch got their kicks making free phone calls, TAP's Leaders, while steering clear of a hard political line, believed that the newsletter's mission was to disseminate as much information about Ma Bell as it could. By 1975, more than thirteen hundred people around the world subscribed to the four-page leaflet. For the most part, they were loners by their own admission, steeped in private technical worlds. TAP was their ultimate handbook. Written in relentlessly technical language, TAP contained tips on such topics as lock picking, the manipulation of vending machines, do-it-yourself pay phone slugs and free electricity. TAP routinely published obscure telephone numbers; those of the White House and Buckingham Palace were especially popular. And in 1979, during the Kostage crisis in Iran, TAP published the phone number of the American embassy in Tehran. Every Friday evening, a dozen or so TAP people held a meeting at a Manhattan restaurant, many still cloaked in the Lies and jackets that betrayed daytime lives spent toiling away at white-collar jobs. After work, and inside the pages of TAP, they adopted such names as The Professor, The Wizard and Dr. Atomic. In the late 1970s, a phone phreak who called himself Tom Edison took over TAP, bringing in another telephone network enthusiast, Cheshire Catalyst, a seif-styled "techie-loner-weirdo science fiction fanatic," as one of TAP's primary contributors. Tall and dark with the concave, hollow-cheeked look of someone rarely exposed to sunlight, Cheshire had been phreaking since the sixties. He discovered the telephone at age twelve, and learned to clip the speaker leads of the family Keezl-: 74 D. -5..i 1-ke4e4 • 2 1 stereo onto a telephone plug so that he could put the handset to his ear and listen to the radio while doing his homework. If his mother entered the room, he just had to hang up the receiver. By the time he was nineteen, Cheshire had become a telex mauen, having programmed his home computer to simulate a telex machine. Before long he was sending telex pen-pal messages around the world. In his twenties, already a veteran TAP reader, Cheshire moved to Manhattan, got a job at a bank in computer support and joined the TAP inner circle. TAP wasn't exactly a movement. It was an attitude, perhaps best described as playful contempt for the Bell System. One elderly woman from the Midwest sent her subscription check along with a Letter to Tom Edison saying that although she would never do any of the things described in TAP, she wanted to support those people who were getting back at the phone company. As one responsible for keeping TAP unassailable, Cheshire didn't sully his hands with blue boxes, and he paid his telephone bills scrupulously. Out of corporate garb, he and his friends stayed busy irking Ma Bell through their constant wanderings inside the phone system. As Cheshire and his friends would explain to outsiders, they loved the telephone network—it was the bureaucracy behind it they hated. People like Cheshire iived not so much to defraud corporate behemothsas to home in an their most vulnerable flaws and take full playful advantage of them. Beating the system was a way of life. Flying from New York to St. Louis, for instance, was not a simple matter of seeking an inexpensive fare; it meant hours of research to find the cheapest route, even if it meant taking advantage of a special promotional flight from New York to Los Angeles and disembarking when the flight made astop in St. Louis. And getting the best of AT&T, the most blindly bureaucratic monopoly of all, embodied a strike against everything worth detesting in a large corporation. As private computer networks proliferated in the Tate 1970s, there came a generation of increasingly computer literate young phreaks like Roscoe and Kevin Mitnick. If the global telephone network could hold aphone phreak entranced, imagine the fascination presented by the proliferating networks that began to link the computers of the largest corporations. Using a modern, a device that converts a computer's digital data into audible tones that can be transmitted over phone lines, any clever interloper could hook into a computer network. The first requirement was a valid user identification—the narre of an authorized user of 22 • CYKEZPUNK the network. The next step was to produce a corresponding password. And in the early days, anyone could root out one valid password or another. The rising computer consciousness of the phone phreaks was inevitable as technology advanced. Electromechanical telephone switches were rapidly giving way to computerized equivalents all over the world, suddenly transforming the ground rules for riding the telephone networks. The arrival of computerized telephone switches dramatically increased the risks and the sense of danger, as well as the potential payoff. The phone company's automatic surveillance powers grew by orders of magnitude, served by silent digital sentinels that sensed the telltale signals of the electronic phone phreaks' microelectronic armory. As the peril grew, so did the sense of adventure. Whenever an outsider gained control of a central office switch or its associated billing and maintenance computers, by evading often inadequate security barriers, the control was absolute. Thus the new generation of phone phreaks could go far beyond placing free telephone calls. Anything was possible: eavesdropping, altering telephone Uh, turning off an unsuspecting victim's phone service, or even changing the dass of service. In one legendary hack a phone phreak had the computer reclassify someone's home phone as a pay phone. When the victim picked up the telephone, he was startled to hear a computerized voice asking him to deposit ten cents. For phone phreaks, the temptation to step up from the simpler technology of the telephone to the more complicated and powerful technology of computers was irresistible. In 1983, just as TAP was coming to symbolize the unification of computers and telephones, the journal came to an untimely end. Tom Edison's two-story condominium in suburban New Jersey went up in flames, the object of simultaneous burglary and arson. The burglary was professional: Tom's computer and disks—all the tools for publishing TAP—were taken. But the arson job was downright amateurish. Gasoline was poured haphazardly and the arsonist failed to open the windows to feed the fire. For years, Tom and Cheshire speculated that the phone company had engineered the fire, but proving it was another matter. Tom had a real-world name, a respectable job and a reputation to maintain. Cheshire rented a truck and hauled what remained of the operation —including hundreds of back issues of TAP, all of which escaped unsinged—over to his place in Manhattan. But in the end, TAP didn't survive the blow. A few months after the fire, Cheshire printed its final issue. Ke4,44:T4 D-Sje. ElAcke4 • 2 3 Meanwhile, the Southern California phreaks had been holding their equivalent of TAP meetings. Once a month or so, a group of phreaks, including Roscoe and occasionally Kevin, would get together informally at a Shakey's Pizza Parlor in Hollywood to talk and exchange information. But the L.A. phreaks weren't a particularly sociable bunch to begin with, and their meetings were far less organized than those on the East Coast, with fewer political overtones. Though an avid TAP reader, Roscoe shunned blue boxes and most of the other electronic crutches of phone phreaking. They were just too easy to trace, he thought. Roscoe preferred to exploit flukes, or holes, that he and his friends found in the newly computerized telephone System. Modesty was not one of Roscoe's virtues. He claimed that he had acquired as much knowledge about the telephone system and the computers that controlled it as anyone else in the country. He kept notebooks filled with the numbers of private lines to corporations like Exxon and Ralston Purina, along with access codes to scores of computers operated by everything from the California Department of Motor Vehicles to major airlines. He boasted that he could order prepaid airline tickets, search car registrations and even get access to the Department of Motor of Vehicles' computer system to enter or delete police warrants. Whereas most pure phreaks viewed their art as a clever means of bypassing the phone company, Roscoe saw it as a potential weapon. With access to phone company computers, he could change numbers, disconnect phones or send someone a bill for thousands of dollars. Most of the numbers in his extensive log came from hours of patient exploration on acomputer terminal at school. And many of the special tricks he learned from Kevin Mitnick. Roscoe met Kevin in 1978, over the amateur radio network. When Roscoe was tuned in one day, he was startled to hear a nasty fight in progress between two hams. The control operator of the machine was accusing a fellow ham named Kevin Mitnick of making illegal longdistance telephone calls over the radio using stolen MCI codes. At the time, Roscoe knew nothing of telephones or computers. But given the vituperative tone of the angry ham, either Kevin Mitnick had done something truly terrible or he was being unjustly accused. Suspecting the latter, Roscoe switched on his tape recorder and recorded the invectives as they flew through the air. Then he got on the radio to teil Kevin that he had a tape recording of the accusations if Kevin wanted it. Sensing a potential ally, Kevin gave Roscoe a telephone number to call so that they could speak privately. As Roscoe was to find out later, Kevin had 24 • MEZPUNK given him the number of a telephone company loop line, a number hidden in the electronic crevices of the telephone network and reserved for maintenance workers in the field who are testing circuits. Roscoe was immediately taken with this teenager, a good three years his junior, who evidently knew so much about telephones. He drove out to the San Femando Valley to meet Kevin, gave him the tape and cemented a new friendship. Sometimes Kevin called Roscoe directly at his home in Hollywood, a toll call from the San Femando Valley, and they talked for hours. When Roscoe asked him how a high schooler could afford it, Kevin just laughecl. ♦♦ When Susan met Roscoe in 1980, he had been phreaking for about a year. She feil in love with him almost at once. He was the first man she had met who displayed some intelligence and whose life didn't revolve around drugs and the drug scene. She found Roscoe's interest in computers charming, even fascinating. Roscoe was taking phone phreaking to a new level, combining his knowledge of the phone system with his growing knowledge of computers. Susan saw this as a brilliant next step for someone with a phone obsession. What was more, they were both talented at employing their voices to desired ends. They shared a faith in how much could be accomplished with a simple phone call. As a teenager, Susan had employed the technique she called psychological subversion, otherwise known as social engineering, to talk her way into backstage passes at dozens of concerts. Posing as a secretary in the office of the head of the concert production company, she could get her name added to any guest list. Susan prided herself on those skills. If she and Roscoe had anything in common, both lacked the mechanism that compels most people to teil the truth. Roscoe and Susan started to date each other. Roscoe was attending the University of Southern California and his schedule there, he told her, let him see her only on certain nights. But that was fine with Susan, asshe was holding down two jobs. One was as a switchboard operator at a telephone answering service. The more lucrative job was something she knew how to make a lot of money at: she worked for a small bordello in Van Nuys. Her counselor story didn't last long. Roscoe made it his business to learn all he could about people, and Susan was no exception. When the truth emerged about Susan's profession, Roscoe found it more amusing than scandalous. Ketbzw T4 D444-Sje. Hi.duzi. • 2 5 In her head, Susan was living out a romance of her own quirky invention. I n fact, the relationship between Susan and Roscoe was oddly businesslike, hardly distracted by passion. Often their dates consisted of an excursion to the USC computer center, where Roscoe would set Susan up with a computer terminal and keep her occupied with computer games while he "worked." Susan soon realized that he was using accounts at the university's computer center to log on to different computers around the country. Susan lost interest in the games and turned her attention to what Roscoe was doing. -Before long, she became his proteg6e. Susan developed her own talent for finessing her way into forbidden computer systems. She began to specialize in military computer systems. The information that resides in the nation's military computers isn't just any data. It represents the nation's premier power base—the Pentagon. And in digging for military data, as Susan saw it, she, a high school dropout and teevage runaway, was just a silo away from the sort of control that truly mattered. Still, she was a beginner, far short of mastering the Defense Department's complex of computers and communications networks. What she couldn't supply in technical knowledge she compensated for with other skills. One of her methods was to go out to a military base and bang around in the officers' club, or, if she was asked to leave, in bars near the base. She would get friendly with a highranking officer, then go to bed with him. While he was sleeping, she would search through his personal effects for computer passwords and access codes. Roscoe could never have had such access, and Susan derived some measure of satisfaction from knowing this fact. She would report each new success to Roscoe, who praised her profusely while making careful note of the specifics. From her job at the bordello, Susan was taking home about $1,200 a week, and all of it came in handy. She invested every spare cent in computer and phone equipment. She installed a phone line for data transmission, and an "opinion line" she named "instant relay." Whoever dialed the "instant relay" number got Susan's commentary on topics of her own choosing. A t the same time, she taught herself to use RSTS, Resource Sharing Time Sharing, the standard operating system for Digital Equipment Corporation's PDP-11 minicomputers. (Operating systems are programs that control a computer's tasks the way an orchestra conductor controls musicians. Operating systems start and stop programs and find and store files.) For computer intruders the fascination with a 26 • CYgEZPLINK computer's operating system is obvious: it is not only the master controller but also the computer's gatekeeper, regulating access and limiting the capabilities of users. Roscoe often employed Susan's Van Nuys apartment as a base of operations. He was usually accompanied by his younger cohort, the plump and bespectacled Kevin Mitnick. Kevin was the kind of kid who would be picked last for a school team. His oversize plaid shirts were seldom tucked in, and his pear-shaped body was so irregular that any blue jeans would be an imperfect fit. His seventeen years hadn't been easy. When Kevin was three, his parents separated. His mother, Shelly, got a job as a waitress at a local delicatessen and embarked on a series of new relationships. Every time Kevin started to get close to a new father, the man disappeared. Kevin's real father was seldom in touch; he remarried and had another son, athletic and good-looking. During Kevin's junior high school years, just as he was getting settled into a new school, the family moved. I t wasn't surprising that Kevin looked to the telephone for solace. Susan and Kevin didn't get along from the start. Kevin had no use for Susan, and Susan saw him as a hulking menace with none of Roscoe's charm. What was more, he seemed to have a malicious streak that she didn't see in Roscoe. This curiously oafish friend of Roscoe's always seemed to be busy carrying out revenge of one sort or another, cutting off someone's phone service or harassing people over the amateur radio. At the same time, Kevin was a master of the soothing voice who aimed at inspiring trust, then cooperation. Kevin used his silken entreaties to win over even the most skeptical keepers of passwords. And he seemed to know even more about the phone system than Roscoe. Kevin's most striking talent was his photographic memory. Presented with a long list of computer passwords for a minute or two, an hour later Kevin could recite the list verbatim. Roscoe and Kevin prided themselves on their social engineering skills; they assumed respect would come if they sounded knowledgeable and authoritative, even in subject areas they knew nothing about. Roscoe or Kevin would call the telecommunications department of a company and pose as an angry superior, demanding brusquely to know why a number for dialing out wasn't working properly. Sufficiently cowed, the recipient of the call would be more than glad to explain how to use the number in question. While Kevin's approach was more improvisational, Roscoe made something of a science out of his talent for talking to people. He kept a Ke464.:T2 Die4,-Sje H • 27 separate notebook in which he listed the names and workplaces of various telephone operators and their supervisors. He noted whether they were new or experienced, well informed or ignorant, friendly and cooperative or slow and unhelpful. He kept an exhaustive list of personal information obtained from hours of chatting: their hobbies, their children's names, their ages and favorite sports and where they had just vacationed. Roscoe and Kevin didn't phreak or break into computers for money. Secret information, anything at all that was hidden, was what they prized most highly. They seldom if ever tried to seil the information they obtained. Yet some of what they had was eminently marketable. Roscoe's notebooks, filled with computer logins and passwords, would have fetched a tidy sum from any industrial spy. But phreaking to them was a form of high art that money would only cheapen. Roscoe especially thrived on the sense of power he derived from his phreaking. Presenting a stranger with a litany of personal facts and watching him or her come unhinged gave Roscoe his greatest pleasure. Another frequent visitor to Susan's apartment was Steve Rhoades, a puckish fifteen-year-old from Pasadena with straight brown hair that cascaded down to the middle of his back. His timid intelligence and easy manner had a way of catching people off guard. He was an expert phreak who had earned a grudging respect from the Pacific Bell security f o r c e — the very people he loved to taunt. So adept was he at manipulating his telephone service from the terminal box on the telephone pole outside his house that the phone company removed the footholds. Like Kevin and Roscoe, Steve was an amateur radio buff. Two-way radios, in fact, often figured in their phreaking. When foraging through phone company trash for manuals, discarded papers containing passwords and whatever else might help them in their phreaking endeavors—a method they called trashing—they communicated by two-way radio. Whatever the personality differences in the L.A. gang, their various talents brought results. Working together, they were able to get the numbers of lost or stolen telephone credit cards using highly imaginative methods: for instance, they would divert cardholders' toll-free calls to report lost cards to a pay phone of their choosing and answer with, "Pacific Bell, may I help you?" Their vast store of knowledge came from months of diligent research: they obtained manuals however they could get them and joined as many company tours as they could, mostly to familiarize themselves with building layouts. The group routinely got credit information from the computer at TRW's credit bureau. Some- 28 • MRPUNK times it was a matter of talking an unsuspecting employee out of a password; sometimes a job required "physical research," such as a latenight excavation of TRW's Dumpsters. By brainstorming together, the group would be inspired to ever more audacious stunts. On one occasion, Steve Rhoades figured out a way to override directory assistance for Providence, Rhode Island, so that when people dialed for information, they got one of the gang instead. "Is that person white or black, sir?" was a favorite line. "You see, we have separate directories." Or: "Yes, that number is eight-seven-five-zero and a half. Do you know how to dial the half, ma'am?" A few months into her infatuation with Roscoe, Susan noticed unhappily that he was spending less time with her. Then someone let her in on the reason: she had been deceived. Roscoe, it turned out, was all but engaged to someone else, a law student as prim and straight in her ways as Susan was errant in hers. The other girlfriend apparently provided Roscoe's tie to respectable society. Susan despaired. He had been displaying affection for Susan when what he really wanted to do was exploit her eagerness to hack. When she confronted him, he just laughed. So she tried a veiled threat: she told him it was quite likely that FBI agents would come knocking on her door, and she would have to talk to them. Roscoe feigried puzzlement. Susan refused to believe that he wasn't at least torn between the two women. Seizing upon that possibility, she suggested that they go to Las Vegas and get married at once. He just smiled and said she had been misled. What Roscoe had failed to take into account was that the person he had just crushed was a woman who had been bruised once too often. By rejecting her so heartlessly, Roscoe was inviting trouble. He had yet to experience Susan's dark side. • ♦ • Eddie Rivera, a free-lance writer in Los Angeles, wasn't sure what he had stumbled into. As he was getting out of his car one day on Sunset Boulevard in late April of 1980, he saw a flyer that simply read: "UFO CONFERENCECALL NOW." His curiosity stirred, the young reporter dialed HOBO-UFO and heard three people chatting idly, engaged in what seemed to be an interminable telephone conversation. A television murmured in the background. After listening to five more minutes of prattle, Eddie sensed the possibility of a story far different from what he usually produced as a rock-and-roll critic. Like Susan Thunder before him, Eddie focused on meeting the person running the conference. "Excuse me," he Kevz..: T4 D444-Szief4elie4 • 2 9 interrupted. y o u guys on this line know who runs it, have him call me." The line went silent; he feit as if he had switched on the kitchen light late at night and seen dozens of cockroaches running for cover. But it worked. Within a day of putting the word out that he wanted to meet Roscoe, Eddie received his first call. Eddie got a story assignment from the L. A. Weekly, an alternative newspaper, and went to work. Their first meeting took place at an electronics store on Santa Monica Boulevard owned by Barney, Roscoe's pudgy, disheveled benefactor. When not in school or overseeing the HOBO-UFO line from his home, Roscoe was often at Barney's place. With not a customer in sight, the store was littered with old televisions in various stages of disrepair. For his part, Barney derived no small amount of pleasure from the venture he was financing; he used the conference line to meet adolescent girls. Eddie hadn't known quite what to expect. Roscoe's appearance was surprisingly neat, but there was something amiss: his pale blue polyester pants with a slight flare at the bottom, and his dark polyester print shirt with an oversize collar, were already at least five years out of date. The twenty-year-old Roscoe seemed more to resemble an electrical engineering student than a telephone outlaw. For the first interview, Barney put a "closed" sign in the Shop window and, in what would become a routine preamble to the interviews, the three went out for doughnuts. Roscoe lived on junk food, as did, i t seemed, all his fellow phreaks. A patina of doughnut glaze frequently rested on Roscoe's lips. In the afternoons, Roscoe moved on to Doritos and cheeseburgers. And Barney's store was strewn with Winchell's Donuts coffee cups whose contents suggested that Barney might be using them as petri dishes. Roscoe made it clear from the start that he would be in complete control of the nature and quantity of information he imparted to Eddie. He enjoyed telling Eddie just how muck he knew about telephones—far beyond the Body of information known to the average telephone company employee. There was something oddly mechanized about Roscoe's language. Eddie was struck by the young man's formal, almost bureaucratic way of speaking. In response to a question, Roscoe usually answered as indirectly as possible. He had a curious affection for the passive construction. Roscoe didn't simply make phone calls. Instead, telephone conversations were initiated. Perhaps, Eddie thought, Roscoe's tangled locution resulted from reading too many of those phone company manuals he kept talking about. In any case, his manner of speech distanced him from 30 • CCERPUNK whatever he was talking about. Perhaps it made him feel more important. Roscoe told Eddie that he had a friend at the phone company who could get him into the switching room that housed the powerful computer controlling all the telephones in Hollywood. During one recent late-night visit there, Roscoe told Eddie, he had walked over to a wall that was blanketed with telephone company switching equipment and watched as his friend flicked a switch. A t the sound of a female voice, the friend announced proudly, "That's Farrah Fawcett." Bored telephone company employees, Roscoe's friend claimed, monitored people's calls all the time. Roscoe told the story in such precise detail that Eddie had no doubt about its truth. In the early reporting stages of Eddie's article, Roscoe was highly secretive about his whereabouts, guarding his daily comings and goings like a fugitive. If Eddie wanted to speak with him, he would have to wait for him to call. After a few weeks, Roscoe gave him a number where he could leave a message. lt was a month before Roscoe invited the reporter to his home, one of ten units in a plain two-story white stucco building located in a shabby neighborhood an the southern edge of Hollywood that was cluttered with similar apartment buildings. Roscoe lived with his mother in a ground-floor two-bedroom apartment. Adult bookstores dominated the neighborhood. There seemed to be little in Roscoe's life besides school and telephones. Eddie heard that Roscoe had a girlfriend, but he never saw any sign of her. Roscoe had once introduced Eddie to someone named Susan, a bizarre and cranky young woman, eccentrically tall and with unusually wide hips, but she and Roscoe appeared to be just friends. His world was the telephone, and from his small bedroom in the back he operated his HOBO-UFO conference. His phone rang constantly as people called the line. Roscoe continuously monitored the conference through a speakerphone, which created a constant low level of conversation in the room, and he could pick up his telephone any time and interrupt. Another line attached to an answering machine rang frequently as well. Many of those calls came from giggling teenage girls to whom Roscoe had given his private number. There was something about the way Roscoe reacted to telephone tones that made Eddie suspect he had a musical ear. He could recite a phone number just by hearing it dialed. Spying an upright piano and a large stereo in the modest quarters, Eddie decided he was right. Scholastic awards from Belmont High School lined Roscoe's bedroom wall; now Ktvz4.: T4 Dmiz-S$&H444(4. • 3 1 he was attending USC an a scholarship. And from what Eddie could see of Roscoe's interaction with his mother, an immigrant from Argentina who appeared to speak no English, Roscoe was a model son. Eddie was taken aback to hear Roscoe's perfect Spanish, spoken with the unselfconscious ease of a native. Roscoe's complexion was so pale and his English so flatly American that Eddie would have put his roots far north of Argentina, possibly in Iowa. If Roscoe had a side that was less restrained and formal, he displayed it to Eddie just once. On a drive through Hollywood, down a section of Western Avenue elevated above the freeway, Eddie and Roscoe were stopped at a red light a few doors away from a storefront church, where asmall congregation of Hispanics lingered outside. "Slow down!" Roscoe blurted out suddenly from the passenger's seat. "I'm going to freak these people out!" He rolled down his window and leaned his torso out the window. "Ay Dios Info!" he screamed in perfect Spanish, in the evangelical wail of a recent convert. As they accelerated away from the horrified worshipers, Roscoe was beside himself with laughter. "That gets 'em every time!" he cried. For the most part, the people who called Roscoe's conference lived for their telephonic encounters. Many were blind, Roscoe told'Eddie, or otherwise handicapped. Others were housewives or single mothers. The majority were overweight. Their names—Rick the Trip, Regina Watts Towers, Dan Dual-Phase, Mike Montage—suggested to Eddie a group of shy folk making sad attempts to add mystery and intrigue to their lives. Eddie's suspicions were confirmed when, several weeks into his reporting, he attended a phreak party at Dan Dual-Phase's house. For many members of the group, it couldn't be a simple drop-in affair. So few of the conference line callers could drive that the transportation logistics alone had lent an unusual air to the party. A t the event itself, the conference line callers sat in scattered clutches of embarrassed silence, too shy to speak to one another in person. As part of the education process, Roscoe presented Eddie with literature. He gave the reporter several back issues of TAP, referring to it as if its circulation matched that of Newsweek. After a mystifying perusal of TAP's pages, with its proclamations that no code can be completely secure, Eddie could only conclude that it carried the voice of true outlaws. Roscoe also showed him a legendary Esquire magazine story about phone phreaks. One of the featured phone phreaks in the story was Captain Crunch. Roscoe angrily denounced Crunch as an idiot whose blue box was a crutch. Phone phreaks should be like Houdinis, able to 32 Ä enEeUNK cruise the telephone network as if by magic, without the visible aid of tools. Roscoe did have one hardware crutch—a Touch-Tone dialer, a square, gray plastic box small enough to fit in one's palm. On the front was a dialing pad with ten numbers; batteries were taped to the back. The dialer was elegantly simple yet indispensable. Its function was to send Touch-Tones into the mouthpiece of a rotary-dial phone. These were precisely the tones that he needed to get access to corporate phone networks for his free telephone calls. Once he reached a company's private telephone system, a friendly digitized voice asked for a code. After receiving a correct code punched into the dialer, the phone system stood open for dialing anywhere at all. One day during Eddie's reporting assignment, Roscoe had with him a slightly younger friend named Kevin. Eddie had already heard about Kevin from Roscoe. I f Eddie found Roscoe's knowledge of telephones impressive, Roscoe had told him in a reverential tone, he should meet Kevin. Kevin lived about forty-five minutes away from Roscoe in the San Fernando Valley, and until Kevin got his driver's license, Roscoe regularly retrieved him and then took him home. Kevin was overweight and exceedingly shy. Roscoe, in fact, was downright garrulous compared with his laconic friend, who assiduously avoided eye contact. Where Eddie had seen glimpses of normalcy in Roscoe, in Kevin he saw nothing but a life steeped in telephones and computers. When he joined Roscoe and Kevin for an afternoon of phreaking, Eddie noticed that Roscoe frequently deferred to Kevin, whose encyclopedic knowledge of the telephone company's computerized control switches was well beyond his own. And where Roscoe was clearly taken with the idea of a reporter trailing after him for weeks on end, Kevin was altogether uninterested in Eddie. In fact, Roscoe too seemed temporarily to lose interest in the reporter when Kevin was around, so deep was his concentration on the business of phreaking with Kevin. Eddie was struck by the patience and perseverance the two youths displayed when seated before a computer screen. Eddie had seen Roscoe spend an hour at a time simply scanning for dialing codes, but the display of endurance when Roscoe and Kevin joined forces was in another league. For five hours on one occasion, they sat in front of a computer terminal that was connected to a phone company computer, watching a series of numbers scroll by. Roscoe and Kevin grew increasingly excited over the hieroglyphics on the screen, but their excitement passed right over Eddie. If the reporter asked them to explain what they were seeing, Kev+1•: T4 Divi4-Sje fisdzel • 3 3 he received a sidelong glance of amused condescension. I f these two phreaks were breaking the law, Eddie couldn't teil. Before Jong he stopped trying to understand what they were doing and found himself struggling to stay awake. Eddie had an inkling that Kevin might be even more important than Roscoe for his story. Not only did Kevin seem to know more than Roscoe about telephones, but Eddie got the impression that Kevin had taught Roscoe much of what he knew. Eddie figured he should probably take the kid out for a cheeseburger, but he decided he wanted nothing to do with him. As he feit himself pulled further into this strange world, he realized that the phreaks were beginning to make him nervous. In reality, Roscoe's life wasn't much richer than the lives of the ionely souls who hung on his conference line. Yet Roscoe regarded the others with a mixture of delight and disdain: delight at their obvious respect for him, and disdain for the emptiness in their lives. But they just depressed Eddie. Between the desperate conference-line callers and the sinkhole of technical language, clouded further by Roscoe's impossibly stilted speech, Eddie was beginning to regret that he had tackled such a difficult story. He began to yearn for an easy, more familiar assignment, perhaps abackstage interview with Joey and the Pizzas. At the least, his stint as an honorary member of the gang had come to an end. l t was time to write his story. Eddie's cover story in the L.A. Weekly in the summer of 1980 left a lasting impression on those who saw it. Mostly it was a profile of Roscoe, aphone phreak who could do anything with a telephone. Shortly after the story appeared, Eddie was at a party and overheard a conversation about it. When he mentioned that he had written it, people said they wanted to meet this Roscoe and learn a few of his tricks. Meanwhile, Susan was obsessed by her desire to get something on Roscoe, something she could hold over him and something other people would believe. lt wouldn't be difficult, she figured, since his forays often led him into dubious territory. And she wouldn't mind getting Kevin as well. Kevin and Roscoe had a Jong-standing agreement to share information with each other, usually to the exclusion of Susan. No, she wouldn't mind one bit if Kevin got pulled into the undertow. The first opportunity for revenge came with the U.S. Leasing breakin. With a little programming flourish, Roscoe had given himself system privileges on a computer at U.S. Leasing, a San Francisco company with 34 • enEgPUNK subsidiaries specializing in leasing electronic equipment, railcars and computers. In most large multiuser computers there is a hierarchy of privilege meted out to users. The system manager has the highest level of privilege, acting as de facto God in the computer system, while ordinary users have their capabilities more stringently curtailed. Such a pecking order works only if the lesser users cannot find ways to masquerade as the system manager. Because its network address circulated widely throughout the phreak community in 1980, U.S. Leasing had one of the most popular computers for phreaks to play on. Both Roscoe and Susan, in fact, enjoyed posting the computer's network address on electronic bulletin boards, offering guided tours of the system to phreaking neophytes. U.S. Leasing used nothing but Digital Equipment PDP-11 computers. All the computers ran RSTS, a notoriously insecure operating system. RSTS had been designed in the 1970s as the ultimate in user-friendliness. Ask the system for a password and it would assign you one automatically. Ask for asystem status report and you were provided with the narre of every user on the system. More often than not, people chose their names as their passwords. To make things easier for its customers, Digital even supplied sample passwords, such as field and test for field technicians. And the field technicians often had highly privileged accounts. Getting to computers such as the one at U.S. Leasing was deliciously easy. The first step was to dial into the Telenet network. Telenet was the first commercial network designed solely to link together computers. Computer networks differ from telephone networks in that instead of each conversation getting its own circuit, many computer-to-computer conversations on a single network can share a single circuit. Because the information being transmitted is digitized, strings of ones and zeros, it can be broken up into small packets. Each packet contains an address that tells the network where it's going. This is known as packet-switching. Telenet was structured in such a way that you could choose to communicate with any computer within the network simply by typing a sequence of numbers, whereupon you were automatically connected to the computer you chose. The computers, each with an assigned number sequence, formed a mesh. Any system connected to Telenet, be it a computer at Bank of America or one at General Foods, could be reached with one local phone call. Gathering some physical evidence was Susan's first task. She knew KeeZ+.:T4 Dmii-SjeHxdieds • 3 5 how difficult it was to track down people who broke into computers: the only fingerprints they left were electronic, and those were nearly impossible to attach beyond a reasonable doubt to an individual. Reams of printouts logging an intruder's electronic joyride through a computer or a network of computers were worthless unless there was stronger evidence linking the specific person to the incident. Susan's first step was to get something in Roscoe's handwriting. When he jotted the number of the U.S. Leasing computer and several company passwords on a sheet of paper, Susan watched as he folded it and put it in his back pocket. ♦♦ ♦ The computer staff at U.S. Leasing were baffled when, one day in December 1980, the computers that ran their business began acting strangely. The company's computers were behaving in an unusually sluggish manner. So it was a relief to the computer operator on duty late one afternoon when someone called to say that he was a software troubleshooter working for Digital Equipment Corporation. The slowdown problem, he told the operator, was affecting all of Digital's sites. The situation was so widespread, he said, he wouldn't be able to come in person to fix it; he would have to walk someone through the procedure over the phone. The cheerful technician asked for a phone number for the computers, a login and a password. He said he would then insert a "fix" into the system. The computer operator at U.S. Leasing was only too happy to oblige—it was a procedure he had Bone through before with Digital. He thanked the Digital technician, who assured him that everything would be back to normal in the morning. But the next morning, the computers were as phlegmatic as ever. If anything, the problem was worse. The computer operator called John Whipple, U.S. Leasing's vice-president for data processing, who called the local Digital office in San Francisco and asked for the helpful technician who had called the previous day. There was no employee by that name in San Francisco. So Whipple called Digital headquarters in Massachusetts. Not only was there no such employee on record, but Digital had no plans to make a universal repair. Whipple went straight to the computer room to find the operator. "Someone has been in," he told him. Whipple's only choice, he decided, was to find and destroy any unauthorized accounts, to call everyone who used the U.S. Leasing computers and have them change their passwords. Later in the day, the 36 • CYgEZPUNK computer operator had a second call from the "technician." He was as friendly as ever, explaining that the fix hadn't taken. "I can't seem to get into your machine," he said in a concerned voice. This time, the operator played dumb. "Give me your number and I'll call you back." "I'm not really reachable," came the response. "Let me call you back." When Whipple got to work the next morning, the computer operator was beside himself. The printer connected to one of the computers had been disgorging printouts all night. The floor was papered with them. And every page of every printout was densely covered with type. Covering each printout, repeated hundreds of times was a spiteful message: "THE PHANTOM, THE SYSTEM CRACKER, STRIKES AGAIN. SOON I WILL CRASH YOUR DISKS AND BACKUPS ON SYSTEM A. I HAVE ALREADY CRASHED YOUR SYSTEM B. HAVE FUN TRYING TO RESTORE IT, YOU ASSHOLE." Another read: "REVENGE IS OURS!" And finally, in neat rows of type, marching across the page: "FUCK YOU! FUCK YOU! FUCK YOU!" Interspersed among the vulgarities were names. Roscoe was one. Mitnick was another. Mitnick? MlTnick? Could that mean that MIT students had done it? People who were attracted to the computer profession in the 1960s and 1970s could hardly be considered flamboyant. By and large, they were technical loners. Those who entered the field before the computer industry mushroomed, beckoning thousands of ambitious seif-starters with the promise of fortunes to be made, were mostly men like John Whipple. They went to schools like MIT and the Califomia Institute of Technology, and they latched onto computers as an extension of an adolescent compulsion to sit in their rooms and pull radios apart. Others had a simple fascination with math, and computers were just the logical next step. Whipple had been in the computer industry for twenty years, long enough to have witnessed many a harmless prank. MIT students were famous for harmless pranks. But this was no practical joke. These electronic vandals might as well have broken into the room itself, sprayed graffiti all over the walls and taken a hatchet to the computers. Not only had they plastered printer paper with their malicious messages, they had gone into the files in system B themselves, deleted every scrap of information an inventory and customers and billing notices and replaced everything with their invective. They had, that is, destroyed the com- 144/4.: T4 Dmii-S:44 f i 1 • 37 puter's entire data base. Whipple ordered both of U.S. Leasing's computers to be cut off from any telephone lines and sealed from outsider access. His chief worry wasn't so much over the lost data, because he also had the information on backup tapes. His main fear was that somehow the intruders had devised a program that would let them back into U.S. Leasing even after all the passwords had been changed, a software contrivance called a trapdoor. That day, the company's computer operations remained shut down while the computer stall loaded the backups, reconstructed the data and restored it on the machines. The entire restoration process took twenty-four hours. After a day, the computers went back on line. Although all the passwords had been changed, and the system seemed assecure as it was going to get, Whipple decided he wasn't going to rest until arrests had been made. His first call was to Digital headquarters. All he wanted was some idea of how the intruders might have broken in at all, and some assurance that it wouldn't happen again. Anyone at Digital, he figured, would sympathize immediately with what Whipple was going through. A t the least he expected a sympathetic ear, and he wouldn't have been surprised i f the company dispatched some eager young security expert to San Francisco to take care of everything. But the response he got was tepid if not cool. Within a few minutes, he was mired in a bureaucratic procedure. In order to have Digital even consider the matter, Whipple would have to fill out a purchase order, then have his supervisor authorize the expense. A purchase order? Some invisible creeps were erasing his data, writing "FUCK YOU" all over the place, threatening his other computer, and Digital wanted him to fill out a purchase order? This wasn't the reaction Whipple had expected from Digital, of all companies. Digital was founded in 1957 by Ken Olsen, an individualistic and outspoken MIT engineer. Just as the International Business Machines Corporation was passing the Billion-dollar mark in sales of machines that sat behind glass enclosures and processed information in huge batches, Olsen set out with $70,000 in venture capital to build a smaller computer that interacted directly with the user. The idea of an interactive computer had come from a pioneering generation of computer researchers at MIT, and one of their early machines became the model for Digital's first computer, the PDP-1. When Digital delivered one of its first computers to MIT, it was installed in a room one floor above an IBM machine. The IBM computer was locked behind two layers of glass; problems were submitted on batches of IBM cards and results didn't come 38 • MEZPUNK until the next morning. The Digital computer was accessible to students any time of the day or night; commands were typed on the keyboard and the computer responded in a few seconds. A love affair began. Students gathered around and worked on the new computer until 3:00, 4:00 and 5:00 in the morning. The MIT administration even considered removing the Digital computer because people were so obsessed with i t they stopped washing, eating and studying for their classes. And from the beginning, Digital designed its computers to be used in networks. Digital found its first large customer base at universities and other research institutions. For the same reasons of accessibility and Speed, it didn't take long for Digital computers to gain acceptance among commercial customers, too. The complexity that came with buying an IBM mainframe was often overwhelming for people outside of university computer science departments. Digital computers provided a package that wasas professional as IBM's, but not nearly as complex. Whipple had believed Digital to be a company driven by its customers' requirements. He was surprised and dismayed by the company's response to his request for help. Evidently, the bureaucratic tangle served to mask the true situation: the people at Digital headquarters in Massachusetts wanted nothing to do with the event. So Whipple called the FBI. Three agents arrived at his office the next day. They showed far more concern than anyone at Digital had. But their questions were geared toward trying to figure out whether this was a federal case. There was no doubt that a crime had been committed. There were no federal laws governing computer crime at the time, but if this case fell under federal jurisdiction, i t could be prosecuted under federal wire fraud statutes. At the same time, the state of California had a year-old law on the books prohibiting unauthorized access to computer systems. After some deliberation, the FBI decided that, since the breakin didn't appear to have involved interstate telephone calls, it should be handled by local authorities. Whipple's next call was to the telephone company. He asked Pacific Bell to place traps on the lines. The phone company agreed to do the traces. But that presumed that whoever had committed this act would call again. Whipple had the feeling, even the hope, that these intruders would be arrogant enough to do so. And they were. The call came in the afternoon. This time, the computer operator's object was to keep the "technician" on the line while a trace was completed. "I don't know what's going on here," he moaned into the phone, "but everyone is upset." The operator kept a dialogue going for as long as he could. He i4v4.: T4 Die4-5je.ffre.41 3 9 cursed U.S. Leasing, saying it had taken away his password, so he couldn't log on to the computers even if he wanted to. Oddly, the friendly technician seemed in no hurry to hang up. With an eerily professional knowledge of the system, he told the operator exactly what to do to bring the computers back on line. Whipple and a phone company employee were listening on another line, and when the operator put the hacker on hold, Whipple could hear two people talking in the background. "I think they're on to us," one said to the other. The trace went only as far back as an outbound Sprint port in San Francisco—the electronic doorway of GTE Sprint, then a fledgling longdistance telecommunications company. Using several different long-distance accounts to cover their tracks was one of the phone phreaks' favorite tricks. Someone wishing to break into a computer could make himself more difficult to trace by first dialing through the equipment of one or even several long-distance carriers before finally calling his target. In every case false credit card numbers were used. Such a ruse made the phone company's task of completing a trace considerably more difficult. Crossing company boundaries made it easy for phreaks to hide behind layers of bureaucracy that slowed law-enforcement officials. It took Whipple several phone calls before he finally reached Sprint's security department, such as it was. The security people gave him a number he could call around the clock. If the intruder called again, they told him, he should call the number at once so that they could start their own trace. A few hours later, the intruder did call. Again the unhappy operator kept him chatting, and again the phone company traced the call to the same Sprint telephone number. With the glee of an angler whose hook is securely lodged in the mouth of a prizewinning marlin, Whipple called the number the Sprint security officials had given him. There was no answer. Whipple had never been much of a candidate for confrontation. He was easygoing and low-key. But now he was on the warpath. To arrive at work one morning and see his printer spewing out obscenities and all of the information on one of his computers obliterated was something Whipple had never imagined. He wanted to find out if other Digital customers in the San Francisco area had been hit. Or did these miscreants have a particular reason for wanting to attack U.S. Leasing? That afternoon, he began calling other large Digital installations. A t least a half-dozen others told him they too had had troublemakers in their systems. One large hospital that had just bought its Digital system didn't even have it fully installed, yet had already been getting repeated 40 • MEZPUNK phone calls from a "Digital technician" demanding the computer dialup number and passwords. When the hospital computer manager explained to the caller that the computer wasn't even up and running, the indignant caller demanded to speak with the hospital's chief administrator. Whipple asked the hospital administrator if he would be willing to join him in pressing charges. No, came the answer. After all, the hospital had been spared any damage, and the negative publicity, he told Whipple, would far outweigh the satisfaction of seeing justice done. Whipple realized that if anyone was going to take up a crusade against these electronic foes, it would have to be U.S. Leasing alone. He took the systems down for another day to change everyone's password a second time. He set up the computers to monitor all unsuccessful log-in attempts. The following day, the computers were back on line. By four o'clock that afternoon the intruders were back, too, trying without success to break in again. Like insects smacking themselves senseless against ascreen at night to get to the light inside, they kept flying at the system, trying password after password. Once again, U.S. Leasing immediately shut down all its outside lines. By this time, the company was buzzing with talk of the intrusions. Whipple was stunned when he met a senior executive in the hallway who chuckled and said, "Maybe we should hire this kid." Whoever was doing this certainly seemed to have more than a passing familiarity with the computer's operating system. In fact, from the commands he was typing, he seemed to know more about exploring its nooks and crannies than Whipple and his staff. But hire such a meanspirited person? That would be like giving the Boston Strangler a maintenance job in a nursing-school dormitory. Whipple's reply to the executive was curt: "How many people will we have to hire to watch him?" As incredulous as he was disappointed, Whipple began to resign himself to writing this off as a colossal, embarrassing waste of energy and time. There wasn't much left to do but count up the losses and try to forget about it. In the end, he figured, the break-in had cost the company a quarter of a million dollars in lost time and business. The chances of ever catching the creeps who had caused all the Keadaches were slim at best. A few weeks later, Whipple dropped the matter entirely. Years later, Roscoe and Kevin would claim they had been framed by Susan Thunder, that she had plastered their names all over the U.S. Leasing computer in order to pin the break-in on them, while Susan would hold firm to her claim that Kevin and Roscoe had done it. Keezi-: T4 Nek-5;kF-14€4(4 v 4 1 • V • Continuing her quest for revenge, Susan decided on a frontal assault. She started out slowly, even harmlessly. She began compiling a fact book on Kevin, Roscoe and Steve Rhoades. She talked her way into the telephone billing office, got copies of their phone bills and devised complex frequency charts on the numbers they called. She was also able to get a customer name and address report on each number called. By keeping close tabs on the phone bill of Jo Marie, Roscoe's fianc6e, she could track him closely. lt didn't take Roscoe long to figure out that Susan had tumed on him. She called him at strange hours and left spiteful messages on his answering machine. One day she called Ernst & Whinney, where he worked in the data processing department, to inform the personnel office that one of the staff members was using the company's computer terminals after hours. As a result of Susan's call, Roscoe was fired. To elude her, he began changing more than just his phone number; he also changed his "cable and pair," a specific set of wires assigned to his apartment by the phone company switching office that ordinarily would have stayed the same when his number changed. But Susan's solution to that was simply to get Jo Marie's bill. There were other ways of getting phone numbers. When Kevin Mitnick changed his number, as he often did, Susan would drive out to his apartment in Panorama City, clip a test set to the phone line and call a standard number the maintenance people used to find out which number belonged to which cable and pair. lt wasn't long before she realized that Kevin was someone to reckon with. He was even more familiar with the ins and outs of the phone company than Roscoe was. I n fact, Kevin had outsmarted Susan by logging in to a phone company computer and disabling the automatic number identification test function for his telephone. If she stood outside his house and entered the code used to read back his number, all she got was a failure. By then Kevin had begun listening to Susan's private telephone conversations, by attaching a hand-held ham radio and clipping it to Susan's phone lines in a phone terminal box under a carport a few yards from her apartment. Anyone else who wanted to listen just needed to tune in to a little-used frequency on an FM radio. Kevin and Roscoe began taping her calls, most of which were long late-night dialogues with 42 • CYMPUNK another phone phreak she had started to date. Kevin and Roscoe tittered in the Background as a languorous Susan described the tricks of the prostitute trade to her boyfriend in full detail. And they taped her own taped greeting from the Leather Castle, the bordello where she plied her trade. "Jeanine," unmistakably Susan but uncharacteristically sweet, gave out the current rates for each service: $45 for a half hour "if you're dominant," $40 "if you're submissive" and $60 "if you'd like to wrestle." For a while, Kevin and Roscoe followed her around in separate cars, communicating with each other over their radios like two cops an a trail. When she discovered them, Susan escalated the war by bringing it into the public domain. • V • Bernard Klatt was one of the tens of thousands of technical workers in Silicon Valley, 350 miles north of Los Angeles. These intense engineers, predominantly men, populated the twenty square miles south of Stanford University in increasing numbers after World War II. They created a technological paradise that spawned first the semiconductor, then the microprocessor and finally the personal computer. An electrical engineer, Klatt worked as a technician at Digital Equipment Santa Clara, servicing and troubleshooting the company's computers. For Klatt, a tall, dark-complexioned Canadian who was aloof and formal with strangers, as for many others in Silicon Valley, computing was part vocation and part passion. He lived with his wife in a two-story apartment building in Santa Clara, several blocks off El Camino Real, Silicon Valley's main commercial thoroughfare. The building was one of thousands built as Silicon Valley exploded with new industry in the 1960s: a contemporary prefab structure with thin walls and a kitchen separated from the living room by a belly-high divider that served simultaneously as wall, counter and breakfast table. Like many in Silicon Valley, Klatt had given over his spare bedroom to his computers. But while others tinkered with inexpensive personal computers, Klatt was busying himself with a surplus Digital Equipment minicomputer. One of the company's most successful computers in the 1960s, the machine, known as a PDP-8, was awkward to program by today's standards, but it was one of the first computers that didn't require an industrial-strength life-support system. Klatt was able to power it by simply plugging it into his apartment's wall outlet, an unusual feature for large computers of its time. \Lui*: 1U M-$Ut H*cU+ t 43 Klatt decided to make his computer useful to a wider audience. Work ing with a friend, he wrote a program in the version of the BASIC computer language used on the PDP-8 that would allow a caller with a modem to dial in and transmit and receive messages. The PDP-8 stored the messages and then waited to display them for the next caller. This turned it into a bulletin board system, or BBS for short. Bulletin boards like Klatt's grew in popularity in the early 1980s, spreading around the United States as part of the personal computer explosion. They were a little like neighborhood bulletin boards found in laundromats or community centers, offering lawn cutting services and free kittens, but with more vitality. Since messages could be appended to other messages and categories could be organized to be scanned quickly by computer, the systems subdivided into special-interest cate gories. Most of the discussions were about computers, but subjects ran the gamut from science fiction to odd sexual practices. Private messages could be left for a particular user, while public messages were accessible to anyone who logged in. Callers could check in every day to see what had been added and to append their own comments. A kind of electronic stream of consciousness emerged as BBSs became the digital substitute for a neighborhood chat on the front stoop. By 1980 there were well over a thousand BBSs around the country. Today there are at least ten times as many. They covered a remarkable variety of features. Some permitted callers to store and retrieve software. This in turn gave rise to the world of free software and "shareware." Some programmers made substantial sums of money by giving their software away on approval, requesting that the users send a payment only if they found it valuable. Inevitably, by the early 1980s, pirate BBSs had emerged as well. Legendary boards like Pirate's Cove in Boston permitted callers to down load (using modems to transfer it to their own computers) commercial software without paying for it, and shared advice on how to break soft ware copy-protection schemes. Some of the pirate boards were well known, their telephone numbers posted widely. Other boards were more secretive, accessible only to a limited membership. Klatt's bulletin board, called 8BBS, was one of the nation's first bul letin boards for phone phreaks. Bernard Klatt had a fanatical commit ment to freedom of speech. After putting his system on line in March of 1980 and publishing its number on several other systems, he insisted that his board be a free haven for its users. The ground rules, which were set out for new callers in an introductory computer message, were simple: 44 a cmzpum Not ice:Uncontrolled message content. Proceed at your own risk. 8 B B S m a n a g e m e n t s p e c i fi c a l l y d i s c l a i m s a n y responsibility or liability for the of any message on this system. No contents representations are made concerning accuracy or appropriateness of message content. No responsibility is assumed in conjunction with message 'privacy'. 8BBS acts in the capacity of a 'common' carrier and cannot and does not control the content of messages entered. As a result, within months after 8BBS first began operation, a ragtag collection of phone phreaks and computer aficionados had discovered it and established it as one of the nation's premier clandestine electronic meeting places. Anyone dialing in was immediately struck by the dedi cation that the community of several hundred regular callers had to the subculture of phone phreaking. They were attracted by the notion that they were participating in some kind of high-technology avant-garde. Others called just to browse or "lurk," reading posted comments without making their presence known. 8BBS was frequently busy around the clock. Soon the board had national scope. Callers dialed in from as far away as Philadelphia. Some would place their calls using purloined telephone credit card numbers to avoid long-distance charges. Others would ex change illegal information. Credit card numbers, computer passwords and technical information on telephone networks and computers were all stored and read on 8BBS. It was impossible to tell whether the person sitting at the other end of a message was a skilled professional systems programmer or a teenager in the family den perched in front of a Com modore 64. It was in December of 1980 that both Roscoe and Susan, already locked in a bitter war, found their way to 8BBS. For several months they became regular callers, leaving general tips and trading information, while at the same time, as many phreaks are prone to do, flaunting their particular skills. Even their first messages were revealing. Susan was ever the seducer: fcW- 1U b*+k-$U*. HmIua, ▼ 45 Message number 4375 is 14 lines from Susan Thunder To A L L a t 0 4 : 3 8 : 0 2 o n 0 4 - D e c - 8 0 Subject: COMPUTER PHREAKING I am new in computer phreaking and don't know that much about systems and access. I h a v e h o w e v e r, b e e n a p h o n e p h r e a k f o r q u i t e awhile and know alot about the subject of t e l e p h o n e s . . . ( I t h i n k ) . . . a n y w a y, I would very much like to chat with anyone interested in sharing information, e s p e c i a l l y a b o u t c o m p u t e r s . B y t h e w a y, I a m a 6 ft. 2 inch blonde female with hazel eyes, weight 140, and I enjoy travelling alot. If anyone can suggest any neat places to go on weekends, let me know . . . Roscoe was the cocky self-styled techno-wizard, breathless in his first private message to Bernard Klatt: Message number 4480 is 20 lines from ROSCOE [RP] to SYSOP at 18:38:27 on 06-Dec-80. Subject: ROSCOE MUST CONSERVE SPACE. I AM ROSCOE, FAMOUS IN L.A., CA AND IN THE PAPERS OF L.A. FOR MY PHONE-COMPTR PHREAKING, FREE ACCESS TO ALL, AIRLINE TICKTS, ETC. VER IMPRSED WITH YR SYSTM. NOT HAD CHANCE TO REVIEN ALL MSGS YET. I WILL BE LEAVING YOU MORE DETAIL MSG WITHIN 7 DAYS BECAUSE I CAN BE OF GREAT ASSIST TO YOU AND ALL USRS. BASICALLY: TELL ME WHAT INFO TO WHAT YOU NEED, I CAN GET . . . ANYTHING. FREE AIRLINE. FREE HOTEL, FREE CALLS . . . BEST PHONE PHREAK IN L.A.! (I HAVE REPUTATION) AND ANM KNOWN BY MANY, WAS ON THAT'S INCREDIBLE, T.V. SHOW IN L.A., AND AM MOST POWERFUL IN LA.A. HAVE DEC SYSTEM 1,2 PASWR & DIAL-UPS IN ALL 48 46 a CYg&pUMC STATES, HAVE MANY PRIVED ACCTS, CAN CRASH SYSTEMS WITHIN 20 DAYS OF REQUEST TO DO SO, CAN GET ANY PHONE NO TO ANYTHING!!! (MORE THAN JUST NON-PUB ... CAN RUN DMV VIA TERMINAL . . . CAN RUN INTERPOL VIA TERMINAL . . . CAN RUN AIRLINE TICKET VIA TERMINAL ... CAN RUN PHONE COMPANY VIA TERMINAL . . . FREE PHONE SERVICE, FRE CUSTOM CALLING, ETC. CAN DO MUCH MORE ... I HAVE SO MUCH TO SAY THAT CAN'T FIGURE OUT WHAT TO SAY FIRST . . . EXUSE POOR REAIBILITY OF THIS LETTER . . . PLEASE CALL ME AT (213)469-. . . . VOICE AND LEAVE MSG ON HOW TO CALL YOU, OF IF YOU DON'T MIND, I WILL GET YOUR NUMBER, BUT ONLY IF YOU DON'T MIND. I ALSO WIT WANT TO KNOW ON HOW TO GET THAT PHONE-PHUN BOOK? THANK YOU FOR THE XCLNT SYSTEM ROSCOE. With the arrival of the Southern California phone phreaks on 8BBS in late 1980, the board took a disturbing twist. The anonymity that once was a source of comfort now led to rising paranoia. Susan and Roscoe's war spilled out in bitter public messages, and the ominous possibility that not only the computer underground but law-enforcement agencies were reading 8BBS became a concern. Susan, who was growing more and more computer literate, was often antagonistic and haughty in her public postings. In February 1981, she claimed that Roscoe was collaborating with the enemy: Message number 6706 is 16 lines from Susan Thunder To * * > A L L < « * a t 0 0 : 4 4 : 1 8 o n 2 7 - F e b - 8 1 Subject: GOING ON VACATION . . . I AM GOING ON A CRUISE OF THE CARIBBEAN AND BAHAMAS AND WILL BE BACK IN ABOUT A WEEK OR SO . . . DON'T EXPECT ANY REPLIES FROM ME DURING THAT TIME. THERE IS A VERY GOOD CHANCE THAT ROSCOE IS COLLABORATING WITH THE FBI TO TRAP PHREAKS: KevU*: 1U M-$Ut Wick*. ▼ 47 GIVEN THE TROUBLE HE HAS RECENTLY HAD, I KNOW THAT SOMETHING'S AMISS WHEN HE STARTS LEAVING PUBLIC MESSAGES, ESPECIALLY TO ANTON,* SEEING AS HOW HE AND ANTON TALK ON THE PHONE FOR SEVERAL HOURS EACH DAY . . . WHY WOULD HE LEAVE THE MESSAGES IN A PUBLIC SYSTEM ANYHOW? DON'T CALL THE SYSTEMS HE LEAVES: IT'S EITHER A TRAP, OR HE WANTS YOU ALL TO DO HIS REVENGE WORK FOR HIM!! HAVE FUN! THUNDR@MIT-DM,MIT-AI Outside of his spat with Susan, Roscoe was a good citizen on the BBS. Out of concern for the well-being of the board, he told other callers he believed the phone company had installed a line monitor on 8BBS. If telephone numbers were being recorded then everyone was potentially in trouble, regardless of their aliases. The news cast a pall over the BBS. The rising paranoia also affected Roscoe. He began to contemplate get ting out of the underground. WELL IT SEEMS THAT I, ROSCOE, AM GETTING TOO OLD TO KEEP UP WITH SO MUCH PHREAKING. MY INFORMATION GATHERING IS TAKING UP ABOUT 4 TO 5 HOURS OF MY TIME EVERY DAY, AND THAT'S TOO MUCH CONSIDERING THE FACT THAT I WORK FULL TIME AND ATTEND SCHOOL FULL TIME. SOON TO RETIRE . . . ROSCOE. Then, as if to help Roscoe out the door, Susan attacked him more viciously than ever, adding statutory rape to the list of crimes she wanted the others to believe Roscoe had committed: YOU ARE GOING TO JAIL FOR A LONG TIME FOR CRASHING AND ZEROING THE U.S. LEASING RSTS/ E. THEY WILL GET A CONVICTION. DID YOUR CHILD-MOLESTING CASE EVER GET RESOLVED? 16 COMPLAINTS FROM AS MANY DIFFERENT 11-15 YEAR OLD GIRLS IS PRETTY SICK. THEY SHOULD HAVE PUT YOU AWAY A LONG TIME AGO. ["Anton Chernoff," an early computer programmer, was Kevin's nickname of choice on 8BBS.1 48 a cmmiNic In mid-1981 the private war that Susan had taken public began to wane—at least on 8BBS. After Roscoe and Susan were gone, 8BBS continued to operate for almost another year. The board had lost some of its computer underground edge and shifted back in the direction of less controversial computer hobbyist concerns. But its phone phreak roots brought 8BBS crashing down. In early 1982 Bernard Klatt received a faster modem in the mail, a gift from some Philadelphia phone phreaks wishing to improve the speed of 8BBS. He didn't know that it was stolen, purchased by mail using a false credit card. In April of 1982, while he was on vacation in Canada, a team of law-enforcement officials from the Santa Clara County sheriffs office and telephone company security agents came to his apartment with a search warrant. A fire ax shattered his front door and the agents confis cated all of the 8BBS disks and backup tapes. When he returned, Bernard Klatt wasn't prosecuted, as he hadn't known that the gift modem was stolen property. But when his employer found out about the search of his home and the nature of the computer hobby, he lost his job. The 8BBS era had ended. A T A Perhaps, Susan said years later, if Roscoe hadn't filed a civil harassment complaint against her, dragging her into the ugly legal arena first, she wouldn't have used the evidence. It was early 1981 and the warring had been going on for several months when Susan was summoned to the Los Angeles city attorney's office for a hearing regarding Roscoe's complaint that she was disrupting his life with obscene and threatening telephone calls to him and to his mother. Susan nodded when the hearing officer admonished her to cease this behavior. Her opportunity for decisive revenge finally came later that year, after the COSMOS incident. It was at the Shakey's Pizza Parlor during Memorial Day weekend in 1981 that Kevin and Roscoe decided to break into Pacific Bell's COSMOS center in downtown L.A. Understanding COSMOS was es sential for efficient phreaking. COSMOS (the acronym stands for "Com puter System for Mainframe Operations") is a large data-base program used by local telephone companies throughout the nation for everything from maintaining telephone cables to keeping records and carrying out service orders. In 1981, most of the hundreds of COSMOS systems installed around the country were running on Digital Equipment com puters. In order to manipulate COSMOS, it was necessary to know a dozen or so routine commands, all of which were outlined in telephone company manuals. A thirty-minute foraging session in the trash bins behind the COSMOS center could yield considerable booty: discarded printouts, notes passed between employees and scraps of paper containing passwords. Though most trashing was done late at night, even those who pre ferred to trash at midday were seldom spotted. If they were, they usually had a plausible enough reason for being found knee-deep in the garbage. Susan's favorite trick was to dress in shabby clothes and rummage in Dumpsters while muttering to herself like a deranged homeless woman. Roscoe claimed he was hunting for recyclable material. Roscoe, Kevin and Mark Ross, a friend and occasional phreak, set out from Shakey's late one night in a caravan of three cars. When they arrived at the phone company parking lot, it was a short walk through an open chain-link fence—why, after all, should the phone company bother locking up its trash?—into an area containing several Dumpsters. They clambered in and started wading through old coffee grounds, dis carded Styrofoam cups and other garbage in search of the occasional gem. Kevin and Roscoe already knew quite a bit about COSMOS, but they wanted to get a firm grip on the password setup. Certain passwords were needed for certain levels of privilege in the COSMOS system. The password to the most privileged account of all, called the root account, still eluded them. The root account was the master key to all the other accounts on the computer system; its password would give them the power to do anything in COSMOS. The trash cans' offerings were paltry that night. Perhaps another phreak had been there earlier in the evening. Kevin found a handbook to a computer called the "frame" that would probably be useful, but otherwise the pickings were thin. After taking what they had found in the trash to their respective cars, the three phreaks huddled briefly to discuss whether to go into the COSMOS center itself. Kevin wanted to find room 108, the office that he knew contained the COSMOS com puter itself, a guaranteed lode of information. At first, Roscoe wanted Kevin to approach the guard by himself. Kevin would impersonate a Pacific Bell employee, tell the guard that two friends would be arriving in a few minutes for a tour of the facility and, if the guard bought it, Kevin would use his hand-held walkie-talkie to transmit a Touch-Tone signal to Roscoe's walkie-talkie telling him that the plan had worked. But Kevin was nervous; he didn't want to go in by himself. They 50 a CV&WINtC would all go together or not at all, he said. The three argued about the matter for several minutes until finally the other two agreed to accom pany Kevin to the back entrance, where a guard sat at a reception desk. They piled into Kevin's car and backed out of the trash area. In order to be conspicuous in arriving this time, Kevin drove around to the main parking lot in the back of the building and parked with his headlights beaming in through the glass door. If the guard thought there was anything peculiar about a Pacific Bell employee arriving at 1:00 a.m. on a Sunday to give a guided tour to two friends, he didn't show it. Kevin appeared far older than his seventeen years, and he talked a convincing line. As Roscoe and Mark stood by, Kevin chatted up the guard. First came idle chitchat: Kevin had a report due on Monday, he said, and was upset that he had to come in to work on Memorial Day weekend. Apparently welcoming the distraction from his nighttime vigil, the guard didn't ask to see Kevin's company ID, nor did he ask which department the pudgy young man worked for. In a friendly and inquisitive manner, Kevin strolled over to a television mon itor that wasn't working and asked the guard about it. They both shrugged. "Just on the blink, I guess," Kevin suggested. Then, as if he had done it a thousand times, he signed the name Fred Weiner in the logbook, and Sam Holliday for Roscoe. His imagination apparently spent, he entered M. Ross for Mark Ross. Once inside, after a false start that led them into the mail room, the visitors dispersed through the halls. It didn't take long for them to find the COSMOS computer center in room 108. A metal basket attached to the wall held a list of dial-up numbers for calling the COSMOS computer from outside. Kevin removed the list and put it in his pocket. And in a paper tray on a desk they found a list of codes to the digital door locks at nine telephone central offices. In the Rolodex files on several desks, the three young men planted cards printed with the names John Draper (the real name of the infamous Captain Crunch) and John Harris. Next to John Harris's name was the telephone number of the Prestige Coffee Shop in Van Nuys—a number that phreaks routinely intercepted and rerouted to a loop line; next to Draper's name was the number of a nearby pay phone. The idea was to create instant credibility: if one of them called claiming to be John Draper, a Pacific Bell employee, and if as a security measure the recipient of the phone call consulted his Rolodex file to verify the name and number, he would find the information. Next to room 108 was the COSMOS manager's office. The walls were \U**:lkM-$^y*dt* ▼ 51 lined with shelves holding six large manuals. A quick look through the books was all they needed to see that this was perhaps the most impor tant thing they would find that night; they were the COSMOS manuals, which contained information on everything that could be done with the COSMOS computer. The group perused the shelves and set aside the books they wanted to take. Once they had gathered what they thought they could use, they piled it all on one desk and sorted it so as to reduce the bulk and appear less suspicious to the guard. Roscoe spotted a brief case next to a desk; he picked it up and put the manuals inside. Then, each carrying as much as he could, they walked back out to the guard station, where Kevin signed out and exchanged hearty farewells with the guard. Just as casual as he was about letting them in, the guard seemed thoroughly unconcerned that these three young men had arrived emptyhanded and were leaving laden with a briefcase and armloads of books. Kevin drove the others to their cars and the three drove in single file to the nearest Winchell's Donuts to divide their plunder. It had all taken less than two hours. Unfortunately, they had been too greedy. When the COSMOS man ager arrived on Monday morning, he couldn't help but notice that his shelves were nearly bare. He notified security immediately, and ques tioned the guard who had been there over the weekend. The guard mentioned the threesome from Sunday morning, and said he was sure he could recognize them again. Then the manager found two cards in his Rolodex with unfamiliar handwriting, which belonged to no one in the office. It was time to call corporate security. A T A Meanwhile, Susan was sitting on the evidence she had been gathering for nearly a year. She had intimations that the L.A. district attorney was preparing to indict her on a dozen or so felony charges, including unlawful entry into Pacific Bell headquarters and conspiring to commit computer fraud. So she decided it was time to visit Bob Ewen, an inves tigator in the district attorney's office, to blow the whistle on her erst while buddies. She told Ewen that she had come to him because she was concerned for her nation's security: Kevin knew she had some extremely sensitive information, and Susan was certain that he wanted to get his hands on it. By way of example, Susan told Ewen that she had once spent several days locked in her apartment, and that when she emerged she told Roscoe and Kevin that she had been downloading and printing out 52 a CVEEZPUM missile firing parameters and maintenance schedules for intercontinental ballistic missiles. She boasted that she knew the schedules of the men who worked in the hole (the men authorized to turn the keys), and that she knew when the maintenance was done and what the backup systems were. Susan claimed that, given the right information, one pimply ado lescent scrunched into a phone booth with a terminal and a modem and certainly Kevin Mitnick—could set off the necessary chain of com mands to release hundreds of missiles from their silos and send them hurtling across the globe. She hadn't tested her theory, of course, but she claimed to have developed a method for fooling the computer, lead ing it to believe that the necessary sequence of actions preceding a first or retaliatory strike had already occurred. The real vulnerability, Susan believed, lay in the nation's communications system. The Pentagon's heavy dependence on the Bell System made it a sitting duck for the likes of Kevin Mitnick. Susan asked for immunity from prosecution in ex change for doing her civic duty and testifying against Kevin and Roscoe. Ewen knew enough to be leery of many of the "theories" that issued forth from this rara avis. For one thing, he recognized her as the same tall, buck-toothed blond whose face was familiar to guards at Pacific Bell offices throughout the county. She had been spotted in Pasadena with Mitnick and Rhoades, and in the San Fernando Valley with the one who called himself Roscoe. But Ewen wanted to see Roscoe and Mitnick convicted. He sent her to see the district attorney. As it happened, the district attorney felt exactly the same way. He offered to give her im munity in exchange for her full cooperation. Susan, of course, was fully prepared to take the witness stand and tell her version of everything. When Bob Ewen came onto the COSMOS case in 1981, he had already been dealing with phone phreaks for some time. For years, he kept a collection of confiscated blue boxes and other electronic fraud gear in a box under his desk. Usually there wasn't much to fear from phone phreaks, but when he went out to serve a warrant on Mitnick, Ewen wasn't sure what he was dealing with. As Susan Thunder had described the suspect, he was potentially dangerous. Ewen went first to Mitnick's residence to carry out a search. Mitnick wasn't home, but his mother was. Reed-thin and wearing a skirt that struck Ewen as too short for a woman approaching forty, Shelly Jaffe, who bore some resemblance to Popeye's girl, Olive Oyl, seemed confused and flustered. As Ewen picked his way through her son's room, Shelly stood at the doorway and popped her gum nervously. She reminded him of a teenager who hadn't Ke*U+: 1U DmJMUl \\acX*a ▼ 53 outgrown the habit of reading movie magazines and still harbored a dream of becoming a Hollywood discovery. The search wasn't easy. Mitnick appeared to be something of a pack rat. He had apparently saved every scrap of paper and every printout he had ever obtained, and Ewen had to scrutinize all of it. He unearthed printouts filled with telephone company information, computer pass words and material from one of the computer centers at the University of California at Los Angeles. Shelly became increasingly flustered. She did not, she said, know anything of her son's illegal doings. She assured Ewen that Kevin could not be responsible for the things the police suspected. Kevin, she insisted, was an angelic son. "Then what's this?" Ewen asked, holding up a printout of telephone company information. "I've never seen that before," she responded. "When is the last time you were in your son's room?" "I don't remember." Ewen got the impression that Shelly, who displayed no hint of malice herself, might be intimidated by her son. It was evident that she tried to maintain a decent home. Aside from Kevin's cluttered room, which was actually tidy compared with some Ewen had seen, Shelly kept a neat household. But she appeared to have no control over the boy she had raised or the situation at hand. She seldom saw Kevin. Her early hours as a deli waitress rarely coincided with her son's more nocturnal sched ule. Clearly, she knew nothing about computers and had no desire to try to learn anything about them. It was Ewen's hunch that even telephones might overwhelm her. Among all the evidence Ewen gathered in Kevin's bedroom, he found nothing linking the suspect to the COSMOS break-in. There were no manuals, directories or other signs that Kevin had been there. Still, on the strength of the guard's identification of Mitnick, Ewen had obtained an arrest warrant. Although the Mitnick family hadn't been particularly observant Jews, Kevin often went after school to the Stephen Wise Temple in the private community of Bel Air, where he worked parttime. Ewen drove to the synagogue with three other officers; the four men divided into two cars and waited in the parking lot for Mitnick to show up. When Mitnick began to pull into the lot, he apparently saw the men sitting in their unmarked cars, because he hesitated, then drove by. As soon as he took off, the police peeled after him, sirens ablare. Mitnick's car accelerated. Just as Mitnick pulled onto the 405 freeway 54 a cmmm headed north, his pursuers overtook him and forced him onto the shoul der. At first, Ewen wasn't sure what he was up against. The suspect was very large, at least two hundred pounds, and possibly armed. Ewen feared Kevin and his buddies might have modified the COSMOS computers and planted a "logic bomb"—a hidden computer program designed to destroy data at a given time. This made Ewen worry that he might even have a terrorist on his hands. So they handled him as roughly as they would a murder suspect: guns drawn, they pushed him onto the hood of his car and handcuffed his hands behind his back. It wasn't until the officers felt not muscle under his shirt but soft and pliable flab that they realized this young man was no physical threat and loosened their grip. Mitnick complained that he had to go to the bathroom immediately. Then he began to cry. "You scared me. I thought I was going to die." "Why did you think you were going to die?" Ewen asked. "I thought they were after me." "Who?" asked Ewen, bewildered. "You know, there are a lot of people that don't like me." Kevin didn't mention it to Ewen, but a few months earlier he had been hunted down by an irate ham operator who was fed up with Kevin's high jinks. Ewen told Kevin he was sorry to hear that people didn't like him. He was just doing his job, he said, and would have to take the teenager to jail in handcuffs. In the car, Kevin began to talk. He admitted to knowing Roscoe and Susan and Steve Rhoades. Then, as if he suddenly realized he was talking to an officer, he stopped talking. When Ewen asked him if he had put a logic bomb in the phone company computers, Kevin looked as if he might start to cry again. No, he insisted, he would never do anything to hurt a computer. Recovering the COSMOS manuals proved more difficult than finding the suspects. Once Kevin had been taken into custody and his mother and grandmother had hired a lawyer for him, Ewen began to press the lawyer for the missing manuals. Ewen was particularly worried that the manuals would be copied and distributed throughout the phreaking com munity. He shuddered at the possibility. With passwords and dial-up numbers, phreaks could shut down much of the phone service in the greater Los Angeles area. Kevin's attorney insisted that Kevin didn't have them, but that he might know where to find them. A few days later, the lawyer delivered all of the stolen manuals. The prosecutor decided to fold the cases against Kevin and Roscoe together. Both were charged with burglary and grand theft, and with KW; 1U M-SUt fM*> t 55 conspiring to commit computer fraud—felonies under California law. The charges would be for the U.S. Leasing incident, already more than a year old, and the COSMOS break-in. U.S. Leasing's John Whipple, who had long since dismissed the entire incident as a bad dream, was surprised to hear that the vandals who had crippled and defiled his company's computer had been apprehended and charged with having "maliciously accessed, altered, deleted, damaged and destroyed the U.S. Leasing system." Mark Ross was charged with burglary and conspiring to commit computer fraud in connection with the COSMOS break-in. After Roscoe was arrested, his mother gave him a choice. He could either use her money to hire her lawyer, an old friend from Argentina who knew nothing about computers or computer crime, or draw on his own meager resources and hire whomever he pleased. Although he had found a good criminal lawyer who had experience in cases such as his and would charge less than his mother's friend, Roscoe could do nothing to persuade her to pay. He ended up with the computer-illiterate Argen tine. While the defendants were out on bail and the prosecution was pre paring its case, Ewen decided it might be a good idea to eavesdrop on one of the Shakey's meetings. So one night before the trial, Ewen, the juvenile prosecutor, and Pacific Bell and GTE investigators dressed in the most casual clothing their closets could produce and convened at the Hollywood Shakey's. They seated themselves at a table about thirty feet away from the group. Neither Roscoe nor Mitnick was in attendance. Rhoades was also absent. Instead, seated at the phreaks' table, the center of attention, was Susan. The group of law enforcers sat in disbelief as their star witness took over the meeting, trading phone information with the others, oblivious to the presence of the men she was working for. When she and another phreak got up to leave, Ewen followed her to the parking lot and watched as she retrieved a printout from the other phreak's car. "Susan," Ewen called to her as she was returning to the restaurant, "what do you think you're doing?" It took Susan a few sec onds to focus on Ewen; indulging her vanity, she seldom wore her glasses. When she recognized Ewen, she grew defensive. "Hey, I thought I could get some stuff you guys could use." Ewen looked at her sternly. "Okay," she conceded, "so I still like to do this stuff." A T A 56 a CYZEZPUNIC Shortly before the hearing, Kevin Mitnick pled guilty to one count of computer fraud and one burglary count. In exchange for the dismissal of two additional charges and in the hope of being sentenced to probation instead of a term in the California Youth Authority prison system, Kevin agreed to testify for the prosecution, even if it meant betraying Roscoe. On December 16, 1981, a pretrial hearing was held. The prosecution's first witness was Susan, who cut an imposing figure as she strode to the witness stand and swore to truthfulness. Susan had been given immu nity. Under assistant district attorney Clifton Garrott's gentle question ing, she recounted Roscoe's trespass into the U.S. Leasing system. He had arrived one evening the previous December to take her out on a date, and as she was getting ready he sat down at her computer terminal and dialed into U.S. Leasing. When she asked him what he was doing, Susan told the court, he said he was using a program called god to get into a privileged account, in order to run a program called MONEY to print out the passwords on the system. Susan went on to explain in detail how the MONEY program could only be called up using a certain account. Unable to follow the exchange between Garrott and his witness, the judge interrupted. "Slow down a minute," he demanded. "This is a whole new education for me over here." The proceeding digressed for a few minutes while Susan presented an introductory course in computer terminology for the uninitiated in the room. She explained passwords, logins and account numbers. When Roscoe got the MONEY program to run, she continued, she saw him start to write down passwords and account numbers. And when she looked at the screen a few minutes later, she recalled, the words delete and zeroed had appeared. At that point, Garrott produced a ragged eight-and-a-half-by-eleveninch sheet torn from a three-ring binder and held it up for the judge to see. Roscoe was stunned. When he had arrived home that night after this so-called date with Susan, he had reached into his back pocket and realized the piece of paper was gone. Little had he suspected that she would pick his pocket! Garrott continued his questioning. He asked Susan if she had asked Roscoe what he was doing at her terminal. "Yes," she answered. He said he was "taking care of business . . . getting even." Then, she said, he began, "laughing hysterically, crazylike." At the prosecutor's gentle prodding, she said she was upset by Roscoe's behavior that night. "The KW; 1U l)Mk-$Ut H**U+ ▼ 57 vibes weren't right. There was a lot of tension between us," she told the court. "I said, 'Why did you do that? You know it was destructive.' " "What did he say?" asked Garrott. "I got no response." Jose Mariano Castillo, Roscoe's attorney, did his best to discredit Susan as a witness. "When in December of 1980 did this incident take place?" he asked her. "I believe it was the twelfth or thirteenth." "What day of the week was that?" "Thursday or Friday." "Were you employed?" "Yes." "Where were you employed?" "The Leather Castle." "What was your occupation at the Leather Castle?" Garrott leapt to his feet to object. The question was irrelevant and immaterial. "What is the relevance of the type of work that she was doing there?" the judge asked Castillo. "Well, it goes to credibility, Your Honor." "How?" "Well, let me ask her specifically," and he turned back to Susan. "Were you a prostitute?" "No," Susan replied hotly, expressing indignation at the very sugges tion. Garrott objected to the question and the judge sustained his objec tion. Castillo continued. "Have you ever been prosecuted for prostitution?" This time, Garrott objected before Susan could answer. Try as he might, Castillo could pursue no line of questioning that might help to impugn her testimony. Each time Castillo asked a question of Susan, Garrott objected to it as irrelevant. The judge sustained all but a few of the objections. When the prosecutor didn't object, Susan was coy with Castillo, often craning forward and asking him to repeat the question, as if she were hard of hearing, or confused. Castillo asked her if she had been in love with Roscoe. "Infatuated, perhaps," Susan responded. "In love? No." Castillo asked if Roscoe had been rejecting her advances. "Yes" was Susan's reply. 58 a CVZEZPUNIC "And you felt upset because of the rejection?" "No. He wasn't the only man I was going out with." "How many people were you going out with, dating, at that time?" This time, the judge overruled Garrott's objection and instructed Susan to answer the question. "Three or four." When Castillo began to ask her about her drug problems, Garrott was quick to object again. Castillo persisted. Susan's drug problems, he claimed, had some effect on her emotional state. Moreover, he said, she had sexual problems. The judge rebuffed him and sustained Garrott's objection. The hearing dragged on this way into the afternoon. Every time Castillo tried to impute vengeful motives to Susan, to sully her credibil ity or to introduce other names—Kevin Mitnick, Steven Rhoades—as possible suspects, Garrott leapt to his feet and the judge ruled in his favor. All told, Roscoe's prospects were beginning to look bleak. If this pretrial hearing was the legal equivalent of a movie's rough cut, Roscoe could easily imagine how the finished film would turn out. At the end of the afternoon Kevin was called to testify. He began by explaining the term phone phreak to the court. While refraining from placing himself in any category in particular, Kevin described different "types" of phreaks. "One type is a person that likes to manipulate tele phone lines and computers," he lectured. "Another one is the type that just likes talking with other people on conference lines. And stuff like that." Kevin recounted the visit to the COSMOS center in precise detail. The Shakey's meeting. The trashing. The unsuspecting guard. The for aging through room 108. The stealing of the manuals. Garrott showed particular interest in what transpired later at Winchell's Donuts. Kevin told the prosecutor that the manuals were left in the cars but the door code list was brought inside, and that he later made a copy of the door codes for himself. Afterward, Kevin said, he and Roscoe divided up the manuals from behind Kevin's car. Despite his best efforts, Roscoe's attorney wasn't making much head way in building up a convincing case for his client's innocence. Rather than take chances with a trial and risk fumbling the defense in court, Roscoe's attorney decided to work out a plea bargain with the prosecutor. On April 2, 1982, a day before his twenty-second birthday, Roscoe pled no contest to the conspiracy charge and to the charge of computer fraud against U.S. Leasing. Two months later, he was sentenced to 150 days RW; 1U D*Ul-$Ul \\*cbtA t 59 in jail. Ross got thirty days. Kevin had considerably more luck than his confederates: after a ninety-day diagnostic study mandated by the juve nile court system, he got a year's probation. A T A While Roscoe served out his sentence, Susan dropped her alias and refined her new entrepreneurial persona. She became a security consul tant. In April of 1982 she appeared on the television news show "20/20." Susan wore a purple blouse beneath a wide brown jumper. The outfit was set off by a pair of oversize star-shaped earrings that swung conspicuously amid limp, straight blond hair. Why, asked an inquisitive Geraldo Rivera, had she and her friends wrought such havoc with the phone company? "I was getting off on the power trip," she replied. "It was neat to think that I could screw up the Bell System." Hassling someone—disconnecting his phone or canceling his car insurance—was all standard practice. "Is there any system that can't be gotten into?" she queried herself. Then she answered her own question. "God, I live by an old saying: if there's a will, there's a way. There is always a way." In the next two years, Susan became a peripatetic Cassandra, travel ing around Los Angeles, painting doomsday scenarios for her clients. She developed a standard set of these grisly prognoses and trotted them out for reporters and lawmakers. A year after her "20/20" appearance, under the auspices of an FBI agent, she flew to Washington to expound her theories before the U.S. Senate. During her testimony, Susan ex plained about phreaking and trashing, or "garbology," as she put it. She recalled with some nostalgia the talents and feats of the L.A. gang. She talked about posing as repair personnel and altering credit ratings. She described the practice of using the U.S. Leasing computers. William Cohen, the chairman of the Senate subcommittee holding the hearings, then asked, "There was no indication they felt there was anything wrong about going in and using U.S. Leasing's program? In other words, if you walked into somebody else's house and decided you wanted to watch television for a couple of weeks or a year and just walk in and turn on somebody's set, there would be nothing wrong with that?" "I guess if people were stupid enough to leave their door unlocked," Susan replied. "Hey, if people are stupid enough to leave the system passwords around that way—that's how the group felt." Upon learning that Susan's formal education had stopped at the eighth grade, the incredulous senator remarked, "It seems it would be so 60 a CVZEZPUNIC easy for one of our major adversaries to secure the services of people like yourself who have no advanced degree or training." "I agree," Susan responded. "It poses a very serious national concern, a very serious threat to national security. I wanted to find out how everything worked. I have got to admit to a certain interest in something that was supposedly classified as top secret." "Journalists have the same fascination with classified information," Cohen remarked. "I studied to be a journalist when I was in junior high school." "I was afraid you were going to say that." A T A While in Washington, Susan got a chance to demonstrate her "social engineering" skills. As Susan later told the story, a team of military brass —colonels and generals from three service branches—sat at a long con ference table with a computer terminal, a modem and a telephone. When Susan entered the room, they handed her a sealed envelope containing the name of a computer system and told her to use any abilities or resources that she had to get into that system. Without missing a beat, she logged on to an easily accessible military computer directory to find out where the computer system was. Once she found the system in the directory, she could see what operating system it ran and the name of the officer in charge of that machine. Next, she called the base and put her knowledge of military terminology to work to find out who the commanding officer was at the SCIF, a secret compart mentalized information facility. Oh, yes, Major Hastings. She was chatty, even kittenish. Casually, she told the person she was talking to that she couldn't think of Major Hastings's secretary's name. "Oh," came the reply. "You mean Specialist Buchanan." With that, she called the data center and, switching from nonchalant to authoritative, said, "This is Specialist Buchanan calling on behalf of Major Hastings. He's been trying to access his account on this system and hasn't been able to get through and he'd like to know why." When the data center operator balked and started reciting from the procedures manual, her temper flared and her voice dropped in pitch. "Okay, look, I'm not going to screw around here. What is your name, rank and serial number?" Within twenty minutes she had what she later claimed was classified data up on the screen of the computer on the table. A colonel rose from his seat, said, "That will be enough, thank you very much," and pulled the plug. Computer security experts had been suspecting for years what Susan KW; 1U Dm^-SUc WacIha, ▼ 61 was proving time and again: the weakest link in any system is the human one. Susan liked to illustrate her belief with the following scenario: Take a computer and put it in a bank vault with ten-foot-thick walls. Power it up with an independent source, with a second independent source for backup. Install a combination lock on the door, along with an electronic beam security system. Give one person access to the vault. Then give one more person access to that system and security is cut in half. With a second person in the picture, Susan said, she could play the two against each other. She could call posing as the secretary of one person, or as a technician in for repair at the request of the other. She could conjure dozens of ruses for using one set of human foibles against another. And the more people with access the better. In the military, hundreds of people have access. At corporations, thousands do. "I don't care how many millions of dollars you spend on hardware," Susan would say. "If you don't have the people trained properly I'm going to get in if I want to get in." fCd/lf* 6w» l&hi«i4> T> he list of cohorts with whom Kevin was ordered not to associate was comprehensive. It included Roscoe, Susan, Steven Rhoades and Mark Ross. Kevin also had strict orders to stay away from all phone phreaks in general. In effect, his circle of acquaintances was pared con siderably. But there was always Lenny. Lenny DiCicco had never been attracted to phone phreaking, or trashing, or even social engineering. His was a fascination with buttons. As a little boy in Oak Park, outside of Chicago, Lenny wouldn't bother with a toy unless it had a knob to turn or a lever to push. Even as a toddler, he had a knack for finding the switch to stop an elevator be tween floors, or the button that would halt an escalator. When he was five, he managed to activate the fire alarm of one of Chicago's largest hospitals, sending nurses and physicians scurrying through the halls. But to his parents, Lenny's compulsion to play with gadgets was an enigma. Gilbert DiCicco (pronounced "duh-SEE-ko") was an illustrator at the Chicago Tribune; Vera DiCicco was an artist, too. Their only child es chewed crayons in favor of toys with moving parts and motors. When Gil DiCicco took an illustrating job with a San Fernando Valley newspaper in 1977, the family moved to Los Angeles. In his very first minutes in Los Angeles, twelve-year-old Lenny exhibited surprising 62 KW; 1U l)Mk-$JU H*di+ ▼ 63 enterprise. As Gil and Lenny waited for Gil's brother to pick them up at the airport, Lenny discovered that a quarter was refunded for each rental cart returned to the automated dispatcher. For half an hour, Lenny ran furiously around inside the terminal, rounding up stray carts and collect ing the refunds. An auspicious omen, thought Gil, for starting their new life. Lenny enrolled at Sepulveda Junior High School in Mission Hills. His formal introduction to computers came at Monroe High School, in John Christ's introductory computer class. Lenny demonstrated an intuitive understanding of the labyrinthine integrated circuits around which com puters were built and an aptitude for programming. It was the start of the personal computer era and he developed a passion for computing. And like many his age, the gangly teenager also displayed a special interest in communicating with remote systems over telephone lines. When Lenny managed to log on one day to the school district's central computer, Christ could only chuckle. Two years earlier, a student of Christ's had demonstrated the same talent by using the simple classroom terminal to access the school district's Digital Equipment computer sys tem. His name was Kevin Mitnick. He had dropped out of high school and taken an equivalency test for his diploma. "Oh, no," Christ groaned and smiled at Lenny, "not another Kevin!" Nothing could have pleased Lenny more. Lenny knew of Kevin Mitnick, who was something of a legend in Los Angeles high school computing circles. As a student at Monroe, Mitnick had absorbed information like no student before him. His telephone company exploits had been described at length in the Los Angeles Times. By Mitnick's own account to the FBI, the paper reported, he and his friends had gained unauthorized access to computers all over the United States—systems supposedly impenetrable toall but selected people who know the passwords. Mitnick also told the FBI that he had obtained sensitive data from "the Ark," one of the main systems in Digital's software development group. In suburban Southern California, where high school heroes traditionally emerged on the gridiron, Kevin had been the perfect antihero: a nerd who used technical wizardry to befuddle the authorities. There seemed to be no end to his clever tricks. While at Monroe, Kevin had reconfigured a modem line so that he could use it to dial out of the school's main computer and into others. The modifi cation gave him a perfect cover for his activities. Anybody who at tempted to trace the phone calls would inevitably run into a cold trail at the computer center. 64 a CYBERPUNK Lenny first met Mitnick in 1980 when a mutual friend introduced them. Lenny and his friend were on their way to a conference of an organization for Digital Equipment customers called DECUS. They had stopped by Kevin's house to invite him to come along. He declined, but asked them to keep their eyes out for interesting literature. National DECUS meetings usually attract as many as twenty thousand Digital users from around the country. For high school students to be intrigued by Digital computers was unusual enough, but for them to go out of their way to attend a DECUS convention was a sign of extreme dedication. Mingling with the attendees, they could be as anonymous as they pleased. The convention hall was a sea of terminals clustered within exhibition booths that demonstrated the latest in Digital computers, software and product literature. The day after his trip to the DECUS meeting, Lenny got a call from Kevin, who asked if he could get copies of the manuals Lenny had picked up. Lenny had finally met someone whose unusual passion matched his own. Like Lenny, Kevin Mitnick displayed little respect for his elders and even less for the institutions over which they presided. Someone had told Lenny that when Kevin was an adolescent, his mother had so much trouble controlling him she sent him to a disciplinary camp for incorrigible children. On top of the much-publicized COSMOS inci dent, Mitnick had gained notoriety for breaking into computers at col lege campuses around Los Angeles. Lenny knew he was dealing with a veteran, and although Lenny was learning his way around the computer underground quickly, he knew he still had a long way to go. Lessons from Kevin were far more interesting than anything Monroe High School had to offer. Lenny had always found school a useless bore. His attendance record at school was already spotty, and once he met Kevin it got worse. Kevin had a lot of time on his hands. He was working as a delivery boy at Fromin's, a delicatessen in the heart of the San Fernando Valley owned by Arnold Fromin, who was living with Kevin's mother in Panorama City. Hungry for a terminal to use, the pair discov ered the San Fernando Valley's Radio Shack stores. Each store had a demonstration model of a personal computer called the TRS-80. Because the computers were also used to send inventory updates each evening to Radio Shack's Fort Worth headquarters, they were equipped with mo dems as well. Lenny and Kevin merely had to supply a communications software program to transform one of these computers into a full-fledged terminal. Using stolen MCI codes, they could dial long-distance into any computer they could find. Kevin's initial method was to talk some- KW; 1U btok-$Ut HacIu* t 65 one out of a password. Once he was in, he no longer needed to employ his verbal skills. What were supposed to be five-minute demonstrations became mara thon six-hour reconnaissance sessions. Kevin sometimes pushed his luck, imploring a manager to keep his store open well past closing time. They could last for about a month at each store. When a manager got irked enough by their constant presence to ask them to take their hobby elsewhere, they simply combed the Yellow Pages for new possibilities. They became techno-nomads. The two teenagers turned their attention to the University of South ern California. Kevin had already been caught fiddling with computers on the USC campus a couple of years earlier, but, as usually happened on the college campuses where he was caught, he was "counseled and released." When he returned with Lenny at his side in 1982, no one recognized him. Kevin already knew the locations of campus terminal rooms that stayed open twenty-four hours a day, available to anyone who could pass as a student. Both Lenny and Kevin were largely self-taught and they were still learning. Most of what they picked up about computers came not from time spent in classrooms or computer labs but from hours spent with whatever system they could steal some time on. Most of the time, the computers were Digital systems, the most popular computers on college campuses. So it wasn't surprising that the computers they came to know best were Digital. By the early 1980s, Digital had augmented its PDP series of minicom puters with the VAX line (VAX stands for "Virtual Address Extension," which refers to a way to expand memory that speeds a computer's perfor mance). These computers were designed in such a way that all models could use the same software and share data over computer networks. With the VAX, Digital strengthened its position in the commercial market and started competing successfully in the banking, insurance and accounting markets, traditional IBM strongholds. But Digital still had its roots in the technical and university community. And as its loyal customers at universities such as USC migrated to the VAX, so did Kevin and Lenny. Phreaking as an end in itself had never done much for Lenny. His affinity for the telephone began and ended with his frequent lengthy conversations with friends. He felt uneasy about misrepresenting himself in order to get information or coerce a password out of someone. And Lenny didn't have Kevin's appetite for electronic revenge. Kevin used 66 a CVZERPUM phone company computers to wage his private wars against whoever he thought had crossed him. Lenny watched one evening as Kevin attached a local hospital's $30,000 telephone bill to the home phone of a fellow ham radio buff whom Kevin disliked. But there was something that drew him to Kevin. His own reluctance notwithstanding, Lenny was intrigued by Kevin's ability to feign and cajole his way around almost any phone company office, or even a police department. Kevin could call someone at a switching office, for example, and convince him to drive fifteen miles just to turn a computer on. The secret lay in convincing the person on the other end of the line that he was the supervisor of that person's supervisor. He would gain that person's trust by speaking the same lan guage. It was often remarkably simple. Kevin's use of telephone company vernacular snowed most customer service operators, whose full coopera tion he needed to, say, pull a victim's toll records. And some of Kevin's phreaking tools came in handy for Lenny. The telephone company's loop lines—the special numbers it used for testing customer service—were ideal for certain tasks. For example, when Lenny and Kevin applied for jobs and needed to supply a reference, they could give out a test line number, sit on the line waiting for the call, and give the reference themselves. And they made frequent use of phone company test numbers that provided a constant busy signal, or simply rang and rang. To them, it seemed more like harmless hoodwinking than fraud. Free long-distance calls using credit card numbers were per haps the best part of Kevin's phreak repertoire. But when Lenny tried to show his father how to cash in on the free service, he got a stiff repri mand. Computers were Lenny's abiding passion. At fifteen, he was still too young for his driver's license, so on weekends and school holidays his father drove him to the nearby Northridge campus of California State University to use the school's computers. Lenny usually asked to be picked up six or seven hours later. The senior DiCicco understood noth ing of Lenny's fascination with computers and things technical. Occa sionally Lenny tried to explain things to him, but his words sailed over his father's head. Gil DiCicco had grown up in the 1940s and 1950s, when relatives would shout into the telephone to make themselves heard on long-distance calls. Gil didn't see much to celebrate in this so-called computer revolution of the 1980s. If anything, he lamented the loss of communities as he understood them, where people met in person and not electronically, and where teenagers did more than sit in front of computer screens. He was sad to see that young computer enthusiasts KW: 1U D**lc-$Ut \c\Ack* T 67 felt more comfortable interacting with machines than with people. He was a humanist who prided himself on having nothing to do with these machines. Still, he knew enough to guess that Lenny's computer fixation would land him a well-paying job some day, so he was glad for the time Lenny spent inside the Northridge computer center. Lenny had told him that he had made many friends there, and although he spent a large portion of the day playing computer games, it was keeping him off the streets. But when Gil got a call from the campus security office one Sunday afternoon, saying he should come retrieve his son, who had just been caught illegally logging on to the highly restricted administrative com puter used by the school, among other things, for recording grades, he was sure Kevin Mitnick had something to do with it. Kevin Mitnick was in fact Gil DiCicco's worst nightmare. Lenny had never shown much interest in school, but he usually managed to bring home fair grades. But when Lenny started hanging around with Kevin, his grades took a dramatic plunge. Gil had only met him once, but there was something unsettling about the overweight teenager. He was always whispering things to Lenny in front of others. This guy wasn't just a bad influence. He was hurting Lenny's chances of ever making good on the future Gil was trying to give his son. First, Gil admonished Lenny, trying to impress on him how lucky he was that Cal State-Northridge hadn't pressed charges. Furthermore, he told him, he didn't want to see him spending time with Mitnick. The senior DiCicco then decided to take a rash step to see to it that his son's unwholesome friendship with Kevin Mitnick ended: he went to Fromin's and confronted Kevin. "Look," he said, "just stay away from Lenny. It's doing both of you no good." Gil didn't want to see Kevin's face around the DiCicco house again, he told him flatly. From the dull expression on Kevin's face, Gil figured he might as well have delivered his speech to the nearby bowl of half-sour pickles. Kevin shrugged and smiled, avoid ing eye contact with Gil. "Uh, okay, I've gotta get back to work now," he replied, and turned away. Gil had no illusions that this little chat had made any impression. Now that Northridge was off limits, Kevin and Lenny spent weeks at USC, building up their own small empire of purloined accounts. They had managed to get accounts on all the university's computers. When they arrived one evening as usual, they saw that of their six accounts, all but one had been disabled. It was obvious that someone in the computer lab was on to them. Lenny was worried, and he warned Kevin 68 a CYBERPUNK that it was probably a setup. He wanted to leave, but Kevin wouldn't budge, insisting that they restore their lost accounts and that they stay on campus to use the university's own high-speed links. In the end, Lenny shared Kevin's delusion that what they were doing was undercover work worthy of a Hollywood spy thriller. Brazenly walking onto the campus was the kind of thing Robert Redford would do as the hunted CIA researcher in the movie Three Days of the Condor. Kevin's favorite movie, it told the story of a former English literature graduate student hired by the CIA to extract plots from novels, who stumbles onto a conspiracy within the agency. In one dramatic scene Redford masquer ades as a telephone lineman and throws the agency's high-tech surveil lance gear off the track by crossing some wires. And Lenny's own code name was Falcon, after Christopher Boyce, the young TRW employee and protagonist of the book The Falcon and the Snowman who in the midseventies fed the Soviets secret military technical data that traveled over TRW's satellite communications system. A T A For all Mark Brown knew, it could have been a faculty member who was monkeying around with the system. He wouldn't have been surprised if it turned out to be a student looking for a way to make trouble. Four years earlier, in 1978, two USC students, unhappy with their grades and financial aid, had made news when they were arrested for trying to tap into the university's computer to improve their standing. Those two failed, but years later, in 1985, a year-long investigation would uncover a ring of some thirty USC students in league with someone in the school's records and registration office, who routinely changed grades and created fraudulent degrees. They charged handsomely for the ser vice, selling doctoral degrees for as much as $25,000. Brown, a young assistant in the computer lab, hadn't encountered any malicious computer attacks. In 1982, USC's attitude toward com puting was typical of most universities': it wanted to keep its computers open and accessible to its users. In the late 1970s and early 1980s, security had yet to become a serious issue on college campuses. Setting up a reliable password system was just about the only security barrier at places like USC. Because so many of Digital's customers had told the company that they were more interested in convenience than in secu rity, the operating system software was shipped with many of the builtin security features disabled. While customers could, by reading the KW: 1U b**lc-$Ut H*cU* t 69 instruction manuals, activate those security features, most customers chose not to, since increased security meant increased inconvenience. In 1982, computers and computer terminals were proliferating on college campuses so quickly that it was almost impossible for computer managers with their limited resources to pay much attention to security. Besides, placing undue restrictions on computer usage would have been like sectioning off the university library for selective access. Librarians weren't there to keep people from the books, but to lead them as easily as possible to the books they were seeking. So it was with computers as well. Still, a modest hierarchy had to be imposed on the USC computer systems; the people who watched over the system needed a master key to everyone's account, just in case they needed to retrieve a lost file or fix a student's account. Like any other computing center, USC had system managers with full access to everyone's account, and Mark Brown was one of them. Part of his job was to monitor the system's activity, to make sure that the machines were running correctly and to provide assistance where needed. One day, he noticed that some strange things were happening. Someone was logging in to privileged accounts nor mally used only by system managers. So, taking the role of detective, he started trying to track the trespasser down. His first step was to place some secret traps in the operating system to catch anomalous behavior. Next, he wrote a program that watched for unusual activity on the accounts the trespasser used most frequently. Finally, he began printing out the records of the break-in attempts. After a few days, it was clear that the USC interloper was exploiting a loophole in the campus computers' operating systems to get access to the most privileged accounts on the system and then create his own account names and passwords. Alternatively, he used the accounts of others to break into privileged accounts. The printouts showed that he was coming in over off-campus phone lines. Brown's first move was to call the phone company and have the line traced back. To do that, he learned, he would need to notify the police and obtain a court order. So he decided to take it on himself. Rather than shut the intruder out of the system entirely and give up the chance to track him down, Brown limited his access and minimized the amount of damage he could do. Judging from the intruder's actions, his motives seemed relatively benign—that is, until the day one of the log scripts showed him downloading university accounting files. These are files that keep 70 a CVZEZPUNIC records of the establishment and deletion of accounts, and they often include password entries. Not only did the intruder have the accounting files, he also had managed to use a privileged account to steal personal mail files from systems people like Brown, presumably in order to glean further information about the computer system. That was stepping over the line. Gentlemen do not read other people's mail. Brown began taking countermeasures. Brown considered himself a hacker in the hallowed, traditional sense of the word. To him, hacking was the honorable pursuit of perfection in computer programming. It did not mean breaking into someone else's system. Brown decided it would take someone who thought like an intruder to catch one. He called for help from a couple of his fellow programmers, including Jon Solomon, a former phone phreak, and started the chase. After a week of intensive monitoring, they realized that on certain days the phantom visitor was entering the school's computers at much higher speeds than usual. He could do that, they reasoned, only from a specific terminal room, where the only high-speed links could be found. Brown had been around the computer community long enough to see a lot of cockiness, but this was incredible! They knew that the next time the high-speed connection came, it would take a bit of maneuvering to isolate where the intruder was in the computer lab, but it could be done. To make things more efficient, they decided to risk scaring him off with their obvious tampering: they limited his access to one machine. One night when Brown went out to dinner, he left Solomon to watch for the trespasser. No sooner had he left than the intruder was on line— and his connection was coming from inside the campus. It took Solomon only a few minutes to trace the terminal. It was spooky: the interloper was at work in the very lab where Solomon was sitting. Solomon walked across the room and stood a few feet behind an overweight young man with a familiar face who was sifting through a stack of papers he seemed to be using as a reference. He was oblivious to anything else in the room. Solomon stepped a couple of feet closer to look over the intruder's shoulder. The papers were copies of the stolen accounting files. Next to the intruder sat another man who seemed much younger than the first. They appeared to be together. Suddenly Solomon placed the familiar face: he had met the chunky hacker weeks earlier at a DECUS confer ence. The hacker had struck Solomon as pretty cocky, boasting about his exploits. Solomon knew that his name was Mitnick, and that he had KW; T& DmM^ fM** ▼ 71 been arrested in the past for breaking into computers. Neither Mitnick nor his friend was enrolled at USC. Hurriedly, Solomon stepped away and called the campus police. In the few minutes it took for the police to arrive, Solomon watched as the pair kept typing, logging in and trying out different passwords. Solomon was beginning to get the feeling that he could have watched them for an hour without their noticing him, so engrossed were they in the task at hand. When the two officers appeared in the doorway, Brown's assistant pointed to the older of the two strangers and they flanked his chair. When the plump young man looked up, his face expressed none of the guilt or remorse that Solomon expected to see. Here was a known computer criminal who wasn't merely breaking into the computers of a private university with which he had no legitimate connection—he strolled onto campus to do it. Solomon expected to see some sign of self-rebuke—at least some surprise—that he had been caught in the act. Instead, when the police questioned him, Mitnick took offense. "I'm not doing anything wrong," he said. The papers he was working with, he claimed, belonged to him. His friend sat nearby, discernibly more nervous. When the officers asked Mitnick to step out side, he picked up his thick stack of computer printouts, tucked the sheaf under his arm and obliged. The officers took both of them to the campus police station. At the security office, the police took their names: Kevin David Mit nick and Leonard Mitchell DiCicco. When Brown and Solomon ques tioned Mitnick, his attitude was supercilious, as if under other circumstances he wouldn't deign to answer. He taunted Brown for what he claimed were unsophisticated sleuthing tactics. They never would have caught him, he claimed, if he hadn't made himself such an easy target by coming onto campus. In a records search, the campus police discovered that Mitnick was on juvenile probation for breaking into other computers and that Di Cicco, barely seventeen, had been caught six months earlier doing the same thing at Cal State-Northridge. They handcuffed Mitnick and DiCicco to a bench and called the L.A. police to come fetch them. In spite of Kevin's cool reaction to Brown, his fear of getting caught was so profound that it gave him heart palpitations so severe that he would soon have to depend on heart medication usually taken by people three times his age. Nonetheless, he seemed to realize the inevitability of arrest. He had once told Lenny that he knew he would be caught again after the COSMOS stunt. He had been lucky that time, getting probation instead 72 a CVZERPUNIC of jail. Nevertheless, his compulsive side had won out over his fear of the consequences, and now here he sat, handcuffed to a bench. It was a conflict that would play itself out for years to come as Kevin's obsession intensified. And, at his side, not so much because he sought it but rather because he couldn't avoid it, would be Lenny, a faithful but not always willing companion. The bench was in a narrow hall next to the door, twenty feet away from a security officer working at a desk. By now Lenny was familiar with the deep fear that came with getting busted, but as a juvenile he knew he was better off than Kevin. When he had been caught at Cal State Northridge, he had been detained and released after a few hours. His parents hadn't even punished him. Kevin, on the other hand, was now nineteen and could get this put on his adult record. Lenny prodded Kevin. "Hey, Kev," he said, reaching into his back pocket for his wallet. He grinned as he produced a handcuff key. Lenny unlocked his own handcuffs, then Kevin's. The two sat speechless for a moment. Lenny broke the silence. "You go ahead. You've got a lot more to risk. Take off." Both looked over at the officer, who appeared to be paying no attention to his wards. The door next to the bench was unlocked; Kev in's car was in a parking lot just a few yards away. Lenny's mind was perhaps too full of comic strips and spy thrillers. He had a madcap side to him that tended to surface just as a situation was spinning out of control. His escape plan for Kevin came straight from fiction. Lenny's plan would have brought Kevin closer to being a true criminal than Kevin could have imagined for himself. Kevin rejected Lenny's plan not out of reason but out of fear. He was too scared to try to flee by himself. Kevin would try it only if Lenny came too. Lenny sighed and snapped his own cuffs back into place. He dropped the key onto the floor and pushed it under the bench with his foot. When Kevin tried to lock his own cuffs again, he couldn't. The noise Kevin was making in his efforts to engage the hardware caught the attention of their guard. He got up from his seat and checked Lenny's cuffs, then turned to Kevin. As he pulled on Kevin's arm, it swung free. "So we've got a Houdini over here," the officer remarked. He searched both of them thoroughly and shackled Kevin back to the bench. "Do this again and I'm going to handcuff you to the toilet," he warned. When Solomon and Brown returned to the computer room to exam ine the terminals where Mitnick and DiCicco had been seated, they saw that Mitnick's terminal had just logged out of a computer called Elex- Wash. Solomon recognized it as a Defense Department computer, but he couldn't tell what Mitnick had been doing with the account. Brown looked over the stack of printouts that had been confiscated from Mit nick, and he saw that it had a list of passwords to all the local accounts that had been created in the last two months. The stack also contained account names and passwords of companies Brown knew to be affiliated with the Defense Department, and what appeared to be secret informa tion about genetic research by a company called Intelligenetics. All of the computers were connected to the Arpanet, the computer network funded by the military that connected nonclassified military installa tions, military contractors, universities and research centers around the world. At first, Lenny thought he was going to get out of this one without a scratch. For some reason, USC decided to drop the charges, and as punishment at home, his parents grounded him for a week. Then, in a puzzling reversal, six months later USC refiled the charges and Lenny was summoned to appear in court. He pled guilty to a felony as a juvenile and got a year's probation. Dominick Domino, the detective in charge of the Los Angeles Police Department's young computer crime unit, wanted to see Kevin somehow rehabilitated. In his police report, Domino wrote a brief summary of the case, ending it with an ominous observation: "This defendant is expert at computers and apparently enjoys the challenge of breaking computer codes. He will undoubtedly continue to be a police problem in this area unless maturity rechannels his energy and ambition." So Kevin went to jail: six months at the California Youth Authority's Karl Holton Training School, a juvenile prison in Stockton, California, with about 450 inmates. Karl Holton was one of the more secure prisons in the state; violence-prone teenagers who were difficult to control were sent there for crimes ranging from armed robbery to murder. Kevin was doubtless the only inmate convicted of breaking into computer systems. Living conditions at Holton were harsh: the prison was overcrowded, there was minimal personal privacy and there was a great deal of vio lence. But Kevin tried to make productive use of his time there. He became something of a jailhouse lawyer, and he developed a computer program for tracking fellow wards of the court. He also worked with the Los Angeles police to put together an instructional videotape on com puter security. He was released in late 1983. A T A 74 a memm Richard Cooper wanted to know why Kevin Mitnick was using the computer so much. Why was he helping himself to Cooper's phone line all the time? And how was it that he could magically reconnect lines that had been disconnected? When Cooper presented himself at the L. A. district attorney's major fraud section in October 1984 for a talk with investigator Bob Ewen, he described himself as a sales consultant at Video Therapy, a curiously named enterprise on Ventura Boulevard in Sherman Oaks. Cooper said he was a partner with Donald Wilson, the owner of National GSC, a merchandising company with a mystifying product line consisting of gourmet desserts and "solar barbeque" franchises. Donald Wilson, a friend of the Mitnick family, had agreed to hire Kevin soon after his release by the California Youth Authority to work for Great American Merchandising, one of several National GSC subsidiaries. These grandly named subsidiaries, it seemed, sprang full grown from Wilson's head and usually fizzled into bankruptcy shortly thereafter. Cooper ran one of the ventures, called Video Therapy, but he had had about enough of Wil son's bizarre businesses and was unnerved by the presence of the young man Wilson hired to handle clerical duties and work with the computer. Before Mitnick arrived, the only person who touched the office com puter was a secretary, who used it for three to four hours a day to write letters. Mitnick was now working on the computer all day. When Cooper came at 9:00 each morning, he usually saw Mitnick's black Nissan, conspicuous for its vanity plate that read "X HACKER" and its mobile radio antenna, already in the lot. And Mitnick often stayed at least until Cooper left at 6:00 each night. When Cooper asked Wilson why Mitnick was glued to the computer so assiduously, Wilson replied that he was working on a number of special projects. But the answer didn't satisfy Cooper. Every time he passed Mitnick's desk and looked at the screen, he saw that Mitnick was in the middle of patching in to the computer of TRW's credit bureau to inquire into credit standings. Cooper knew that neither Great American Merchan dising nor its parent company would be making such inquiries. And there was no reason to run credit checks through TRW, as Wilson's franchisees generally did not apply for credit. Then the telephone nonsense started. In early October, Cooper told Ewen, he moved his office into the "client relations" room, where Mit nick and the computer sat. Every time Cooper saw the phone line for his Video Therapy light up, Mitnick was using it. All day long, Cooper told Ewen, he heard Mitnick on the telephone. He appeared to be talking with Pacific Bell employees, because he heard Mitnick refer to such things as COSMOS, satellite operators and work orders. He introduced himself variously as Gillie, Paul, Peter and Steve to whomever he called. And there was one apparently Scottish person Mitnick often made passing reference to during these telephone calls: R. C. Mac. Ewen had to smile at that. Cooper had no idea that RC MAC was the Recent Change Machine Administration Center, an internal telephone company department that processed orders and changes in service via computer. Coincidentally, Bob Ewen had already opened an investigation two weeks before Cooper's visit, on an allegation that Steve Rhoades and Kevin Mitnick were illegally getting into telephone repair and billing computers, and fraudulently using an access code from Satellite Business Systems, a long-distance company, to make toll calls. Mitnick and Rhoades also appeared to be harassing people on MIT computers, where they had guest accounts. And six months earlier, a rash of complaints had come from the ham radio community, claiming that Mitnick had been provoking hams over the air once again. To avoid getting sent back to prison, Mitnick had surrendered his ham radio license to his parole officer. Based on what Cooper was now telling him, Ewen decided there was enough cause to issue a search warrant for the offices of National GSC and an arrest warrant for Mitnick. Ewen took with him three other investigators and Terry Atchley, a Pacific Bell security official. From the Erector-set feel of the tiny office, Ewen got the impression that this was a fly-by-night operation at best. Donald Wilson told the group that the reason he had hired Kevin Mit nick was that he felt sorry for him and he wanted to give him a break. Wilson said he wasn't aware of any calls made to TRW, but when Ewen questioned the secretary, she said she had received two calls for Mitnick from a woman saying she was from TRW. When Ewen asked where Kevin might be found, Wilson said he didn't know. Kevin had left for lunch just fifteen minutes earlier. He added as an afterthought that he had once overheard Kevin say he would flee to Israel before going back to jail. When Ewen showed up at Shelly Jaffe's Panorama City condominium an hour later, Shelly seemed calmer but even less cooperative than the first time Ewen had paid her a visit three years earlier. It was as if Kevin had coached her on what to say in case the police arrived at the door, or so it seemed to Ewen. Kevin was living with her, she told the investiga tor, but she hadn't seen him for a few days and refused even to venture 76 a Qf&WNK a guess as to his whereabouts. So Ewen checked out some of Kevin's usual haunts including Warner-Elektra-Atlantic Records in Burbank, where Lenny DiCicco was working as a computer operator. Did Lenny have any idea where Mitnick might be? Israel, perhaps? No, Lenny told Ewen, he had heard that Mitnick might be in Las Vegas. Ewen's next call was to TRW Information Services. The company's security auditor checked the credit bureau's records and confirmed that dozens of inquiries on Mitnick and Rhoades had been made in recent months. They had come from William Pitt Jewelers and Security Pacific Bank. The inquiries appeared to be something of a prank. The jewelry store alone had made 350 of them into such alleged credit applicants as Steven Rhoades, Steve's grandmother Juanita, Kevin Mitnick, Lenny DiCicco and Gretchen Dog—the name of Juanita Rhoades's Doberman pinscher. Mitnick and Rhoades were merely playing around with a pur loined TRW account number. It wasn't surprising that Mitnick and Rhoades hadn't altered any of the credit ratings, as that would have been far more difficult to do. During the search at Donald Wilson's office, Ewen and his men seized a Xerox personal computer, a printer, a disk drive, a modem, a monitor and various floppy disks. But he missed Kevin. Somehow, Kevin must have found out he was in trouble. He was well-known for running fre quent warrant searches on himself. That might explain the strange phone call that came in to the warrant section of the Los Angeles Police Department on October 24, the day before Ewen served the search warrant. At 6:00 that evening, a man who identified himself as Detective Jim Schaffer from the LAPD's West Valley office asked if there was a probation violation warrant out on one Kevin Mitnick. The computer operator who took the call said yes, there was a fresh warrant in the computer. The detective thanked him and gave him a number where he could be reached. About an hour later, a second call came from a male with a different voice who also identified himself as Detective Schaffer. He said he had Mitnick in custody and wanted to confirm a parole warrant. Suddenly suspicious, the operator put the second caller on hold and dialed the number he had been given by the first caller. "West Valley detectives," came the salutation from a woman, or at least a female-sounding voice, who confirmed Detective Schaffer's existence. When the operator came back to the caller, there was no one on the line. When he called the L.A. number again, an answering machine picked up the line. "Hello, you have reached RotoRooter. We're closed ..." KW; 1U b«Uc-$Ut W^JIua t 77 Kevin may have fancied himself an aspiring Condor, but when things got rough, the bravado shattered. It turned out that while walking to his car at lunchtime, Kevin saw Bob Ewen, the security investigator for Pacific Bell and three other men headed for the elevator of his building. Kevin called Lenny from a pay phone across the street from his office. He was in a panic. He told Lenny he knew there was a warrant out for him, and he was going to leave Los Angeles. Lenny was sure Kevin would be in touch at least once a day, as always. But he didn't hear from his friend after he went into hiding. Instead, once a week or so, Kevin put in a call to Roscoe. Without disclosing his whereabouts, he asked for gossip about the amateur radio scene. Roscoe had long since given up his HOBO-UFO conference line. He was now married to Jo Marie, the woman whose presence in Roscoe's life had crushed Susan's pride four years earlier. Jo Marie had completed law school and Roscoe had gone relatively straight. He had dropped out of USC after only a year, opting instead for a quick diploma from a local vocational school called the Computer Learning Center of Los Angeles. Rather than parlay his weeks of fame from the cover of the L. A. Weekly into a security consulting job, as he had hoped, he settled for a position as data processing manager at an auto parts importer north of Long Beach. It wasn't exactly rarefied work, but it suited Roscoe's orderly style. Now that he had settled down, Roscoe was beginning to think about using his wife's legal expertise to have his 1982 conviction set aside by the court, thus putting the whole unpleasant mess behind him. A weekly check-in call from a fugitive was the last thing he needed. Kevin wouldn't tell Roscoe where he was, and with each telephone call, Kevin seemed more paranoid. Fleeing the warrant and probation was, perhaps, Kevin's own point of no return; he knew that what he was doing was wrong as defined by the law. This was by no means the first time he had been in a legal scrape, but it is unlikely that he had ever previously imagined himself a criminal. Once, Kevin called Roscoe and told him he needed legal advice from Jo Marie. He had been attending a small two-year college in Northern California, and the credits were under an assumed name. He wanted to change his name back to Kevin Mitnick so that he could get the credits transferred to an L.A. school. During his year-long absence, Kevin did leave a hint or two that he was still in business. One day in early 1985, Roscoe came across the phone number of Ronnie Schnell, an old bulletin board buddy from his 8BBS days, and decided to call. When Roscoe reminded him of who he 78 a cyzezpum was, Ronnie sounded surprised. "Oh, I have Kevin Mitnick on the other line. He wants me to get him an Arpanet account." Roscoe was amused, and he counted the seconds before his phone rang. "How did you know I was calling Ronnie?" Kevin demanded when he called Roscoe ten seconds later. It was a mite odd that four years had passed since either Kevin or Roscoe had talked to Ronnie, Kevin was on the lam, deter mined to keep his whereabouts secret, and suddenly Roscoe happened to be on the line at the same time. However much Roscoe tried to tell him it was a coincidence, Kevin remained unconvinced. In another strange incident that seemed to suggest Kevin was still playing around with phones, Steve Rhoades was fooling around one day with the toll-free number for lost telephone calling cards, and when he called the number, the person who answered with "Pacific Bell, may I help you?" was unmistakably Mitnick. Rhoades was so amused he re corded the greeting and used it as the outgoing message on his answering machine. A T A In the summer of 1985, Kevin resurfaced, nearly a year after his disap pearance and just a few weeks after his arrest warrant expired. Bob Ewen was shocked to learn that the juvenile probation department had dropped the warrant from its books with no explanation. If Ewen had known that the warrant was going to dissolve, he would have insisted on an extension. The investigator knew that if he had been working the case steadily instead of spottily, he would have found Kevin no matter where he had gone. Lenny didn't find out Kevin was back in L. A. until he got a call one day at work. When he picked up the receiver, all he heard was someone pushing Touch-Tone keys. The caller was spelling out his own name using a private code that Lenny immediately recognized—the kid who had escaped the law was back in town, possibly up to his old tricks. Kevin finally spoke up and the second chapter of the DiCicco-Mitnick partnership began. Kevin said very little to Lenny about his time spent underground. From what he did say, Lenny figured that Kevin had cobbled together a false ID or two, gathered his bar mitzvah money, and caught the first plane out of L.A. But even when Lenny tried to goad him years later into telling him where he had been, Kevin wouldn't say. When Kevin returned, Lenny was working on the four-to-midnight shift as a computer operator for Hughes Aircraft's Radar Systems Group RW: 1U D^lc'SUc kj*dt* ▼ 79 in El Segundo. It was his fifth job in two years. Well-spoken and relaxed during interviews, Lenny was a master at talking himself into any posi tion. His habit of abusing his employee privileges, however, would sur face soon enough, and what his family referred to as "Lenny's computer shenanigans" usually drove his supervisors to fire him after only a few months. Whenever Lenny got a new job, Kevin wanted to know what com puters were there. A Digital computer was a good start; a dial-up line that allowed access to the computer from the outside was even better. And if Lenny was working a job with night hours, and could get Kevin in when everyone else had left for the day, then Lenny heard from him just about every day. Kevin had a new project in mind: establishing accounts on the score of minicomputers that Pacific Bell operated in Los Angeles for order entry. Looking back several years later, Lenny decided that when they were dabbling in the "minis," as telephone company personnel referred to them, they gathered more power than they had ever had or would ever see again. Someone with access to these computers, which connect to switches controlling all Los Angeles telephone service, could enter commands and see them take effect immediately. The switches accessi ble through the minis did everything from discontinuing service on a line to initiating a trace. It was Lenny's job to put computer equipment at Kevin's disposal. Without a badge, Kevin couldn't come onto the premises at Hughes. Once, however, in April of 1986, he managed to talk the guard into letting him in. During this, Kevin's first and last visit to Hughes, he logged on to Dockmaster, a computer run by the National Computer Security Center, a division of the National Security Agency, the nation's highly secretive intelligence agency. Despite its obvious appeal to the adventuresome pair, Dockmaster didn't harbor any deep national security secrets. It was simply NSA's public bridge to the outside world. To get onto Dockmaster, Kevin had found the name of someone outside of the NSA with a guest account. Posing as a technician at an NSA computer center, Kevin had telephoned the legitimate user and said he was issuing new passwords and needed some information: name, telephone and current password. It was an old trick that Kevin and Roscoe had refined together, and it usually worked like a charm. But Dockmaster was incidental, a diversion from the Pacific Bell "minis" project. Since he couldn't come to Hughes, Kevin telephoned his instructions to Lenny. He called constantly. "It's the wife," Lenny's 80 a CV3EZPUNIC partner in the computer room would joke when he handed Lenny the phone. And when they needed to devote twenty-four hours at a stretch to their work, they checked in to one of the dozens of cut-rate motels along Sepulveda Boulevard in the heart of the San Fernando Valley. It was pure cyberpunk: the mile-long strip of seedy shelters was a magnet for local prostitution and drug rings, but neither Kevin nor Lenny cared, as long as the motel room had a telephone line that could be transformed into a data communications center. Once that criterion was met, Lenny preferred motels with pools in case he got the urge for exercise, and both were partial to places next to a 7-Eleven or other suitable convenience store for frequent junk-food runs. Kevin usually plunked down the $19.95 for the night onto the registration desk in coins filched from Shelly's tip money from waitressing. Once inside the room, they went straight to work: Kevin unpacked the terminal while Lenny popped open his tool set to rig the telephone jack so that it would accommodate their modem. They worked through the night, taking little note of some of the seamier activity around them. They often pushed the checkout time to the limit, until the manager came around to throw them out, making them personae non gratae at that establishment. It took six months for them to get fully privileged accounts on every phone company mini in the Los Angeles area. And with each computer they conquered, their potential power increased. It would not have been difficult for Kevin and Lenny to take down the phone service for the entire metropolitan area; but neither of them was interested in that. The idea of power was more seductive than actually wielding it. When Hughes got word from the NSA that someone from the El Segundo facility had been into the Dockmaster computer, Hughes man agement went on a witch-hunt. The night of the penetration was linked to Kevin's visit, Mitnick was linked to Lenny and Lenny was summarily dismissed. The company's corporate security department spent the days after Lenny's departure behind closed doors, conducting intensive inter views with anyone Lenny had associated with. After Lenny was fired from Hughes, he got a job as a delivery man for a flower shop. The only vital credential was a perfect driving record. Though only twenty, Lenny already had a formidable record of outstand ing traffic warrants. But that was Leonard Mitchell DiCicco's problem; the florist hired Robert Andrew Bollinger, a model motorist. As Lenny would later tell the story, with Kevin's help he had created a new iden tity for himself. He even went so far as to rent an apartment in the San Fernando Valley as Mr. Bollinger. (fc^T&D^^W^ ▼ 81 But a florist doesn't have much need for a VAX minicomputer, the mainstay of Digital's product lines and Kevin's target of choice. Now Lenny hardly heard from Kevin at all. The intensity of this friendship, Lenny realized, waxed and waned depending on his job. The degree of Kevin's loyalty was a function of the kind of equipment Lenny could provide. Bollinger quit the flower delivery business after one month. Lenny DiCicco resurfaced as computer operator for a shipping company. For the time being Kevin kept a low profile. He seemed to have become more paranoid since his return. Kevin had always been secretive about disclosing personal data—it wasn't until months after Lenny met him that he was even willing to give Lenny his home telephone number— but now he was acting strangely. He was taken with the idea that people should be able to contact him at any time, but without his having to reveal his whereabouts, so he started carrying a pocket pager everywhere he went. And both Lenny and Roscoe noticed that the more paranoid Kevin became, the more he ate. Perhaps in an effort to follow Roscoe's path into the world of conven tional computing, in September of 1985 Kevin enrolled at the Computer Learning Center of Los Angeles. Roscoe had graduated a few years earlier and spoke well of it. Kevin's previous experience in higher education had been dismal. In 1982 he was expelled from Pierce College, a twoyear community college in the heart of the San Fernando Valley, for tampering with the school's computers. Maybe this time he could keep his mind on the coursework. The Computer Learning Center was started in the 1960s by a group of computer executives who, astutely enough, predicted that the nascent computer industry would see explosive growth in years to come and would need tens of thousands of people qualified to fill the jobs that were emerging. By the late 1970s the computer industry was a major source of white-collar employment, not unlike the consumer electronics industry when it mushroomed in the 1950s and 1960s. And just like any other technical school advertised on matchbook covers and city buses, the Computer Learning Center wanted to attract a student body hungry for work. To gain admission to CLC, a prospective student needed a high school diploma or equivalency degree. The applicant then took a basic aptitude test designed to measure ability in symbolic logic and mathematical reasoning, the foundations of computer science. The $3,000 tuition for the nine-month program was paid in advance and the student was on 82 a CV&RPUNIC the way to a fresh career. CLC graduates, many of whom were retooled English majors or auto mechanics, joined the data processing ranks in side Security Pacific Bank and the dozens of giant aerospace corporations that dotted the Los Angeles basin. Polaroid snapshots of these successful graduates were enshrined in a glass display case upstairs at CLC. And next to the first-floor admissions office, letters of glowing commendation from such satisfied employers as First Interstate Bank, Continental Air lines and Agfa-Gevaert lined the walls. Although the school failed to offer its graduates a formal degree, as a technical school it could certify would-be technicians and programmers as proficient in using the center's computers. For the most part corporate America didn't need computer science Ph.D.'s fresh out of UCLA, Stan ford or Cal Tech as much as it needed young men and women willing to work a lobster shift, changing tapes to back up the day's business for a starting salary of $20,000. The Computer Learning Center was a steady source of entry-level programmers, technicians, computer operators and data-entry clerks for the region. If not exactly the glamour posts of the computer industry, these jobs at least paid better than other clerical positions that required less training. The Computer Learning Center was a resolutely straight, no-nonsense place. Its dress code forbade all but the most businesslike attire. Like so many scrub-faced Mormon missionaries, the men were required to wear jackets and ties, the women skirts or dress pants. Larry Gehr, who taught an introductory class at CLC in the COBOL computer language, was vaguely aware of Kevin Mitnick's past problems, but he tried to treat him like any other student. Kevin was inquisitive, and his mind always seemed to be working at least a lecture's worth ahead of the class. Kevin had an unusual mix of computer expertise: there were some fundamentals he didn't know, but in other areas he was well ahead of his fellow students. He displayed so much ability, in fact, that Gehr was concerned that an entry-level job wouldn't challenge him. Gehr adopted the role of teacher-counselor to this erratic student. He tried to encour age Kevin, telling him that if he could get a good entry-level job and show what he could do, he would rise swiftly. A T A Even in the days when Susan was around, dating her way through the phreaks, Kevin had seemed entirely oblivious to women. So it was a bit KW; 1U DmA-SU* H*Ju* t 83 of a surprise to friends when, in the summer of 1987, Kevin casually mentioned that he had just gotten married. Everyone developed his own theory about Kevin's nuptials. That the bride in question worked at GTE, one of the two telephone companies servicing the L.A. area, seemed no coincidence. At first, word went out that she was a program mer there. For someone like Kevin, his friends agreed, there was nothing more tantalizing than the promise of an inside source. And by the time Susan Thunder, now in the Downey area in south Los Angeles training for a career in professional poker, found out about it, Mrs. Mitnick was being described as a senior executive at the telephone company. Bonnie Vitello was slight and dark, her round face and brown eyes framed by a thick mass of long chestnut hair. Bonnie's expression in repose approached a frown, but the suggestion of a sour temper would suddenly disappear with an unexpected explosion of glistening white teeth that cast a disarming spell over strangers. Bonnie's smile was her built-in edge. Born in New Jersey, Bonnie was six when her parents moved to Monrovia, about twenty miles northeast of downtown Los Angeles. When the Vitello family moved there in the mid-1960s, the predomi nantly white, mostly conservative city was on the verge of change: gang fights between the recently arrived Hispanics and the entrenched whites were starting to plague the community. Nine years after their arrival, unhappy with the growing racial tension, the Vitello family of six moved south to Rowland Heights, a quiet, arid strip of a town on the eastern fringes of Los Angeles County. Twenty minutes north of Disneyland, Rowland Heights is a community of new condominium subdivisions interrupted occasionally by clusters of single-family homes—an ideal place to start over. A listless student back in Monrovia, Bonnie suddenly became interested in school in Rowland Heights. At her new high school, the teachers weren't busy breaking up gang fights and she no longer had to guard her back. She graduated early and enrolled at a small junior college not far from home. Then interruptions set in, not the least of which was her first marriage, at age eighteen, which lasted just six months. Bonnie's impulsive jump into marriage exacted its price. She dropped out of college and put her academic pursuits on hold indefinitely. At twenty-one she was doing temporary office work when she got an offer to work full-time as a secretary for GTE at its Monrovia headquarters. Reluctantly, she went back to the place she had left so gladly. When the 84 a CYBERPUNK phone company moved its headquarters from Santa Monica to Thousand Oaks, a suburb on the northwestern edge of the Los Angeles area, Bon nie transferred there. Bonnie hated the monotony of clerical work. After several years of filing and typing, with no real prospects for advancement, she put her mind to learning about computers. It was an easy transition for her. Personal computers had made their way onto desks throughout the com pany. When Bonnie was given an IBM Personal Computer, it was with the expectation that she would use it for nothing more than word pro cessing. But the little machine captivated her. She pored over the man ual and learned the machine's every feature. Word of Bonnie's computer prowess spread and she became the department's PC troubleshooter. With GTE paying the way, Bonnie enrolled as an evening student at Computer Learning Center. One night, Bonnie was at the main console learning how to con trol one of the central training computers. The student operators sat at computer consoles, simulating the activity of a large corporate data processing operation: computer jobs were running, the system was monitored and data files were regularly backed up. Suddenly Bonnie saw messages flashing on her screen from someone sitting across the room in a spot reserved for people with full privileges on the system. "Don't flush my file!" came the message, then, "Let my job go first!" "Who is that guy?" Bonnie asked one of the instructors. "Oh, that's Kevin Mitnick," he replied. "Don't piss him off. If he doesn't want you to flush his job, then don't." Bonnie looked across the room at the overweight stranger and smiled. She sent him a reply. "What else do you do besides tell people not to flush jobs?" "I like to go out to eat," came the response. "Would you like to go out?" "I can't. I'm engaged," Bonnie replied. "That's too bad. You have a nice smile," he wrote back. Bonnie had been engaged for six months to an engineer who was a great deal older than she, but the excitement of the relationship's early days had gradually diminished. She considered this for some minutes, then wrote back to him: "Well, I'm not so happy with the relationship." He answered within seconds: "Then maybe you'll go out with me." She was tempted. "Maybe next week," she typed back. Kevin Mitnick's electronic entreaties persisted. For several weeks after KW; 1U b«Uc-&U fM** t 85 that, each time he flashed her a message asking her to have dinner with him, she politely declined. Late one evening, he abandoned the com puter messages and approached her desk, eating something. "Well, ob viously you're not seeing your fiance tonight," he said midchew. "Do you like Thai food?" At that point, although Bonnie had never considered dating anyone quite so bulky, she finally said yes. Over dinner, Kevin asked her where she worked. When she replied that she worked for a phone company, he began to laugh so hard he nearly choked. But he wouldn't explain why. Bonnie found him charm ing and interesting. It surprised her to discover that he was just twentythree, six years her junior; and he professed to be equally surprised that she wasn't his age, as he had at first assumed. He seemed more mature, particularly in comparison with some of the other, younger CLC students who were just out of high school. What was more, he could explain difficult computer and mathematical concepts as no one else seemed able to do. He wasn't boastful, and yet it was clear that his knowledge of computers ran deep. They began to see each other often, sometimes taking a bottle of wine to the beach in Santa Monica on a Friday evening. Not much of a drinker, Kevin gamely swirled his wine in his glass as they talked. And although Kevin had never done much dancing, Bonnie managed to coax him into local discos. When Kevin was around Bonnie, in the early stages of their relationship at least, another side of him emerged. In contrast to the young man who reacted against a difficult and isolated childhood by lashing out at hams, monkeying with people's phone ser vice or reaching for a computer—the one thing that gave him a feeling of control and power—around Bonnie he was easygoing and engaging. Love had its salutary effects as well: Kevin began to drop his excess pounds like so much ballast, and Bonnie watched his body transform into a more appealing shape. Within a few weeks, Bonnie officially dissolved her engagement, and Kevin all but moved into her apartment in Thousand Oaks. It was a small one-bedroom place, but there was enough space for the two of them. Before long, marriage became Kevin's obsession. Every week or so, he asked her to marry him. Something about it felt right to Bonnie. She was ready to accept. When Bonnie joked to Kevin that she was his shiksa—the Yiddish word for "non-Jewish woman"—he asked her what the word meant. A T A 86 a CYBERPUNK Steph Marr had been around computers long enough to know that a good system administrator knows how to read his machine. And some thing was wrong with the system at Santa Cruz Operation. A blind church organist can tell how many people are in the church by the way his music sounds, but he probably can't explain how he does it. A good jockey can tell what kind of mood his horse is in, and can often tell how well the horse is going to run by the way it walks to the starting line. A good computer system administrator develops a feel for the patterns and sounds of his computer. When they are aberrant he always investigates. Computers are supposed to do the same thing over and over again, and when they do something different there is always a reason. The internal rhythm of a computer is seen in the delays in getting a response to typed keys, the staccato sound of a disk arm rat tling, the flickering lights of modems and disk controllers, or the daily routine of log and journal file entries. Named for the Northern California coastal town where the company had its headquarters, Santa Cruz Operation got its start selling a version of the UNIX operating system to run on personal computers. In eight years, Santa Cruz Operation had grown from a father-son consulting start-up to a multimillion-dollar company. Marr was one of the people who worked to keep Santa Cruz Opera tion's network of computers up and running. He had been there for a year, long enough to know that certain users not only had certain privi leges on the system but also had individual habits. Engineers logged on from their homes late at night; secretaries logged on only from work and only during working hours. Steph was sufficiently tuned in to his computer's own circadian rhythms—the times of heavy use and the periodic lulls—to notice an aberration in late May of 1987. Not only did he feel the trouble, but the system was telling him in no uncertain terms that something was going awry: one of the secretaries who used the computer was acting out of character. She was logging in after hours, cruising the system and trying to peek into other people's directories. She was accessing files that had been dormant for many months, including an out-of-date "help" system. When Steph asked her about it, she professed ignorance. Apparently someone had ferreted out her password and was blundering around inside SCO's computers. When Steph realized that an intruder had entered the system, instead of immediately trying to throw him out, he set up an alarm system, and put limits on what the stranger could do. The trespasser must have felt KW: 1U VmJc'&U fM** t 87 the presence of someone electronically peering over his shoulder, watch ing his every move, because a few days after the monitoring started, he typed onto the screen, "Why are you watching me?" "Because it's my job," Steph typed back. Once he had engaged the company in an electronic conversation, the hacker made a request that signified so much audacity that the system administrator knew this was no ordinary intruder. The uninvited guest told Steph that he wanted an account that gave him unlimited privileges throughout the system. By this time, a group of onlookers had formed a half-moon around Steph's desk, and a lively debate ensued over whether or not Steph should give him an account on the company computer. Steph believed his own experience as a hacker on the edge of the law gave him a better understanding of just what motivated this person. In his younger days, Steph had done his share of system cracking. As a college student, his favorite pastime was to slide past the security on university computers, then call the system administrators to inform them of what he had done before they discovered it. He, too, believed in free access to information. But Steph also knew when to stop. He believed in exercising restraint and respecting someone else's right to run a com puter system without having to build elaborate safeguards against out siders. There was something about this person's attitude that made Steph sense that he knew he was breaking the law, and was perhaps even proud of his trespass. A high-level account was out of the question. If Steph gave him such power over other users, and if he was clever enough, the intruder would be able to change the machine's operating system, or even do something as patently malicious as depriving others of the use of the computer. If he wanted to, he could become the electronic equivalent of a mad gunman in a bank, holding the computer hostage. Finally, Steph decided to give him an account that masqueraded as something more powerful than it actually was. The account was called Hacker, a label of the intruder's own choosing. In setting up an account for him, to which Steph also had full access, Steph figured he was erecting an aquarium, in which he could watch every move of this felonious fish. Moreover, letting him lounge around on the computers would make it easier to trace his calls. Within forty-eight hours, Pacific Bell security was doing just that. But when Pacific Bell security investigators started to trace one call, they discovered that somehow the trespasser was wily enough to get access to the phone company computers themselves and block certain commands requesting information about the line he was using. 88 a CYBERPUNK Despite the long hours the intruder was dedicating to wandering through the SCO computer, he appeared to have no discernible quest. He seemed merely to like to prowl through the system, checking out directories but seldom opening files themselves. But after a week or so, the hacker's probing seemed more directed. He fastened onto programs that would allow someone to modify the operating system, but he didn't have the necessary privileges to do so. It was clear after a while that he seemed to have a peculiar goal of modify ing XENIX, a derivative of the UNIX operating system and the crux of the company's business. More disturbing was his apparent goal of trans mitting a copy of XENIX to his own computer. But the owner of the Hacker account gave himself away. The simple oversight that exposed him lay in his use of MCI to gain access. A special MCI feature automatically identified the telephone from which the tres passer's call to the local MCI access number was placed. It was a tele phone in Thousand Oaks, California. A T A When investigators from the Santa Cruz Police Department flew to Los Angeles on the morning of June 1, 1987, to conduct a search at apart ment number 404, 1387 East Hillcrest Drive in Thousand Oaks, years of experience investigating fraud couldn't have prepared them for the odd collection of evidence they encountered. The officers had been told what to look for—computer printouts, a computer, a modem and notes of phone numbers and access codes—but they weren't sure why. When the officers knocked on the front door there was no response, so they let themselves in with a pass key borrowed from the manager of the com plex. Detective Patricia Reedy of the Santa Cruz Police dutifully noted in her report: "On the dining room table was a computer with a black box with multiple small red lights on it. Detective Nagel advised the black box was a modum [sic]. The 'MC light on the modum was lit. Lying next to the computer was a beige touchtone phone with the front plate removed. The computer, the modum and the phone were all hooked together." To prevent anyone from calling the apartment and erasing possible evidence from the computer, Detective Reedy followed what she must have thought was the proper procedure: she removed the receiver from the phone. As she noted in her report, the receiver then "made a loud screeching noise." Any computer crime investigator would have warned her to keep the phone in place, as the suspect might well have been in the process of transmitting data. RW; 1U D«Ul-$Ul WacJIha ▼ 89 As they made their way through the small dwelling into the bedroom, they first encountered large piles of clothing on the floor. On a bedside table they counted fifty-five computer disks, in boxes and scattered on the tabletop. From underneath the bed they retrieved "a book marked 'OS Utilities,' numerous loose sheets of printed materials on computers and a plastic bag containing a large quantity of hand-written notes and computer printouts." They gathered all of it as evidence. Also under the bed was a loaded Charter Arms .38 special two-inch revolver. Inside the bedroom closet the detective found a second, much larger firearm—a Remington .87 shotgun. On the bedroom floor they found two small plastic bags containing what appeared to be marijuana, and a glass bong. They took the items as evidence. When Detective Reedy checked the clothing in the closet, she found $3,000 in $100 bills in the pocket of a man's suit jacket. She initialed each of the bills and left them on the kitchen table. The detectives knew they didn't understand enough about computers to analyze what they had found and decided to call in a computer spe cialist from the Ventura County sheriffs office. "The specialist advised us that what we had in front of us was a computer terminal that had no way of storing information. He explained the black box on top of this terminal was in fact a modum. He was able to put the receiver back on the phone . . . and access into the terminal. He was able to bring up on the screen information that said 'abort.' He advised we probably inter rupted the computer accessing into somewhere else." The search ended at 4:00 p.m. When Bonnie came home that afternoon, she thought they had been burglarized. The computer terminal was gone, as well as the modem, the floppy disks and all of their computer books. But when she saw a stack of $100 bills on the table, money Kevin had been saving for their wed ding celebration, next to a document bearing an official seal, she knew they had been searched. She packed a bag and went out to find Kevin. When she told him who had just been to the apartment, he flew into a panic. One of Kevin's first calls was to Roscoe, demanding to know whether Roscoe had informed on him. Roscoe tried to calm Kevin down and ask him questions. But Kevin was too excited to listen; he began to sound as if he were talking to himself. Should he get out of town? Without waiting for an answer, he kept talking. Then again, he rambled on, he didn't want to leave Bonnie. Should she go too? Roscoe cut him off and told him to get in touch with an attorney. 90 a CYBERPUNK The officers returned to the apartment at 8:30 the next morning. They knocked on the door and got no answer, so they went to interview the manager, Alice Landry, who told them that the tenant in number 404 was Bonnie Vitello, a nice-looking woman in her twenties with a thin build and dark hair who worked at GTE. She said Vitello had had "her brother" staying with her. He was tall, heavyset, nice-looking and clean-shaven. Overall, the manager told the inquiring officers, Ms. Vi tello had been a good tenant, although there had been a couple of complaints about noise from inside the apartment in the evening, the sound of people arguing. The brother, she said, was at home a lot. Later that morning, the officers called GTE's security manager, who verified that Vitello had worked there for several years. That morning she had called in and asked for vacation time. She had said she was moving and would be back the following Monday. Detective Reedy asked the security manager if he recognized the name Kevin Mitnick. Not only did the manager recognize the name, but he rattled off a list of agencies he knew had investigated Mitnick in the past. Mitnick, it seemed, was something of a household name around GTE. Reedy's next call was to the L.A. County district attorney's office, where she was directed to Bob Ewen. Ewen told Reedy that Mitnick had been a suspect in several major computer crimes in Southern California, and that he himself had worked a case involving Mitnick several years before. At one time, Ewen said, there had been a warrant for Mitnick in the office's computer, that Mitnick had found out about it and that he had then fled to Israel. There were no current warrants out for Mit nick, but Ewen believed the FBI was working some cases involving him. In any case, Ewen warned, Mitnick was extremely dangerous, capable of destroying computer systems remotely using "logic bombs." Logic bombs? Israel? Southern California was bizarre enough, but this sounded absurd. That afternoon, the officers called Santa Cruz Opera tion to say they believed they had found the intruder. The arrest war rants that were issued from the Santa Cruz County Court charged both Kevin David Mitnick and Bonnie Lynne Vitello with unauthorized ac cess to a computer, a felony under California law, with bail set at $5,000 each. The officers who had conducted the search described Vitello to the court as "dangerous and bright." And twenty-three-year-old Mitnick was a known criminal with a long list of previous offenses. Three days after the warrant was issued, the suspects surrendered voluntarily at the West Hollywood police station. Once it was established that Mitnick KW: 1U b#Uc-$Ut WkJIha t 9 J had acted alone, Santa Cruz Operation dropped the charges against Bonnie. For all the trouble he had been in through the years, Kevin still had a clean adult record and he wasn't about to let that change; he refused to plead guilty to a felony charge. His attorney asked that, in exchange for Kevin's full cooperation in explaining how he had cracked the Santa Cruz system, the charge be reduced to a misdemeanor. So a misdemeanor it was, with a small fine, thirty-six months' probation and a three-hour meeting between the Santa Cruz Operation computer staff and Kevin Mitnick in the presence of their respective attorneys. When Steph Marr, the system administrator at Santa Cruz Operation, met Mitnick for the first time, he thought he should offer some words of praise. After all, Mitnick had managed to muscle his way into the Santa Cruz Operation computers and, for a time at least, had eluded detection. "Well played, well met," Marr said as he greeted him. But Mitnick barely responded. When Marr asked him a technical question, he re sponded to the Santa Cruz Operation attorney instead. And his attitude as he described his methods was annoyingly condescending. It was hardly the hacker-to-hacker session Marr had hoped for. When Marr got a call a year later from Mitnick asking about a job, it only confirmed that this was indeed a young man with extraordinary gall. Kevin and Bonnie were married that summer, while the Santa Cruz charge was still hanging over Kevin's head. It was a trying time, espe cially the frequent trips to Santa Cruz for court appearances. It wasn't exactly the way Bonnie might have chosen to spend her thirtieth birth day, which arrived just a month after their apartment had been ran sacked by the police. But for all the problems Kevin was causing her, Bonnie still wanted to marry him. She had already been through one big Catholic wedding and she didn't want another extravagant affair, and Kevin didn't seem to mind one way or the other, so they went to City Hall and emerged fifteen minutes later with their vows in place. To appease Bonnie's mother, the newlyweds dressed in wedding garb and went to her house for a celebration party. The couple stood smiling for the obligatory photographs. Bonnie was happy. Kevin had given her a ring and his heartfelt word that his computer shenanigans were forever behind him. If Kevin was planning to make a clean break with his past, it didn't help that he became the primary subject of a Pacific Bell security memo a month or so later. A ham with whom Kevin had a less than friendly 92 a CYBERPUNK relationship happened to work at the telephone company, and read the memorandum over the air. Written by a security manager, the memo detailed the contents of the computer disks found during the search after the Santa Cruz break-in. Describing the events surrounding Kevin's case as "alarming," the manager listed what had been found in the Thousand Oaks apartment: "The commands for testing and seizing trunk testing lines and channels; . . . the commands and logins for COSMOS wire centers for Northern and Southern California; . . . the commands for line monitoring and the seizure of dial tone; . . . references to the im personation of Southern California security agents ... to obtain infor mation. . . ." The list went on. The memo concluded that computer hackers were becoming more sophisticated in their attacks on phone company computers. The author suggested that it was possible that hackers could incapacitate an entire central office switch by overloading it or tampering with the computers that controlled it. The memo also voiced concerns that terrorists or organized crime groups might get their hands on "underground computer technology." When Kevin heard this, he panicked. He had to see the memo. He called Lenny, then Roscoe, who may have stopped his extralegal activi ties but didn't mind being pulled in on the occasional clever hack. The three worked out a plan for getting the memo. Kevin called the secretary in the San Francisco office of the manager who had written the memo and, posing as another security manager, told her he had never received his copy of the security memo. Would she mind faxing it to him? Of course not, she replied, she would be glad to; she even had the number programmed into her fax machine's speed dialer. When she pushed the button to send the memo on its way, she had no way of knowing that Kevin had programmed the number her fax machine was calling to forward the memo to Roscoe's fax machine at work. Roscoe had reprogrammed his fax machine so that when it responded to the secretary's machine, it looked as if the proper fax machine was responding. Even after Roscoe received the memo and read it aloud to Kevin, Kevin wanted to see it immediately. He didn't want to wait and pick it up after work. So he had Roscoe fax it to him at a copy shop in the San Fernando Valley. Roscoe later leaked a copy of the memo to reporters and a story describing its contents landed on the front page of The New York Times. He couldn't resist embellishing slightly the story of how the memo was obtained. He told the reporters that it had been intercepted by tapping KW: 1U b**lc-&U HacU* t 93 a phone line between two Pacific Bell fax machines. Company officials confirmed the memo's authenticity, but said they were mystified by how it had landed in the hackers' hands. A T A The first call from Pierce College came in to the Los Angeles Police Department on the afternoon of February 17, 1988. A Pierce College security officer was on the phone to report that since January 13 two young men had apparently been making illegal copies of software. On that January evening, Pete Schleppenbach, a computer science instruc tor, had walked into the computer science lab and seen a tall, slender man in his late teens or early twenties hovering studiously over one of the system terminals. Schleppenbach was taken aback by the sight of a complete stranger standing so authoritatively in a place clearly off limits. "No Admittance—Authorized Employees Only" warned a sign sus pended directly above the stranger's head. And one would have to be unable to read English to be oblivious to the warning notes Schleppen bach had taped to the terminal, obscuring the screen: "Do not turn this terminal off. Leave it on!" and "Students: Don't use this terminal unless all others are in use!" To see what was on the screen, the young man had taken Schleppenbach's handcrafted monitions and flipped them onto the top of the monitor. Schleppenbach stood and watched the young man—a student? a Digital technician?—as he reached behind the terminal and turned it off, then on. Then the stranger sat in front of the machine as if he owned it and began to type. Schleppenbach approached him. "What are you doing?" he asked. The young man barely looked up. "Just looking," he mumbled. His speech had the tone of someone convinced that his actions were beyond reproach. "What are you doing on the terminal? Didn't you see the signs? You're not a student here, are you?" He shrugged at Schleppenbach. "No, I'm not, but she said it was all right," and, without turning around, he thrust his shoulder in the direc tion of a student employee working in the computer lab. Unsatisfied, Schleppenbach told the stranger to leave. The teacher then asked the student worker if she had given the stranger permission to use the ter minal. She said she hadn't. When he turned around, Schleppenbach saw that the trespasser had not left the room, but was seated at another terminal with someone who appeared to be his friend, a pudgy complement to the rangy, cocksure 94 a CYBERPUNK stranger. Might he be a Digital technician? He looked old enough to be out in the world of gainful employ. The friend seemed engrossed in what he was seeing on the computer screen, and he typed in short, feverish bursts. As Schleppenbach began to approach the two, he saw the slender one tap the shoulder of his friend, who turned around to face Schleppen bach. He turned back to the computer and, as if in a big rush, typed something quickly and got up to meet Schleppenbach halfway across the room. The pudgy stranger spoke first. Friendly and inquisitive, he told Schleppenbach that he and his friend were there to find out about the course Schleppenbach was teaching in office computer networks. Cau tious despite the young man's friendly, almost engaging demeanor, Schleppenbach explained the course's prerequisites, and told them how to register for classes. He told them they shouldn't be using the system unless they were enrolled at the school. "Okay, we were just leaving," replied the heavy one, at once defensive and vaguely arrogant. "We just know a little about Digital computers." When they were gone, Schleppenbach walked over to the computer where the two had been sitting. He saw that a tape was inside the tape drive, and that a light on the drive was flickering to indicate that some thing was being written on the tape. The only person aside from Schlep penbach who was authorized to mount tapes for backup was another instructor. Schleppenbach went straight to the classroom next door, where the other teacher was holding class, and asked his colleague if he had been doing work on the Micro VAX II, a small Digital Equip ment computer. The other instructor shook his head. Schleppenbach rushed back into the lab and saw that the light next to the tape drive was still on. Schleppenbach enlisted the help of one of his students to try to figure out what was going on. They went to a terminal and typed, "show system"; their screen displayed the name of every job running on the computer. When Schleppenbach saw a program called CP.COM, he began to get nervous. Schleppenbach knew that program hadn't been there before, and when he displayed it on the screen, he saw it was a simple seven-line program, a command procedure for making a.complete tape backup of every program on the college's system. At first, Schlep penbach decided the only thing to do was to abort the work of the tape whirring inside the tape drive, but he thought better of it. The backup process lasted forty minutes. When Schleppenbach removed the reel of tape from the drive, he saw right away that it did not belong to Pierce College. When he reloaded the strange tape into the tape drive, he KW; 1U DmI-SUc H^Ui ▼ 95 asked the computer for a listing of its contents. The tape contained a copy of every file in the system. If he hadn't intercepted those two young men in the middle of their task, they would have walked out of the room with a copy of software worth $20,000. It wouldn't have deprived the college of the software, but in Schleppenbach's view it was theft none theless. Schleppenbach figured he had seen the last of them, but for safekeeping he put the tape in a locked room accessible only to faculty. The next morning, he called the chairman of the computer science department to tell him what had happened. When Schleppenbach walked into the lecture room at 7:00 p.m. on February 9 for the first class of Computer Science 64, he was shocked to see the same two youths seated in the back of the classroom, grinning and tapping pens against their desks. They had enrolled. Two days later, Schleppenbach ran into Anne Delaney, the former computer science chairwoman, now a professor in the department. He had hardly finished telling her of the incident with the tape drive when she interrupted him. "It isn't Kevin Mitnick, is it?" He looked down at his class roster. Yes. Kevin Mitnick was one. The other was Lenny DiCicco. Delaney looked stricken. She told him that in 1982 Mitnick had been expelled from the school's computer science program for tam pering with the school's computers. He was trouble. She told Schleppen bach to alert everyone that Kevin Mitnick was back on campus. A T A This was not the first that Jim Black had heard of Kevin Mitnick. Tall and wiry with an appeal suggestive of Montgomery Clift, the forty-sevenyear-old LAPD computer crime detective had loosely kept track of Mit nick for years. When the call came from Pierce College, Black's hunch was that this was more than a simple matter of copying some software from the computers of a junior college. He had heard enough about Mitnick through the years to suspect that he might be up to something big. This time, he wanted to see Mitnick and his friend spend some real time in prison. Black had heard that Mitnick didn't like jail one bit. The detective suspected there wasn't much that would disrupt the young man's impulse to seek control of electronic devices other than a healthy dispensation of justice. He dropped everything to work full-time on the case. Black had begun to specialize in computer crime in 1982, when two embittered employees of Collins Food, a restaurant chain, were accused of planting two "logic bombs" in the company's computers. The insidi- 96 a CYBERPUNK ous software was designed to destroy payroll, inventory and sales records, and it was only a lucky accident that led an employee to discover the potent little pieces of code before they did their damage. Black had begun to handle other aspects of fraud eight years earlier. He was work ing auto repair fraud when he was asked if he'd like to join in the Collins Food case investigation. He spent several years on the case, and although the prosecution couldn't gather enough evidence to convict the suspects, the challenge of working a case in which someone had the ability to do something so destructive without leaving a trace was such an interesting departure from routine investigative work that he moved into the de partment's fledgling computer crime unit. By 1988, Black's division was one of a dozen or so units around the country devoted to computer fraud. Black saw people like Mitnick not just as a general threat to computer systems, but as a personal threat. Mitnick was known to take direct revenge on members of the law-enforcement community. Black spoke with one of Mitnick's former probation officers, who said the telephone service at her home had simply gone dead one day, but when she called Pacific Bell to report the problem, the company told her that according to its computer her service was just fine. It had taken her days to con vince the phone company that her line was really dead, and still longer to get it fixed. Black didn't want to take any chances. He made special arrangements with TRW so that anyone attempting to see his credit rating would have to go through extra steps. The telephone company made similar provisions for Black's home telephone service. The day after the initial call, Black was at Pierce, talking to the staff and administration. That afternoon, he ran a search on both Mitnick and DiCicco. DiCicco's record showed several outstanding traffic war rants. Curiously enough, Mitnick came up clean. Black put in a call to Bob Ewen in the DA's office, and Ewen told him about the Santa Cruz case. When Black called the Santa Cruz Police Department, he learned that Mitnick had pled guilty to a misdemeanor eight months earlier, and was currently on probation. Black pulled driver's licenses for Mitnick and DiCicco, and called the letter carrier to see who received mail at 8933 Willis #13 in Panorama City. The mailman said that Mitnick got mail there. So did Bonnie Vitello, Mitnick's wife, and Shelly Jaffe, Mitnick's mother. Black's next call was to the local FBI office. An agent there said he had gotten a call from the FBI office in Baltimore a few months earlier, linking Mitnick to the penetration of a National Security Agency computer from the Hughes Radar Systems Group in El Segundo, but as far as he knew the KW; 1U V«Uc~$Ut HacUi ▼ 97 L.A. office had no open case on Mitnick or DiCicco. A few days later, Black and a deputy district attorney met with Schleppenbach at Pierce. They told Schleppenbach that before and after each class he should watch both suspects and jot down anything that looked suspicious. Black's next step was to call the local Digital office and describe the problems at Pierce. An engineer from Digital's Los Angeles office took on the job of analyzing the tape DiCicco had left in the college's com puter and monitoring the duo's computer activity at the school. On March 3, surveillance began. Black wanted their every movement accounted for. First, the campus police took up the watch. At 6:30 that evening, plainclothes officer Kenneth Kurtz watched Lenny DiCicco arrive at the computer science lab, sit down at a computer and begin to type. Thirty minutes later, Mitnick arrived. Once Schleppenbach ar rived, the students in the lab moved to the lecture room; DiCicco spot ted Mitnick and sat next to him. For the next hour, the two students watched the instructor, occasionally leaning over to whisper to one another. At 8:00 p.m., both Mitnick and DiCicco bolted from their chairs and beat the rest of the students to the adjacent lab. The officer sat nearby and watched as Mitnick began helping his stumped peers with their assignments. DiCicco got into a conversation with Schleppenbach and, by way of explaining his thorough knowledge of VMS, the operat ing system for Digital's VAX computers, told him that he worked at TRW on a VMS system. Kurtz left a few minutes before class was to be dismissed and waited outside the building for Mitnick and DiCicco to appear. At 9:45 p.m., Mitnick came out and began to walk the perimeter of the computer science building. Kurtz climbed onto a roof and watched as Mitnick reentered the building. About three minutes later, Mitnick and DiCicco emerged together. Kurtz hopped from roof to roof of adjoin ing buildings. He scrambled down in time to see DiCicco get into his small brown Toyota and drive away. Mitnick drove in his car from a separate exit. Black and his partner picked up the surveillance from there. They followed Mitnick's black Nissan Pulsar as it traveled a seven-mile stretch of the western edge of the San Fernando Valley. By the time Mitnick reached a smaller, winding road in Calabasas, the detectives noticed that he seemed to be following another car. Both cars turned into a parking structure beneath a Home Federal Savings and Loan building. The cars parked out of sight, but Black saw Mitnick walk toward the front. He looked up and saw a light go on in a second-story office. A man with dark hair stood in front of the window. The light went out. 98 a CYBERPUNK The officers left just before midnight, making a quick swing through the parking area. The Toyota and the Nissan were the only cars there. For the next month, Black and his partner continued the surveillance. On occasion the two detectives had help from the department's Special Investigative Section, or SIS, which carried out most of the sophisti cated surveillance needed by the L.A. Police Department. Officers in SIS usually busied themselves with violent criminals, and although these two suspects posed no physical threat, SIS was needed to carry out the fine art of successful tailing. With ten to twelve men, two to each unmarked car—Camaros, Volkswagen bugs, and pickup trucks—the of ficers carried out a tag-team approach to its surveillance. As one car peeled off, another picked up, sometimes accelerating to one hundred miles per hour to catch up to the suspects, but always staying at least a couple of blocks behind them. The two suspected software pirates stuck to something of a routine. After leaving the campus on Tuesday and Wednesday nights at about 10:00 p.m., they would drive to the Calabasas office building. They frequently stopped along the way at a Fatburger, an L.A. fast-food chain famous for its tacky decor and gigantic burgers. This Fatburger outlet was squeezed into an L-shaped pink-stucco minimall between a 7-Eleven and a taco restaurant. The two would emerge from Fat burger laden with bags. Judging from the sheer volume of food the two carried upstairs, Black figured they were packing in for a long night. It would have come as a surprise to the two police officers to learn that Mitnick was supposed to be on a strict diet. As far as his wife, Bonnie, knew, her husband subsisted on a low-calorie menu consisting of oatmeal for breakfast, two ounces of turkey for lunch, and a salad for dinner. It was a sensible diet for someone with heart palpitations who frequently checked himself into nearby emergency rooms with chest pains and kept a drawer at home filled with medical insurance claims. Not surprisingly, the regular pit stops at Fatburger had been the downfall of many Mitnick diet plans. Computers and eating went together for Kevin, which was one reason he never managed to fall below 240 pounds for very long. The two police officers got permission to use a residential driveway across the street. They tucked their car as far back in the driveway as they could while still keeping a clear view of the insurance office. Occa sionally, one of the suspects would venture outside, look to his left and right as if preparing to cross the street, then slip back inside. The vigils livened up on the occasions that Mitnick came outside, crossed the KW: 1U bnJc-SUt H*clu* T 99 street, walked a few paces to the Hotel Country Inn and began using the pay phone in the lobby. Mitnick's pay phone sessions would last about twenty minutes. Whatever DiCicco was doing inside seemed to be re lated to Mitnick's time on the pay phone: DiCicco would walk to the landing outside the office and peer down the street toward the hotel. One of the more difficult things to establish was just what office door of the Calabasas building the two suspects were entering. The manager of the Home Federal Savings and Loan branch told Black that neither Mitnick nor DiCicco worked at the bank. There were at least a half dozen other businesses that rented space there. Two members of the surveillance team were dispatched to the roof of the building, where they lay until they figured out that it was the door to suite 101, the offices of a company called VPA, which stood for Voluntary Plan Administrators. When Black did some research into VPA, he found that it was a company that administered disability programs for larger companies. The company used a Micro VAX computer made by Digital Equipment. But notifying VPA that it might have computer criminals in its midst was out of the question. Black didn't know if the company was involved with whatever Mitnick and DiCicco were doing. On March 17, when Black's partner got to work, he received a frantic phone call from Pete Schleppenbach, the Pierce teacher, who wanted to report a bizarre and annoying incident. Five hours earlier, at 3:00 a.m., Schleppenbach had been awakened by a telephone call from a man identifying himself as Bob Bright, an officer with campus security. The officer told the bleary-eyed Schleppenbach that he had just appre hended two male suspects who had been caught wheeling heavy equip ment out of the computer science lab. He described one as tall and slender, the other as shorter and fat. "That's Mitnick and DiCicco," Schleppenbach said. "You've really hit the jackpot with these guys." Schleppenbach said he would come right over. The officer told Schlep penbach that that was a good idea, and that he had just put in a similar call to two other Pierce officials who were also on their way. When Schleppenbach and two other Pierce faculty members arrived at the campus security office, there was no one in sight but one lonely security guard, who said it had been an uneventful evening. There had been no burglary and he had no colleague named Bob Bright. It was a mean and childish trick, but for Lenny and Kevin it had served a useful purpose: now they knew they were being investigated. There wasn't much the police could do except log a mischievous phone call. It was clear that Mitnick and DiCicco weren't going to make J 00 a CYBERPUNK this easy. Black and his partner gathered as much background as they could on the two pranksters. DiCicco, at least, appeared to have a fulltime job at VPA, as his car would usually stay parked in the garage beneath the building all day. Mitnick, it appeared, was unemployed. In March, Black got a disturbing tip. Someone from inside the police department had heard that Kevin Mitnick was getting ready to start a job in computer security at Security Pacific Bank. A T A For anyone with Kevin's record, the Security Pacific job should have been out of the question. When he applied in early March for the opening as an electronic funds transfer consultant in the bank's audit department, he knew the chances of getting it were remote. His reputa tion as a computer criminal was more difficult to shake loose than he had thought it would be. A few months earlier, he had taken a job at GTE as a COBOL programmer. He had worked there for only a week before the security department checked his background. A security offi cer then approached him one day, escorted him to his car and waited to see that he left the premises. It was a humiliating episode. Most of his other jobs had opened for him through family connections. Had the bank managers at Security Pacific known that a computer criminal would be in constant contact with the computer system that executed, moni tored and logged hundreds of millions of dollars of transactions every day, they would have been aghast. Kevin diligently completed the job application. For the standard query, "Have you every been convicted of or are you pending trial for a criminal offense?" he placed a small, bold check next to "No." An unusual collection of references included Donald Wilson, his former employer at National GSC; Arnold Fromin, owner of Fromin's Delica tessen and his mother's boyfriend; and Roscoe. Then, in a surprising concession to the cloak of secrecy he had maintained for the past three years about his time as a fugitive, Kevin tipped his hand. Perhaps to boost his otherwise anemic educational background, he noted on the application that in the winter and spring of 1985, just when the police had him on a kibbutz in Israel, he was a student at Butte College, a twoyear community college in Oroville, a small town in Northern California about 250 miles northeast of San Francisco. Kevin had apparently re mained anonymous by enrolling under an assumed name. Kevin told Lenny that if he got the job at Security Pacific, he would stop breaking into computers for good. And it seemed that he might get KW; Ik Dtok-$Ut H*dciA T WI the job. With a little embellishment here and there, on paper Kevin didn't look at all bad. He listed his job at National GSC, where he had spent so much time on the telephone, as programmer/analyst. At Fro min's Delicatessen, where his primary job was that of a delivery man with a little computer work on the side, he was also a programmer/ analyst. Both businesses were owned by friends of the family who could be expected to give good references. When he received the letter from the bank's personnel office confirm ing an annual salary of $34,000, Kevin was ecstatic. His first day of work, the letter informed him, would be March 25, when he was to report to the training center downtown for an orientation. The last paragraph of the letter was boilerplate: "As discussed, your employment is contingent upon satisfactory reference checks." When Bonnie got home from work, a smiling Kevin told her he had been offered the job. They went out to dinner to celebrate. Black got the tip about Mitnick's new job on March 23. He called the bank's security department immediately. The next day, Black got a call from Peter Kiefer, a Security Pacific vice-president. Yes, he told Black, the bank had just offered Mitnick a job in its electronic funds transfer section. Mitnick was to start work the following day. Late that afternoon, Kiefer and a colleague named Barry Himel ar rived at police headquarters to talk with Black. They presented Black with Mitnick's application and his list of references. They also showed him an article that had been clipped from the Los Angeles Times, dating back seven years to 1981 and telling of three young men, a Kevin Mit nick among them, who had been arrested for stealing manuals from Pacific Bell's downtown computer center in order to wreak havoc on the telephone company and its computer systems. The story had been brought to their attention by a bank employee who knew of Mitnick from his involvement in amateur radio. The worried executives asked Black if this happened to be the same Kevin Mitnick who was about to start work as a security consultant at Security Pacific. By that point, Black's confirmation was hardly necessary. The two security officers had already established a strong link: as one of his references, Kevin Mitnick had listed the true name of Roscoe, one of the three arrested in 1981 for breaking into the Pacific Bell COSMOS center. It was an awkward situation, to be sure. A decade earlier, Security Pacific had been the victim of a historic heist. The thief, Stanley Rifkin, a plump and soft-spoken thirty-two-year-old computer expert, had worked there as a computer security consultant and walked away one J02 a CYBERPUNK afternoon with the day's code for the bank's electronic funds transfer system. Later that same day, Rifkin phoned the wire transfer room and, using a fictitious name, said he was with the bank's international divi sion. He rattled off a few security codes and his $10 million withdrawal sailed through. Rifkin was eventually caught, but the bad publicity sur rounding the bank's security system had stuck with the bank over the years. No one wanted a repeat performance. When Barry Himel called Black the following day, he said Mitnick had been informed in person that the employment offer had been with drawn. Mitnick's response, Himel reported, was simply to smile. There was a pause, then Himel asked: Did Jim Black think Mitnick was the type of person to seek revenge in any way? If he were to seek revenge, Black answered, it would most likely be through his knowledge of com puters and telecommunications. Two weeks later, Black got another call from Himel. He told Black that one of the officers of the bank had just had a call from a news service in San Francisco seeking confirmation and more details about a press release from Security Pacific that had come over the wire earlier that day. The release stated that for the first quarter of 1988, Security Pacific was going to show an earnings loss of $400 million. The only clue Himel had that the release was a forgery was the absence of a customary signoff identifying the source of the story. Of course, Himel told Black, the story was completely false. Apprised of the fraudulent press release, the bank's corporate officers were horrified. The potential damage to the bank if such a release got into the newspapers was incalculable. In plunging stock value and account closures alone, it could exceed the $400 million reported in the fictitious press release. Fortunately, the hoax was stopped in time. Again, Himel paused. Could this egregious act possibly have been committed by Mitnick? It was possible, Black replied, but he couldn't verify it. Nobody ever could. Computer crime cases were notoriously difficult to investigate, and that was part of the appeal for Black. The little evidence that could be gathered was difficult to tie directly to a suspect. Companies and univer sities whose computers had uninvited nocturnal visitors could produce dozens of pages of computer printouts covered with blatant evidence of the intrusion, but they didn't necessarily add up to much in the way of evidence. Telephone traps were useful only as far as they went: intruders such as Mitnick who had started out as phone phreaks were expert at covering their tracks. When someone like Mitnick got into a telephone company computerized switch, he could treat the vast telephone net- KW; 1U b**k-$Ut fM** t j 03 work like a series of disappearing stepping-stones, manipulating the ma chines to create fictitious billing numbers and forward calls to nonexistent telephones. Black saw computer crime as the ultimate challenge. Not only was the technology interesting, but he enjoyed thinking about a computer criminal's mind-set. Computer criminals hardly fit the common profile of an outlaw. The old investigator's axiom, "We catch only the dumb ones," seemed to break down when it came to computer crime. There were no dumb ones. More often, they were caught because a friend or an associate snitched. Black believed that Mitnick and his circle had been snitching on one another for years, stretching all the way back to the COSMOS incident, but the original gang Mitnick was involved with appeared to have long since split up. Susan Thunder hadn't surfaced for a few years. After a prostitution arrest in 1982, followed by a bizarre incident in 1984 in which she and a friend tried to spring their friend Steven Rhoades from jail by impersonating a deputy district attorney, Susan had apparently given up her computer security consulting in favor of beating the odds at professional poker. Both Roscoe and Rhoades seemed to have gone straight by this time, and as far as Black could tell, neither of them was involved in this incident. Black had never worked directly on a case involving Mitnick before, but Mitnick appeared to be one of the few old phone phreaks, perhaps the only one, who had kept his skills honed. From experience, Black knew that this was a case that would require a lot of close cooperation from Pacific Bell and Digital Equipment. Not only was Pierce College using Digital equipment, but this VPA outfit was as well. Black had little doubt that Mitnick had devoted hundreds of hours to refining his talents on Digital computers. Black knew that Mitnick's technical ability far exceeded that of most investigators, especially those unschooled in the subtle art of exploring computer crime. The Santa Cruz Operation incident was a case in point. Black and his colleagues had been stunned to hear of the careless way in which the Santa Cruz police detectives had conducted the search of Vitello's apartment. Why hadn't anyone told them not to take the phone off the hook? Now that Black knew where the two suspects were working from, he asked Pacific Bell to put a dialed number recorder on the VPA phone to register outgoing calls. After eleven days of bureaucracy bashing, Black was able to get the tap. It yielded a number of surprising calls: several to nonworking, unassigned phone numbers; others made to the MCI local W4 a cmmiNic access using pirated authorization codes. Among the most interesting calls were those made to a New Jersey Bell COSMOS computer similar to the one Mitnick had been caught breaking into at Pacific Bell seven years earlier. There was also a call to a New York City-based subsidiary of Security Pacific. Called Precision Business Systems, this company managed data communications for the West Coast bank. The FBI's New York office had recently been investigating a possible wire theft case involving Security Pacific: in early April someone had attempted to get into the bank's secured data communications lines. Although Black thought he had enough evidence from the Pierce incident to nail Mitnick and DiCicco on computer fraud charges, he kept holding out for more. While intriguing, the Precision Business Systems lead was still too sketchy. Black wanted enough evidence to warrant a substantial prison sentence and he hoped to get it from the VPA surveillance. But in late summer, another case forced him to put the investigation on hold and end the surveillance temporarily. In the meantime, Pierce College had brought its own case against Mitnick and DiCicco. The college held a disciplinary hearing for which the two suspects put together their own defense, exhibiting enough legal acumen to draw the hearing out to an exhausting twenty-one hours. When Black set aside the criminal case, they were appealing their ex pulsion. It had been a frustrating exercise for Black. These investigations hinged on the close cooperation of law-enforcement agencies and com mercial institutions working together against a common foe. The detec tive had hoped for instant help from both Pacific Bell and Digital Equipment. Instead, Pacific Bell's bureaucracy had stonewalled his ef forts. And although he had received immediate help from the local Digital office, Black couldn't seem to get the attention of security people at headquarters in Massachusetts. He hadn't been able to trace any of Mitnick and DiCicco's outgoing calls to a major computer system. Still, he was sure that somewhere out there a computer system admin istrator was having Black's problem in reverse, wondering who the invader could be. A T A When Lenny began his job at Voluntary Plan Administrators in May of 1987, Kevin had no reason to visit: there were no modems. And even though Lenny kept the news from Kevin when the company bought modems that summer, Kevin somehow figured it out. Just as a well-fed KW; 1U M-&U HacU* t j 05 cat learns to run to the kitchen at the sound of a can opener, Kevin started showing up regularly at VPA. The company, it turned out, was an ideal place from which to practice his craft. As one of the principal computer operators there, Lenny had the run of the place once everyone had left for the day. But things were beginning to sour between them. Lenny knew Kevin's capacity for threatening people. He had already threatened to turn Lenny in for creating the fraudulent identity that got Lenny the flower delivery job. But there was more to it. It was also a classic form oifolie a deux: Kevin could appeal to criminal aspects of Lenny's nature that might have remained unrealized if the two had never met. Also, in Lenny Kevin found someone with the flashes of intuition that Kevin lacked and that were so necessary for their work. Lenny too had become addicted to the excitement of breaking in to computers. Kevin had stolen, or at least tried to steal, software in the past. Now he had a major project in mind: the acquisition of Digital Equipment's most important software, the latest version of the company's VMS op erating system. Lenny became project assistant. They started out from VPA in a low-key fashion. The first thing they established was a way into the Arpanet, the vast research and military computer network. The duo found an account at Patuxent Naval Air Station in Maryland. For a few months in the summer of 1988, Kevin and Lenny used the Patuxent computer as a convenient storage locker for the software they were stealing electronically. When system managers at Patuxent noticed something was going on and closed the electronic doors, the two looked for another place to stash their data. They found it a few weeks later, when they sneaked back into USC's computers. A T A Mark Brown noticed immediately that someone was in the system. Ex cept for the highly publicized degrees-for-sale incident three years earlier in 1985, nothing very damaging had happened to the USC computer system in the past few years. Brown was now manager of research and development for USC's computing services, and he had all but forgotten about the two teenagers who had so boldly waltzed onto campus and broken into the system six years earlier. But now, someone was dialing into the USC system from off campus. Having found a bug in the system program, the intruder was able to modify the VMS operating system subprogram that acted as the com puter's gatekeeper. Brown had to admit the trespasser was extremely 106 a CYBERPUNK clever. Somehow, the electronic interloper had altered the program that supervised user log-ins so that every time someone logged in to the computer, a copy of the password was slightly jumbled and stored in an innocuously named place inside a file. And he had altered the program so it left open a "back door" that allowed him to return any time to harvest passwords. But there was a flaw. In trying to cover his tracks at the same time that he was installing his rogue code in the system, the thief occasionally crashed some of the USC computers accidentally. Users around the campus, of course, simply assumed that the system had crashed. It was the sort of annoyance that users expected from time to time. But Brown could tell that these crashes were connected to the break-in. From what he could gather, he had fallen victim to the infamous West German Chaos Computer Club, which had achieved international notoriety that fall after claiming responsibility for a summer of poking around inside NASA's SPAN computer network, an international web of computers used by scientists for space and physics research. The Chaos Computer Club had attacked the NASA VAX computers using the very same software trick. They called their program "the loginout patch." Who ever was breaking into USC wasn't just installing the loginout patch, but was using the school's computer as a launchpad to break into other computers on the Arpanet. That was precisely what Chaos had done on the SPAN network. And since most of the activity seemed to occur in the late afternoon and early evening, it made sense that West German troublemakers would be at work late into the night from Hamburg or Hannover or Berlin, or wherever they lived. A second odd occurrence left Brown even more concerned. Soon after the break-ins started, he noticed that disk space was disappearing from a USC computer with thousands of user accounts dedicated to coursework in physics and chemistry. Huge chunks of storage capacity, forty mega bytes at a time—the equivalent of dozens of textbooks—were being eaten up with no corresponding files to account for the missing space. After a few days of pulling apart the operating system in a hunt for the source of the mysterious problem, Brown finally figured out that the intruder was creating files and disguising them as system index files, which are directories that describe other files—the last place anyone would think to look. When Brown opened the files to examine them, he was amazed. Someone was salting away the source code—closely guarded original programs—for Digital Equipment's proprietary VMS operating system. Km*: 1U M-tUt H**U* t j 07 Brown didn't want simply to lock out a trespasser who had entered privileged accounts and seemed to know the operating system. There was no telling what might happen if USC locked him out. It might make him angry enough to find his way in again and start doing some real damage—deleting files or crashing systems. Software designers write source code in what are called high-level languages. A translator, known as a compiler, then converts the highlevel code to binary form—ones and zeroes that can be understood by a digital computer but are difficult for humans to decipher. Computer companies guard their "human readable" source-code files as if they were the crown jewels. Only the binary code, which cannot easily be under stood or modified, is distributed to customers. In this, computer compa nies are like a master chef who serves a six-course meal without giving away the recipe. A competitor can easily copy a computer's hardware, but recreating the operating system that runs on that computer is a far more difficult and expensive undertaking. Companies guard their source code not only because they're worried about competition, but also be cause access to source code makes it easier for a saboteur to open a secret back door into the computer, known as a Trojan horse. A Trojan horse is a seemingly innocent program planted inside a computer that is de signed for a special purpose, such as capturing passwords or even destroy ing data. It is often difficult to tell that a change has been made. Access to source code can make the planning and execution of Trojan horses easier. The thief was stealing Digital's lifeblood, millions of lines of software that run on most of the VAX computers in the world, and electronically stashing it in the USC computers. Furthermore, whoever was doing this wasn't just taking any old VMS code; he was copying the very latest version, called VMS Version 5.0. And the only place from which he could have been lifting this software was a group of development com puters at Digital's laboratory in New Hampshire. Version 5.0 was so new that Digital customers themselves didn't have it yet and would even tually get only parts of it on microfiche. Perhaps the intruder had man aged to break into Easynet, Digital's internal network, which connected tens of thousands of Digital computers around the world. From Easynet, the interloper must have found a gateway to the USC machine on an academic network. Brown guessed that this thief was keeping his loot on ice at USC because he didn't have enough storage capacity of his own or he didn't want to be caught with the stolen goods. Every time the pilferer logged J 08 a CYBERPUNK out, Brown opened the files to see what was in them. He watched in amazement as Digital's trade secrets scrolled by on the screen. Within just a few weeks, many megabytes of disk space had been consumed in the process of stashing stolen material in the illicit treasure chest. But when Brown called Digital's security department about the theft taking place seemingly under the company's nose, he was surprised again, this time by the lukewarm reception he received. He could un derstand that the world's second-largest computer manufacturer, with tens of thousands of customers around the world, including a growing number of banks and government agencies, wouldn't be eager to have it widely known that some thief was breaking into its computers and mak ing off with its most prized software. After all, what did that say about the safety of information stored on the customers' computers? But Brown wanted to stop this thief and assumed Digital would rush to offer its full support. He was hoping that the company would arm him with some high-tech monitoring technology that would enable him to peek elec tronically over the invader's shoulder while he was in the act of burying his plunder. He had heard that Digital had special programs that allowed a system operator secretly to watch people who were on the system in real time—that is, while they typed. When he called the local Digital office, he explained the situation. "Look, we've got this guy breaking in here," Brown said, "and it's pretty big time. He's got some of your sources." Brown asked if he could get one of the company's monitoring programs. He was told to wait for a return call. The call came from Chuck Bushey, the chief security investigator at Digital headquarters in Massa chusetts. But instead of offering to send a team out to Los Angeles to investigate the situation, Bushey asked for an account on the USC system so that his experts could look things over themselves. He prom ised he would send Brown the monitoring programs he was asking for. But the software never came. From that point forward, Brown felt that the matter had drifted out of his hands. Digital didn't seem exactly to be denying that someone had penetrated the very core of the company, but the company wouldn't acknowledge, to Brown anyway, the gravity of the situation. From his conversation with Bushey, Brown got the impression that Digital was somehow trying to brush the matter off. It was like dealing with the Pentagon. Brown surmised that while the security people appeared phlegmatic, software engineers back in Massachusetts were madly scamp ering to plug their security holes. KW; 1U Dmjl-&U \\AckA, t j 09 The Digital security experts seemed much more concerned with the lax security all over Easynet—it wasn't called Easynet for nothing— than with the fact that the company's source code was being stolen. Brown could have built his own VMS monitor, a program for watching the intruder's keystrokes while he was on the USC system, but it would have been time-consuming and tricky. VMS was an esoteric, user-un friendly operating system; it wasn't built for customers who liked to tinker under the hood. It was built for large commercial and scientific customers who were content never to touch it because they expected Digital to handle their problems. So after a handful of unsatisfying encounters with the people in Mas sachusetts, Brown threw up his hands and decided to let the intruder keep his millions of characters of disk space and have at it. After all, he didn't seem to be hurting anything on the USC computer. And although this was a lot of space to be giving to some uninvited guest, it wasn't more than an engineering graduate student might use up in one night. All he could do, Brown decided, was to keep careful logs of what he was able to see. The intruder became bolder. He was beginning to use the USC system as a way into other computers more frequently. So Brown shut down access to his privileged accounts on the system. And no sooner had he done that than the Brian Reid hoax happened. Chris Ho, who worked with Mark Brown at USC, got a telephone call one afternoon in August from someone who identified himself as "Brian Reid from Stanford." "We're having a break-in here, and it looks like he's coming from USC," said the caller. "We need a privileged account on your system so we can track him down." "Sure," Ho replied. "Just give me a number where I can call you back and we'll set it up." "I'm not in my office right now." "Oh, then give me a time when I can reach you and I'll call you back then." "I'll have to get back to you." With that, the caller hung up. Chris Ho was more than a little skeptical of the call he had just received. He called Stanford at once to check on Brian Reid, a Stanford computer science professor. A secretary in the computer science depart ment told him that Reid had left Stanford to work at Digital, in the company's Western Research Lab in Palo Alto. Ho's suspicion con firmed, his curiosity led him to follow through. He called the Digital J JO a CYBERPUNK office in Palo Alto, and after several days of leaving messages and im ploring secretaries to get Reid to the telephone, he finally succeeded. Reid needed to utter no more than two words for Ho to detect the difference between Reid and the impostor. Where the timbre of Reid's voice was deep and resonant, the earlier caller had spoken in a much higher pitch, as if each word got trapped in his larynx before escaping from his mouth. No, Reid assured the anxious USC worker, he had not called Chris Ho, and yes, he had been aware of the break-ins at Digital for months. After the phone hoax drew new attention to USC's plight, coopera tion from Digital improved considerably. In October, Bushey flew out to Los Angeles and met with Brown and Ho. But Bushey seemed interested only in logging the intruder's every move. And Brown knew what that would mean: late-night vigils for the next two months, or until whoever was using USC as an electronic warehouse was caught. He wasn't exactly eager to lose weeks of sleep to help Digital, but he agreed to keep a watchful eye on the situation. A T A Lenny had always enjoyed the aspect of traveling through computer systems that made him feel like a fearless explorer. He liked the idea of having computers throughout the world at his fingertips. The most ex citing thing about playing around on the Arpanet military network hadn't been so much the information it contained; it was the act of roving itself. Lenny's hacking may have kept him cooped up for days at a time in the VPA office, or in the Hiway Host Motor Inn, but at the same time it broadened his world far beyond the San Fernando Valley. The Arpanet was the granddaddy of all computer networks. Started with United States military research funding in the late 1960s, the network had served as the technology testing ground for the commercial computer networks such as Tymnet and Telenet that were to follow. The Arpanet originally linked universities with corporate and military research facilities. By 1988 the Arpanet had largely been subsumed in a growing thicket of commercial, academic, scientific, government and military networks known collectively as the Internet. The Internet joined individual networks together via computerized gateways so that it was possible to travel electronically almost anywhere in the industrialized world. With the advent of computer networks, the traditional sense of geo graphic space as it was known to explorers of earlier times was becoming KW: 1UM-SU*y«k* t in obsolete. It had been replaced by a different notion, the idea of cyber space. Traveling from a computer in suburban Los Angeles to a computer in Singapore was a matter of typing one command on a keyboard. It happened instantly. In fact, distance on the Internet was so transparent that a computer located in Southeast Asia would appear no different than a computer in the next building or in the next county. They would merely be different numbers on a computer host table, a listing of com puters on a network. As it happened, Kevin and Lenny's favorite computer manufacturer was also a pioneer in computer networking. At Digital, networking really meant remote computing—the freedom to move work around the net work from one computer to another. The company also tried to make it easy for an engineer in Massachusetts to work on a set of data in Califor nia. Networking among Digital computers was built around simplicity, uniformity and ease of use. . In 1984, Digital built its own internal corporate network, the Easynet. Eventually the Easynet would connect thirty-four thousand Digital com puters in more than twenty-five nations, giving direct access to nearly two-thirds of the company's 120,000 employees. Easynet has made Dig ital the world's best-networked corporation. Engineers in Germany, Japan and the United States share design work and rally support for project proposals. Employees also send messages directly to Digital pres ident Ken Olsen. So it wasn't surprising that Easynet became a favorite playground for Kevin and Lenny. Since it was strictly a VMS system, as opposed to the UNIX-heavy Internet, Easynet spoke their language. And for two young network explorers with an eye toward procuring Digital's proprietary software, Easynet was the perfect transportation me dium. Once they were on one computer in the network, they could connect to any other. When Kevin and Lenny penetrated Easynet, Lenny was as excited as he had ever been. Later, Lenny would say that his breaking into com puters with Kevin was "like we were boldly going where no hackers had gone before." But to Kevin "it was just a task, like coming to work every day, just to get the job done." While Lenny seemed content to scamper from one computer on the Easynet to another like a puppy, sniffing at each new one, Kevin considered their computer system cracking a seri ous endeavor with a series of discrete goals. In fact, for as long as Lenny could remember, Kevin had always approached his illicit computing as a serious project. When he sought revenge on someone, it was if he were taking on an assignment from some invisible employer. Once an assign- 112 a CYBERPUNK ment was complete, he reported back to Lenny or Roscoe with news of his triumph. As early as 1981, Kevin would call Roscoe to report the results of a frontal assault on the telephone service of someone he was out to harass. Kevin's project for 1988 was downloading Digital's VMS source code. It wasn't so that he could make pirate copies and sell them. Rather, it was both the challenge of the hack itself and his intellectual curiosity about such a complex and advanced program. Kevin's heavy phone use had just gotten him fired from a small firm near Thousand Oaks that made electronic testing equipment. He was sleeping until at least 11:00 every morning and would usually put in his first call to Lenny around noon. Around 3:00 in the afternoon, Kevin would instruct him to get started with a particular task. Then, at about 7:00, on the days they didn't have class at Pierce, Kevin would show up at VPA, and after dinner they would return for a night of network exploring. As the night wore on, Kevin's pocket pager sounded every hour. It was Bonnie, wondering where her husband was. He lied and said he was taking an evening class at UCLA. Kevin's lack of account ability to his wife didn't seem to matter to him. One of the first orders of business on these evenings was to go into a large telephone wiring closet on the ground floor of the building and connect VPA's modem line to another tenant's phone. To someone checking toll records, it then seemed that calls were coming from an other business. By now, Kevin had refined this technique, prompted in part by his increasing knowledge of how the police and telephone secu rity forces worked, and by a growing paranoia. He regularly checked to make certain there were no dialed number recorders on the line he was using. And to be extra safe, Kevin and Lenny looked for an untraceable way to make long-distance calls. Like many other hackers and phone phreaks, they frequently used illegal MCI calling card numbers. Most phreaks would "scan" for them—that is, they would program their com puters to have their modems keep dialing a local MCI port and enter different codes until a successful code was found. Purloined codes were traded on electronic bulletin boards or "code lines," toll-free voice-mail numbers that had been discovered by hackers and modified to dispense pirated calling card numbers. But Kevin, in his inimitable way, had perfected a method for obtaining telephone credit card numbers with great efficiency. He later told the FBI that he had obtained the password for the network security account on MCI's electronic mail system from an electronic bulletin board. But Lenny knew that Kevin had talked someone out of the password, using his excellent social engineering skills. Once logged on to the MCI network security account, Kevin and Lenny were privy to confidential information about new accounts, stolen accounts and accounts that were in a state of limbo until MCI actually discontinued them. They could also read electronic messages concerning security breaches. It was a fertile field from which to harvest account numbers, as well as an early warning system to subvert the security types. Kevin guarded the MCI network security account from Lenny as if he were in possession of the Hope Diamond. "This is something I could make money with," he would tell him. Slipping into Digital's Easynet was a little like discovering the mother lode. All of the company's private discussions were carried out over the worldwide network. Using relatively standard tricks, Kevin and Lenny collected passwords. For instance, when a machine is first set up, there are a few preestablished accounts with preset passwords for the conve nience of Digital's field service people. Each such password gives access to that account's electronic mail. Once Kevin and Lenny had found these passwords, they used Kevin's gift for intuiting how organizations functioned and who was important in an organization. An untrained but instinctively expert social scientist, Kevin could look at patterns of com munication in stored electronic mail and figure out who had power and who had valuable information. In that way, they found the mail that was worthy of their attention. Andy Goldstein's mail was by far the most informative. Goldstein was regarded by many as the most brilliant technical expert in the VMS engineering ranks. He was also a VMS security expert. As a result, most messages about VMS security problems eventually ended up in Gold stein's mailbox. One of his correspondents was Neill Clift, a researcher at Leeds University in England. From what Lenny and Kevin could tell, VMS security was a hobby of Clift's; he seemed to spend hours plumbing the depths of operating system arcana in search of security flaws. Clift was a prolific electronic correspondent. Most of his messages to Gold stein concerned problems with VMS security. And every time he de scribed a new flaw to Goldstein, Kevin and Lenny drank in every word. It was while snooping through Andy Goldstein's electronic mail that Kevin and Lenny found the infamous Chaos Computer Club loginout patch. From what Kevin and Lenny could decipher from the mail to Goldstein, it seemed that someone in Europe had broken into a Euro pean institution using the Chaos patch. The victimized company had 114 a CYBERPUNK made a copy of its entire system and sent it to Digital to analyze. Gold stein, it appeared, had analyzed the program, extracted the portion con taining the rogue code and reverse-engineered what the Chaos Club had inserted. After stealing Goldstein's analysis from his mailbox, Lenny and Kevin puzzled for days over the unexpected prize that had landed in their hands. From what they could tell, someone from Chaos had changed loginout, the program for logging in and out of the computer. Chaos had modified, or patched, the program so that each time a password was entered a copy of the password was sent to a spot in a remote corner of the system, where it sat unnoticed until someone came to retrieve it. Lenny and Kevin couldn't believe their luck. A program to steal any VMS password, courtesy of Digital! Not only was the loginout patch small and smooth, but it had an added feature that made the user's presence difficult for the system to detect. To further confound Digital's computer security experts, the loginout patch had been written in such a way that it successfully eluded ordinary techniques to detect software that has been tampered with. Thus no standard computer security alarms were set off by the program when the patch modified the computer's operating system. A system operator would never realize something was amiss. In fact, the patch was written so well that Digital officials had little notion that their machines had been so thoroughly compromised. Kevin and Lenny were delighted by this bit of serendipitous international cooperation. More than that, they were in awe of the Chaos Club for its ingenious hack. They had been calling themselves "the Best," but now that they had seen this, they amended their epithet to "the Best in the West." So USC's Mark Brown had been right after all. However, it wasn't the work of the Chaos Club itself he was seeing, but that of a pair of the club's admirers who had discovered and were using one of the club's cleverest hacks. The Chaos Club's famous hack into NASA's worldwide SPAN com puter network in the summer of 1987 had been a public-relations calam ity, both for NASA and for Digital, whose computers were the foundation of the SPAN network. For months, members of the Chaos Club had foraged through hundreds of computers on SPAN. By exploit ing an embarrassingly obvious hole in VMS, the cocky group of young computer anarchists had first broken in to the CERN physics laboratory in Switzerland, then electronically hopped over the Atlantic to Fermilab in Illinois, and continued on to hundreds of computers on SPAN. When the incident first surfaced after Chaos held a press conference to an- Ke**:lkM'$UtH*«tu+ ▼ 115 nounce its accomplishments, it revived some concerns that were first expressed following the 1983 release of the movie WarGames. The film, which depicted a teenager who played havoc with a North American Air Defense Command computer, roused widespread speculation that bright kids could somehow compromise U.S. national security. In what seemed to be a similar situation, the infiltration of SPAN by Chaos implied to the public that SPAN was a sensitive military network. This proved not to be the case; nevertheless, it was more than an embarrass ing incident for NASA and for Digital. The company suffered a corpo rate black eye. Nothing like this had ever happened to computers made by International Business Machines, Digital's principal competitor. Digital could ill afford bad publicity. The company was under fierce competitive pressure, moving thousands of employees from assembly lines and corporate offices into the sales force in an effort to slash costs and boost sales. For nearly a decade Digital's strength had been its sturdy, steady seller, the VAX, a potent force against IBM. But by 1988, the pace of technology was forcing Digital to seek out new markets while continuing to satisfy its traditional customers. Digital was locked into a race, scrambling to bring out new products and rebuild the VAX line. The computer industry was no longer growing exponentially, particularly in the minicomputer business that Digital had long dominated. Instead, the markets for personal computers and workstations were still expand ing, but the company had stumbled badly in the PC business. To get back on course, Digital was going to have to go after a more commercial market than it had served in the past. Financial institutions were a new major target and they would hardly tolerate potential flaws in the security of the machines they were buying. So the company remained as quiet as possible about the NASA incident. It patched the loopholes and tried to tighten security. As it turned out, its efforts were less than successful. The loginout patch was written so cleanly that Lenny and Kevin had to modify it only slightly to install it on the newer version of VMS used in the United States. Once they had done that, they were ready to insert their new Trojan horse. In the ensuing months it was to become their most valuable electronic crowbar. Kevin and Lenny dubbed it their "super-duper password scooper." A T A But even before Lenny and Kevin discovered the loginout patch, they had used Kevin's wiles to get access to the company's VMS development cluster. 116 a CYBERPUNK Digital's largest software development facility is a complex of buildings in Nashua, New Hampshire. Three of the Nashua buildings are at 110 Spitbrook Road and are code-named ZKOl, ZK02, and ZK03. The ZKO complex is the software capital of the company. It employs about two thousand people—more than half of them programmers—and has more than three thousand computers on-site, thirty of them mainframes. There is a heliport outside that employees can use to travel to other major Digital facilities or to Boston's Logan Airport. ZKO is set in the middle of a stand of hardwoods, near a pond. It's at least a quarter of a mile to walk indoors all the way from one end of the complex to the other, and as you walk down the hall you look out at landscape that probably hasn't changed much since the days of the American Revolu tion. It's an intriguing mixture of moods, and the floor-to-ceiling win dows along the hallways manage to blur the boundary between modern high-tech and hardwood forest. Managing three thousand of anything can be tricky. People who man age large collections of computers typically organize them into groups, and into groups of groups. Fred Brooks, the chief designer of IBM's OS/ 360 operating system, made a shrewd observation some time ago: the structure of a computer system almost always mirrors the structure of the human organization that created it. As a result, the VMS computers in Digital are largely organized into groups that correspond to the manage ment structure: people who work together cluster their computers to gether under a single administration. However, technical peers work across the grain of the organization and often give one another privileges on their own machines. . The Star development cluster of VAXes in the ZKO complex was where all of Digital's VMS development work took place. Late one night, soon after Lenny started at VPA, Kevin stationed Lenny at VPA and, from a pay phone, called a graveyard-shift operator in the Star control room. Posing as a technician in the field, Kevin had her walk over to the console and type in a single command that seemed harmless enough to someone without an intimate knowledge of VMS. Without hesitation, she logged in to the computer, thereby spawning a new process. A dollar-sign prompt appeared on Lenny's screen, the signal that he could now type in the privileged commands reserved for a Digital operator. But the full import of where Kevin and Lenny had landed eluded them at first. Kevin wasn't so interested in hanging around to check out the development cluster. It looked a lot like any other VAX system. Instead, once they were in, Kevin invoked his personal battle K W : T & D m M ^ W * ^ * ▼ 11 7 cry: "Get priv'ed, set up, move on." Setting up was a matter of creating an account for themselves so that they could get in at some future time. Who knows, the reasoning went, when access to the company's devel opment computers might be useful? Only gradually did it dawn on Kevin that they had achieved their ultimate goal. Breaking into the development cluster could give them unlimited access to the VMS source code. But even though they were inside the temple, there were still obstacles. They needed to transport the software to some safer haven, some secret location. In order to acquire the source code in such volume, one of the things the two data hijackers needed was a high-speed gateway through which they could transfer the programs. Relying on their relatively low-speed modems at VPA would have been like siphoning the ocean through a straw. Just as important, they needed to find a link from Easynet to the outside world. Digital's computer network was not, as a rule, connected to the outside world. But there were some exceptions. Digital's Western Research Lab in Palo Alto, it turned out, had just the gateway they were looking for. Established in 1982 by a group of defectors from Xerox's Palo Alto Research Center, DECWRL, as it was called (pronounced DECK-whirl), represented Digital's future, a computer science labora tory where researchers experimented with the most advanced ideas in computing. The Palo Alto lab was composed of about twenty-five people in a fourstory streamlined brick building that also served as Digital's western headquarters in the downtown section of Palo Alto, an upper-middleclass community next door to Stanford University. The Western Re search Lab seemed more like a Silicon Valley start-up than a corporate outpost. The lab was also one of the few UNIX havens in Digital's otherwise VMS-dominated universe. It was logical that the researchers at DECWRL would want to work with UNIX, specifically Digital's ver sion called Ultrix; not only had they grown up with UNIX, but in their frequent cooperative research with university scientists, UNIX was the common denominator. And there are other things that make UNIX attractive: it is highly "portable," which means it can run on almost any type of computer, from an IBM PC to a Cray supercomputer. VMS, on the other hand, is confined to VAX computers. UNIX, which was in vented by two computer researchers at AT&T's Bell Laboratories, has gradually become a standard for scientists, engineers and universities. Scientists at the Western Research Lab were experts in the UNIX oper ating system, though they held a grudging respect for VMS. 118 a CYBERPUNK Also at Palo Alto was the Digital Workstation Systems Engineering Group, a small group of designers inside Digital who were working around the clock on the next-generation workstation, Digital's first ma chine ever to be designed solely for the UNIX operating system. It was being built outside Digital's traditional development process and the company wanted to get the machine out as soon as possible in order to remain competitive with smaller, younger companies, such as Sun Mi crosystems. The new workstation's code name was PMAX. High-speed network gateways may have been common at large uni versities and research laboratories, but they were found less frequently at large corporations. Most IBM sites have no direct connections to the outside world, mainly for reasons of corporate concern about security, and those with connections can only dial out to other computers—they cannot accept incoming calls. The Digital gateway in Palo Alto, with links throughout the world, was extraordinary in its very existence. It could crank data in and out at 56,000 bits per second, which is the equivalent of transmitting all of Moby-Dick in less than two minutes. Its purpose was to put the research of Digital's computer scientists closer to research that was going on at places like Stanford and Berkeley. Having good network connections mattered to a computer scientist in 1988 the way a properly equipped kitchen would matter to Julia Child. As part of the international research community, sharing ideas and papers and ongoing research with counterparts around the world, the Palo Alto computer scientists believed it was necessary to have direct connections to the global Internet. And in recognition of the open-mindedness back at corporate headquarters, the computer scientists in Palo Alto took great care to operate their precious gateway responsibly. To give the best possible oversight both for maintenance and security, Ph.D.'s in com puter science took turns poring over daily log files, a job usually per formed by administrative staff. So it was only a matter of hours after the intrusions into the Palo Alto computers began that the gateway watchers there noticed something amiss. The Palo Alto scientists who monitored the gateway—Brian Reid and Paul Vixie—decided they were dealing with experts. Sometimes the intruders came into Digital over a phone line, as an employee might dial into the company's computers from home. From there, they knew how to get access to Easynet. From Easynet, they could connect to any of the small VMS computers in the Palo Alto building, often a desktop work station, where they experimented with passwords until they managed to log on. Once they had logged on, they exploited weaknesses in VMS to Kt**: 1U DMk-ZUt H*J** t j 19 gain privileges on the small system. And once they had done that, they would commandeer the small computer, forcing it to masquerade as a larger system on the network, some users of which would have expanded access rights. This is a method known as "network spoofing." At the same time, the intruders would plant their Trojan horse, a modification of the loginout program, and capture user passwords, and then take ad vantage of the natural tendency for people to use the same password on all the systems on which they worked—whether VMS or UNIX. A T A The intruders' objective was to log on to the gateway computer—an Ultrix machine called Gatekeeper, named for a character in the film Ghostbusters. Gatekeeper was the only means of contact with the Arpa net. Getting into Ultrix, then, was necessary if they wanted to take software out of the company. Once the intruders had gathered their crop of passwords from a VMS machine, they could try each one of them on an Ultrix machine. And that is how they got into Gatekeeper. Long after midnight one night, Paul Vixie noticed activity in the account of one of the secretaries, who appeared to be using Gatekeeper in a very unusual and sophisticated manner. The next day he had her change her password, and disabled her account on the Gatekeeper computer. It was a daily battle, and even the best computer scientists at the research laboratory began to feel beleaguered. The intruders were creat ing too much extra work. Reid and Vixie were copying all recently changed files to special backup disks in case something went wrong. The intruders' clandestine copying activities were creating an unusually large number of recently changed files, which occasionally overflowed the backup disks. The Palo Alto scientists felt that the intruders were as clever as any they had ever seen. They were experts who didn't make mistakes. They broke into almost any computer in Digital at will. It was evident from the way they were exploiting bugs that they must have source code, some pieces of which were so proprietary that even Reid and Vixie didn't have access to them. Frustrated by his own lack of access to the source code, Reid wrote in a message to Digital's security administrators: "Clearly the intruders have the sources. When sources are outlawed, only outlaws will have sources." One thing they did to limit the loss of information was to alter the data just before the intruders transmitted it out of the Palo Alto computer, coding it in such a way that it was useless after it was stolen. 120 a CYBERPUNK By August, at least three people in Palo Alto were taking turns mon itoring the laboratory network. It usually made for an interesting eve ning. One thing they noticed was that unlike a typical intruder in a computer, whoever this was had a fairly sophisticated method of sifting through directories for what he wanted. Ordinarily, a meddler entered a directory that appeared to contain something worth looking at and read the first twenty lines or so of several files. But this intruder was consid erably more efficient. He had an uncanny way of finding a computer with vast amounts of data and within half an hour he would have the one thing up on the screen that was worth stealing. He did it by execut ing a sophisticated sweep of the entire system, looking at access times and looking to see which people had been using which directories. His search strategy, curiously people-oriented, revealed an ingenious insight into corporate hierarchies. That is, he seemed to be able to figure out which people were important, then he would go look at what they had been doing recently. The kicker was that he kept opening the safe and looking inside, but he never took anything other than source code. Perhaps he was just casing the joint. Among those involved in chasing down the interlopers, frustration grew. Sometimes, just to get some work done, or to get a decent night's sleep, the Palo Alto crew would break the network links between Palo Alto computers and the outside world, disconnecting from both Easynet and Internet by pulling the plug on the modems. If the computer scien tists at DECWRL felt that they were under a sustained attack, some system managers at Digital's commercial offices were terrified, convinced that someone had taken the control of their machines out of their hands. In an electronic mail message to his managers, one irate Digital em ployee wrote: Ne seem to be totally defenseless against these people. Ne have repeatedly rebuilt s y s t e m a f t e r s y s t e m a n d fi n a l l y m a n a g e m e n t has told the system support group to ignore the problem. As a good network citizen, I want to make sure someone at network security knows that we are being raped in broad daylight. These people freely walk into our systems and Bre taking restricted, c o n fi d e n t i a l a n d p r o p r i e t a r y i n f o r m a t i o n . KW; 1U DmJc-&U H^Ui ▼ 121 The best that could be done was to take the VAX development cluster in New Hampshire off the Easynet, which meant that engineers were unable to work on those computers from home, or from remote sites. To many of them, it was an irksome and unacceptable solution. In the meantime, those in the Workstation Systems Engineering Group in Palo Alto who were working on the new PMAX workstation had some real trade secrets to protect inside their computers. The Palo Alto group was toiling secretly, trying to bring its workstation to market ahead of Sun Microsystems, which was working on a similar computer. The principal objective behind the development of the new workstation was to take Digital's competitors completely by surprise. Losing that element of surprise could significantly hurt the computer's chances for success. Although the intruders logged on to machines belonging to the workstation group, they didn't appear to be interested in taking anything there. But as an extra precaution, the group kept the specifications to the new machine off line, and gave them out in person to a select group of people. A T A It might have had something to do with residual instincts left over from his days in the intelligence community, but Chuck Bushey was con vinced that the break-ins were the work of an international espionage ring, with malicious West German computer hackers feeding valuable Digital programs to the East Bloc. Bushey was Digital's top cop and he had a cop's way of thinking. Once he had gone to a morning appoint ment at a remote Digital office two hours early to test security by con fronting guards at all the doors. But Bushey was unschooled when it came to technical matters, and the subtle points of computer penetration that a computer security expert might find significant tended to mystify him. His suspicions arose in part from the fact that he had recently received intimations of shady doings on the part of the Chaos Computer Club, and partly because some of the phone traces went back to network nodes close to East Bloc borders. Another piece of evidence led to Karlsruhe, West Germany, which Digital officials knew to be a hotbed of Chaos Computer Club activity, and to a university student who had spent the previous summer working at Digital in Palo Alto. While at Digital, the student had spent much of his time in front of the photocopier. Moreover, the German student was the only person who knew the location of Brian Reid's password-cracking 122 a CYBERPUNK software, which the intruders stole from a Palo Alto computer. By this time, it seemed that the Digital security forces were building up a strong case for the existence of an international conspiracy. In early November, Bushey met with Mark Rasch, a young attorney from the Justice Department who had developed an expertise in com puter crime. Bushey told Rasch about the months of fruitless investiga tion and false starts with no suspect. When Bushey posited his international conspiracy theory, Rasch found it very plausible. A toughminded thirty-year-old New Yorker who had gone straight to the Justice Department from law school, Rasch had become proficient at investigat ing high-tech crimes. His first position was in the department's internal security division and his early cases had included an investigation into the unlawful export of VAX computers to Eastern Bloc countries. His practice was to assume the worst. Presented with a set of brazen, system atic electronic break-ins aimed at the heart of Digital's software devel opment efforts, his inclination was to assume it was espionage until proven otherwise. It was a busy week for Rasch. While meeting with Bushey he received word that a computer virus had infected the Internet the previous eve ning, crippling thousands of computers around the nation. Mike Gib bons, an FBI special agent in the Washington field office, tracked Rasch down at the Digital offices that morning to tell him he had already opened an investigation into the Internet virus. As Rasch was hearing the reports, there were still no leads on who had written the virus. Rasch saw no apparent link between Digital's troubles and this new computer virus, but he couldn't rule one out entirely. One of the virus's targets was VAX computers. The Palo Alto scientists were beginning to disagree with Bushey. By November, they had been monitoring the intruders' activities for months. This was not international espionage at work, they decided. First of all, the passwords that the intruders made up when they created accounts for themselves—words like Spymaster and Spoofmaster—were in consistently flawless American vernacular. Second, it was widely known that the Soviets already had both VMS and UNIX and wouldn't need to steal them. Moreover, if they did need to steal an updated version, it was more than likely that among Digital's 150,000 employees, or among those few customers with source code, there was at least one Russian operative who had already taken home everything he needed. It just wasn't necessary to go through all the effort that the intruders under took. Brian Reid, the Palo Alto office's resident computer security ex- KW; 1U DmA'SU* \\*cUa t 123 pert, believed that in all likelihood this was a game being played by some ne'er-do-well somewhere who slept'into the afternoon, got up, ate some breakfast and sat down at his home computer at three in the afternoon for a long day of hacking. After a hard day at the office breaking into computers, he (experience had taught Reid that it was inevitably a male) would knock off around midnight, meet some fellow hackers for pizza and go to bed around three in the morning. Not only did those hours correspond directly to the hours during which the break-ins took place, but Reid had spent enough time around the computer underground to know its mind-set. In the ten years Reid had taught at Stanford, he had been involved in network security, had met several such "cyberpunks" and had sparred with dozens of them inside the Stanford computers. Both Reid and Vixie were impressed with the technical skill displayed by this one, but they argued that anyone with a modicum of talent and ten hours a day to devote to the problem could probably do the same thing. The one piece of evidence in favor of Bushey's international conspiracy theory was that the intrusions were so energetic they had to be the work of at least two people, a tag team perhaps. If these were truly bored teenagers, on the other hand, then there was also in them something of the network cowboy, out on the nets having a good time roping computers like so many steers, just out to see how many network nodes they could lasso in a night. Witnessing the frenetic activity every day was a little like watching a movie with the sound turned off; Reid didn't get to hear the whooping with each vanquished system, but he could imagine it well. A T A Retrieving the data from USC was a three-man operation, so Kevin and Lenny pulled a reluctant but curious Roscoe in on the project. Fearing that he would be recognized, Kevin stayed off campus; Lenny and Roscoe went to USC together. Lenny stationed himself at a pay phone outside the university's main computer center and called Kevin, who was sta tioned at a terminal at the offices of a friend. Kevin then instructed Lenny to tell Roscoe to mount a magnetic tape. Roscoe walked in and, dusting off his old social engineering skills, posed as a student working on a project, handed a tape to a computer operator and asked him to mount it. Once that was accomplished, Roscoe returned to the pay phone where Lenny had Kevin on the line, and Kevin typed in the appropriate commands to transfer the files from the USC hard disk to the magnetic tape. Then Roscoe could retrieve the tape and hand it to 124 a CYBERPUNK Lenny. This complicated procedure had to be done a few times in order to build the collection of tapes, which were gradually stacking up at AllPurpose Storage in Mission Hills, where Lenny had rented a locker. Roscoe occasionally provided a blank tape from his workplace, but most of the tapes came from VPA. Kevin and Lenny both considered what they had accomplished a tremendous feat. By having their own copy of the VMS source code, they could pick the operating system apart line by line, understand it, find its numerous flaws and even, if they wanted, create a modified version—say, with something like the Chaos patch included. If Kevin and Lenny really wanted to be malicious, they could send contaminated software back to the Star cluster, or even to the software distribution center in Massachusetts, which generates exact copies of what it has received. People who work at a software distribution center are typically not engineers and would have no way of checking to see if their copy of the information had been secretely altered. That meant that until the next release came from the developers, every copy of VMS that left the distribution center for a customer site would contain the corrupted soft ware. When the engineers back at the Star cluster discovered that someone had broken in, they had no way of knowing whether or not their master source code had been corrupted. So they were forced to go through a laborious week-long exercise of installing all the magnetic tape backups of their master files and comparing them with what was on the disks, to make sure that every change was authorized. But Kevin and Lenny had had no plans to visit havoc on the software. Their electronic joyride through Digital was harmless by their standards. They were copying the source code, but in their minds they weren't taking anything. As they saw it, they weren't even stealing, because they left the original software intact, just where it was and just how it was. By the same idiosyncratic view of the law, when Kevin and Lenny encountered a security program called XSAFE, which they learned about while reading the confidential electronic mail of an engineer named Henry Teng, they had no qualms about taking it. Teng appeared to be the program's chief architect and "Digital Confidential" was stamped all over any memos concerning XSAFE. The program wasn't due to be released for another year, and Kevin wanted the source code. It didn't take Teng long to notice they had been in, so he changed his password. Getting Teng's new password was a particular challenge, KW: 1U Dm^-SUc W^jui ▼ 125 as he was choosing from a list of randomly generated passwords. Al though the password Teng picked did not echo back on his screen, the list from which he chose went to a log file he kept, which Lenny and Kevin could see. They went to the log file, found the list of choices, and eliminated their way to Teng's new password. When Teng discovered they were back in, he moved to a machine that was on the Easynet but had disabled inbound connections. Through reading mail, Kevin and Lenny found the name of the machine Teng was now on. When they tried the "set host" command, a way to link one computer to another, they got a response that all inbound connec tions would be refused. Figuring that Teng himself had to have a way of connecting to the computer, they started looking at terminal servers (computers that act as switchboards, making connections between com puters on a network) in the development center and finally found a hidden avenue that gave them a way to reach to the machine. They continued the task of transferring out the XSAFE source code. Perusing the personal mail of network security experts like Brian Reid, and corporate security people like Chuck Bushey and Kent Anderson, who was in charge of European security, was a good way for Kevin and Lenny to track the progress of the hunt. They read mail in which net work security people were told to drop what they were doing to work on the case. At one point, it appeared to Kevin and Lenny that at least three people in corporate security were working on the problem fulltime. Even if they were caught, Lenny and Kevin had read enough about computer crime to know that Digital might be reluctant to press charges against them. They were aware that few of the computer crimes detected were ever reported to the police and still fewer were made public through criminal charges. Lenny and Kevin knew that companies worried about having their vulnerabilities publicized. A T A But in June 1988 there was a close call. Lenny got a telephone call one day from a particularly overwrought Kevin. "Get a copy of today's L.A. Times!" he cried. When Lenny looked at the newspaper, he couldn't believe it. "JPL Computer Penetrated by a 'Hacker' " was the front-page headline. The duo's traversing of the Internet had taken them briefly into a computer at NASA's Jet Propulsion Laboratory in Pasadena a few months earlier. Kevin was interested in the JPL computer because it was one of the few 126 a CYBERPUNK VMS machines on the Internet and he had considered using it as a storage locker for the VMS source code, but then decided against it. But they didn't think they had been detected. Luckily, the laboratory ap peared to suspect the Chaos Club, because of evidence of the club's trademark "insidious Trojan horse," the loginout patch. The newspaper article said that although no classified material was compromised by the hackers, one JPL engineer said officials there "worried that an intruder could learn how to send bogus commands" to the eight unmanned inter planetary Explorer spacecraft the laboratory controlled. Kevin and Lenny, of course, had no such intentions. They had just been poking around. By early fall of 1988, Kevin was acting particularly paranoid, eating more than usual and making unreasonable demands on Lenny. He had no regular job, leaving him with plenty of time to be obsessed with his hacking projects. He insisted that Lenny be ready to drop what he was doing in his legitimate job and start work for Kevin promptly at three o'clock every afternoon. Or he would call Lenny at five in the morning and instruct him to go to VPA to insert the Chaos patch just as everyone in Massachusetts and New Hampshire was logging on. Kevin had changed his telephone billing name to James Bond; the last three digits of his new number were 007. He had changed Lenny's billing name, too —to Oliver North. Kevin made it clear to Lenny that he wanted to stay several steps ahead of the growing pack of hounds Digital had deployed for the chase. By this time, Kevin had improved his phone work so much that he made it almost impossible for USC to track him down. His most effective red herring was his use of the call-forwarding feature on the telephone com pany's computers. This masking technique meant that when the phone company initiated a trace, it would lead to a blind alley. Kevin was ruthlessly arbitrary in forwarding the telephone numbers. And until he and Lenny read Chuck Bushey's mail one day, they had no idea that Digital had gone so far as to trace the calls back to the random numbers they had chosen to forward to. One of these random numbers led back to the apartment of a Middle Eastern immigrant in Santa Monica, a middle-aged man who was watching television when federal agents barged in looking for computer equipment. They found none. When in the throes of the hacking, Lenny was having a good time. The idea of having control over many computers was incredibly seduc tive. The challenge of figuring out where to go to look for the informa tion they wanted was more stimulating than any college programming KW: 1U DmA-SU* WacJIha, t 127 course. And all the while they watched a twelve-billion-dollar company flounder helplessly as it headed down one cul-de-sac after the other. Yet something in Kevin was changing. He had become so secretive that when he told Lenny he had lost the Security Pacific job, the greater surprise to Lenny was that he had gotten it in the first place. The same thing had happened when Kevin got and quickly lost the job at GTE. For Lenny, too, the thrill was beginning to disappear. He became suspi cious that Kevin was storing information to use against him someday, while withholding anything about himself that Lenny could use. They began to argue frequently over trifling things. And they were constantly betting against each other—twice Lenny lost a $120 bet on whether Kevin could break into the VPA computer from outside. Kevin did it through sheer doggedness. When it came to perseverance, Lenny was a distant second. He lost most of the bets. And since Kevin had come back from his months "underground" a few years earlier, he seemed to take his electronic penetration more seriously than ever. Perhaps he was thinking that if he was going to lie to Bonnie every night about where he was, it should be for a reason he considered defensible: he had goals to meet. On the other hand, some thing seemed to be beyond his control: he kept telling Lenny that he wanted to stop the break-ins as soon as they finished the project they were working on; but once they had finished one project, Kevin always seemed to want to start another. By November, Kevin was insisting on coming to VPA every night to break into Digital. Whenever Lenny tried to beg off so that he could get some sleep, see other friends or spend time with his girlfriend, Kevin would badger him until he agreed to spend the evening with him. Some times he even called Lenny at two in the morning and rousted him from bed, insisting that he meet him at VPA. Kevin was obsessed and he had drawn Lenny into his mania. Bonnie, who was paying most of the bills, had started losing patience with her errant husband. She paged him constantly, and Lenny sat in disgust as he listened to Kevin lie. "I'm at the UCLA law library working on the Pierce case," he would tell her. Or: "I'm studying for my exten sion class." After he hung up, Kevin would grumble about Bonnie. She was a nuisance. Getting in the way. He was thinking of divorcing her. Lenny could feel that things were heating up. He turned to Roscoe. Kevin was getting out of hand, he told him. He felt as if he couldn't pee without checking in with Kevin first. Roscoe, too, was beginning to get fed up with this roller-coaster relationship between Lenny and Kevin. It 128 a CYBERPUNK was true that Kevin was a nuisance. He was calling Roscoe all the time, too. Mostly, Roscoe felt terrible for Bonnie, who knew of none of it. He resisted a temptation to tell her to go to the UCLA law library one night and look for her husband. Now Lenny was sounding panicked. Roscoe didn't want to get involved, but he did offer him some advice: get a lawyer. Even now that the VMS software was encrypted and safely locked away in a storage locker, Kevin still wouldn't quit. His next project, he decided, was to steal a game called Doom from Digital's Star cluster. He was quite content with the setup at VPA. Judging from the unsuccessful traces, there was no one even close to catching them. In the face of Lenny's protests, Kevin was insistent. What had once been a friendship between like-minded teenagers had become a series of demands and contests and long nights in the stuffy offices at VPA. If this was big-time electronic crime, then Lenny wanted nothing more to do with it. A T A It was the stunt with the paycheck that unhinged Lenny completely. "Hello, Ms. Sandivill," came the chatty, genial voice on the other end of the line. "This is Carl Halliday with the Internal Revenue Ser vice. I understand you're in charge of payroll at VPA." "Who did you say you were?" "Well, ma'am, we're doing an investigation into an employee of yours. A Mr. Leonard DiCicco. Seems he owes Uncle Sam some money. So we need your cooperation." "Yes?" "We need to ask you to withhold Mr. DiCicco's paycheck until we clear this matter up." Livia Sandivill, VPA's bookkeeper, shook her head. There was some thing about the call that made her uneasy. She asked him to hold on and went into Ralph Hurley's office. "The IRS is on the line and they're asking about Lenny," she told him. "They want us to hold his paycheck." Hurley, VPA's vice-president, took the call. At first, the IRS agent seemed credible enough, but it didn't take long for Hurley to become skeptical. When he asked the agent to fax him a letter with the request to hold the paycheck, the agent said his fax machine was broken. Then, when Hurley asked for a number to call him back, the caller gave him Sacramento's area code but a number with a prefix Hurley recognized as KW; 1U Dm^-SUc H*du* T 129 one for California state agencies, not federal agencies. Moreover, there was something very familiar about the voice. Of course! He sounded exactly like Kevin Mitnick, that overweight, Eddie Haskellish friend of Lenny's. Kevin was a frequent caller. He chatted up the secretaries in the same friendly tone. "How was Palm Springs?" he would inquire of one. "Sorry to hear about your appendicitis" were the kind words for another. He called so often, in fact, that it had become something of a joke among the women who answered the phone at VPA. Whenever Lenny was on the phone to Kevin Mitnick, he sounded as if he were fighting with a girlfriend. When Hurley tried calling the number back, he got a recording that said there was no such number. So just after lunch, Hurley called Lenny into his office. "Lenny, are you in trouble with the IRS?" he asked. Lenny shrugged it off. "Of course not." "Then are you in trouble with Kevin?" That was all it took. Before he even knew what he was doing, Lenny found himself telling Hurley about Kevin. In a rather disjointed confes sion, he told Hurley that Kevin had been operating from VPA for the past year, that he had been letting Kevin into the building after hours to sit in front of the VPA computer until early morning. He told him that he and Kevin had been secretly using a computer twenty miles away on the USC campus as their personal data storage locker. And he told him about all the break-ins at Digital. Hurley, who had suspected noth ing, was stunned to hear this. Lenny knew he was well regarded at VPA. He was the general troubleshooter who maintained the company's modest computer system. The last thing he wanted to do was lose yet another job because of Kevin. Lenny told Hurley he wouldn't have been doing all this illicit comr puting if it hadn't been for Kevin. In fact, he claimed, Kevin had forced him into it. Kevin Mitnick was cannibalizing his life. So he kept letting Kevin in to use the VPA computers, night after night. If he decided he didn't want to work with Kevin one night, Kevin always managed to track him down. He was a master at that. And Lenny wasn't the only one to have been terrorized by Kevin Mitnick through the years, Lenny said. He had seen Kevin cut off a person's phone service on a whim. Hurley leaned back. "Well, Lenny, what are we going to do? I'll tell you right now that I want to get the authorities in here. Either you can do it or I will." "Well, geez," Lenny said, looking alarmed. "I'll just get in trouble." 130 a CYBERPUNK Hurley tried to be understanding. He told Lenny that if he was the victim he claimed to be, he would be likely to get sympathetic treatment from the authorities. "Why don't you think it over," he said. At 6:00 that evening, Lenny came back into Hurley's office. "Well, Kevin's really done it this time." "What do you mean?" "He just forwarded all our lines to my house and busied out the whole switchboard." When Hurley picked up his phone and tried to call an other line in the office, he just got a busy signal. With this came another round of confessions. Now Lenny told Hurley that Kevin wasn't just a computer expert, he was adept with telephones as well. He told him about rerouting the wires in the telephone closet and about the MCI access codes they used to call places as far away as England. The phone forwarding stunt he had just pulled was something Kevin had been threatening Lenny with for some time, Lenny said. "Something has to be done about this by tomorrow," Hurley said. "I want to see you in here at eight-thirty tomorrow morning." Later that evening, both telephone lines at the Hurley residence went dead. The next morning, Lenny told Hurley he knew just whom to call at Digital, and he placed a call to the headquarters in Maynard, Massachu setts, from Hurley's office. He told the man who answered in Digital's corporate security office that he needed to speak with someone about the computer hacker who had been plaguing Digital for the past year. To make his words sink in, he started listing things: the VMS source code, the XSAFE program. Lenny said he would like to be put in touch with the FBI. He was told to sit tight for a few minutes. Five minutes later, Chuck Bushey called him back. Lenny knew ex actly who that was because he and Kevin had been monitoring Bushey's personal electronic mailbox for months. He knew Bushey was angry and fed up. And he knew that the security department at Digital would give anything at this point to catch those who had privately embarrassed the company so thoroughly. "Uh, hello," said Lenny. "I just wanted to let you know that I know who's been breaking into Digital's computers for the last year." There was silence on the other end. "Who is this?" Lenny stumbled. "My name, uh, my name is Leonard DiCicco and I'm calling from Los Angeles and I want to tell you about Kevin Mitnick. I know that he's been breaking into Digital's computers all this time. I know you're looking for him." Bushey told him to go find a "secure" phone and call him from there. KW: 1U D«Ul-$JU \\AckitA t Bl Lenny and Hurley went together to a pay phone at a nearby super market, and Lenny called Bushey back using Hurley's credit card. "Well, I'm, uh . . . I'm a friend of his, and I'm calling you because I want to turn him in," Lenny said, and he launched into a condensed version of what he had told Hurley the previous day. He made certain to mention all of the key incidents. He told Bushey that Kevin had taken a copy of a highly secret security program that only a handful of people within Digital were even aware of. To prove it, he named the program. He also said that a copy of the latest version of Digital's operating system for the VAX had been taken as well. There was silence on the other end. Lenny kept talking. He said he wanted to be as much help as possible in apprehending Kevin Mitnick, who was, Lenny intoned, a menace to society. Silence. Digital had better move fast, Lenny added, because Kevin had been talking lately about giving up his break-ins, and the company might not have many more opportunities to catch him in the act. Bushey was speechless at the sudden lucky break. This breathless young man on the telephone was describing the break-ins that had been plaguing the company for months. That night, Bushey and Kent Ander son, the company's head of European security, were on a plane to Los Angeles. While the two Digital people were on their way, an FBI special agent named Chris Headrick summoned Lenny to a meeting at a hotel in the San Fernando Valley. Lenny was impressed by the very ordinariness of the agent. Slight and bespectacled, the low-key Headrick looked as if he would be more at home in a classroom in front of a chalkboard, scrib bling out differential equations. In fact, some of Lenny's high school teachers were flashier than this. When the Digital security men arrived at the hotel, they turned one guest room into a makeshift command center. Lenny drove out to All-Purpose Storage, retrieved the three dozen tapes filled with the fruits of his and Kevin's electronic adventures and surrendered them to his interrogators. Lenny stayed at the hotel, talking until 4:00 a.m. Feeling rather like a hero, he was brazen enough to mention to Bushey that Digital could have solved this frustrating case much sooner. If Bushey had pressed people at USC, university records would have revealed a history of problems with Kevin Mitnick. Also, Lenny told him, if Bushey had consulted Digital's old records, he surely would have seen that Mitnick had gotten into trouble as early as 1980 for breaking into a Digital computer. Then there was the Pacific Bell security memo that followed 132 a CYBERPUNK the Santa Cruz Operation incident and circulated around Digital several months later, at the same time that Mitnick's activity inside Digital was at its peak. The names had been deleted from the memo but a few phone calls to Pacific Bell security would have made the Mitnick connection. The next morning, together with Lenny and Ralph Hurley, the au thorities drew up a simple plan to verify Lenny's claims. As usual, Kevin was planning to show up at VPA at 7:00 that evening, after the regular employees had all gone home. Headrick's plan was to use a computer room on the first floor of the building to monitor everything Mitnick did from the main computer room, which was one flight up on the opposite side of the building. Hurley stayed around that night too. His presence downstairs would prevent Kevin from using the first-floor computer room. An FBI agent named Gerald Harman arrived at 5:00 p.m. and began to set up a surveillance. He wired Lenny with a tape recorder, fastening an elastic belt with two pockets—one for the tape recorder and one for the microphone—to his chest. A Digital engineer installed a monitoring device into the VPA computer that would let them watch and record everything that happened from the system upstairs. When he arrived that evening, Kevin seemed to be in good cheer. In fact, he was on a roll. He had recently gotten a more extensive list of users on the computer at the university in Leeds, England, and wanted to try to get their passwords. He was also hoping to break in to the machine of Neill Clift, the Leeds researcher whose hobby was spotting security holes in VMS. The agents planted themselves downstairs, and Hurley stayed in his office. Lenny greeted Kevin outside and lowered his voice. "Kev, we can't use both computer rooms tonight. Hurley's working late." The two went straight upstairs and Kevin began to dial directly into Digital. His first order of business was the Digital engineering cluster. Lenny was wearing a loose-fitting T-shirt, but he was still worried that Kevin would pat him on the back, thwacking his hand against the recording equip ment. Kevin sensed that Lenny was jittery. "What's going on with you tonight?" he asked. "You're acting strange." Downstairs, in the hastily appointed command center, the Digital people must have been surprised to learn that all their theories had been wrong. Not only was this not the work of an international spy ring, but the notorious West German Chaos group didn't seem to be involved at all. Instead, the culprit appeared to be an obese, nearsighted twentyfive-year-old high school dropout from L.A. whose diet, according to his friend, consisted of greasy cheeseburgers and Big Gulp colas from the KW; 1U JW-SUe WmjIha ▼ 133 nearby 7-Eleven—to say nothing of Lenny, a whiner who had spent months letting himself be bedeviled and blackmailed by the fat one. This must have been a far less glamorous denouement than any of them had imagined, inside a stuffy room the size of a walk-in closet, listening to two grown men taunt one another like children. As the evening wore on, it became clear that this Kevin Mitnick was indeed their man. Mitnick seemed to have a special fascination with the Leeds computer that night. He talked someone at Leeds into giving him a password, then logged on to the British system and perused lists con taining the names and access codes of everyone with legitimate access to the Leeds computer. The FBI agent seemed befuddled by what he was witnessing. Anderson explained to him that once Mitnick had obtained the list of authorized users and their passwords, he could come back later and log on as any of those people. This young man's facility with the telephone network in general, and MCI codes in particular, was impressive enough. As soon as he finished his session on the Leeds computer, Mitnick dialed his way into an MCI Mail account, from which he was able to harvest MCI credit card num bers, so that the session would never show up on VPA's telephone bill. He seemed to know exactly what commands to type, as if he had done it hundreds of times before. But even more remarkable was Kevin's ability to monitor Pacific Bell's telephone traces. And that was precisely what had kept Digital at bay for so long. His knowledge of the phone system was so extensive that he could tap straight into Pacific Bell's monitoring equipment and keep a careful watch over anyone trying to trace his call. For that purpose, he always had two active terminals in front of him: one for his breaking and entering and a second to show what was happening on Pacific Bell's computer. If a trace to his phone line started, he could log off at once. Anderson had been in the'computer business for nearly a decade and he was aware that hackers were known for their patience and stamina. This one seemed to be among the most indefatigable. At 1:00 in the morning, long after the FBI agent and the jet-lagged engineers had grown bleary-eyed, Mitnick seemed to be just waking up. If it was true that he was recently married, didn't his wife wonder where he was? Lenny's role seemed to be a small one, though the surveillance team suspected he might be lying low for its benefit. Lenny's principal job that night was to keep an eye on the second computer terminal that the pair used to maintain their electronic lookout for any traces. Lenny had done his part. He had led them straight to the person who 134 a CYBERPUNK had eluded them all these months. Kevin was doing so many illegal things that Lenny was surprised the agents didn't storm upstairs and arrest him on the spot. So he stole downstairs and rapped lightly on the door of the small computer room. The door opened a crack and Harman stuck his head out. "Well?" Lenny asked. "Aren't you going to arrest him now?" Harman shot back a stern look. "Not just yet." Harman said they had seen quite enough for one evening, and they were going to pack up for the night. He ushered Lenny inside and removed the taping equipment. Lenny grew impatient. "What do you want? A signed confession?" "That would be nice." Harman smiled and gently pressed him out the door. Lenny climbed the stairs again, shaking his head. "What's going on? Where've you been?" asked Kevin, speaking, it appeared, straight to the computer screen. He was back in Leeds. "I was just checking to see if Hurley's still here. Listen, Kev, I'm tired and I have to get up early in the morning. Can't we call it a night?" "No, I'm onto something great here." "Kev, come on. Let's go." Lenny was becoming exasperated. Kevin turned and glared at him. It wasn't until 3:00 a.m. that Kevin was finally ready to call it quits. When the two went outside, they saw that Kevin's car had a flat tire. So Lenny offered to drive him home—after a pit stop at the Fatburger. In a fit of generosity, Lenny told Kevin he would pay for Kevin's meal. Surprised but not about to object, Kevin ordered two King Fatburgers with everything on them, large fries and a large Diet Coke. Lenny ordered fries and watched as Kevin, out of habit, systematically emptied half a dozen ketchup packets onto his paper place mat then jabbed the mound of sauce with his french fries. His meal dispensed with, Kevin asked Lenny what time he should arrive at VPA the following night. Lenny said he was busy. As usual, an argument ensued. But rather than retread old ground, Lenny told Kevin to find his own way home and stalked out the door. A T A The FBI agents and Digital security experts gathered at VPA the follow ing morning to examine what they had collected. That morning, Har man and Headrick decided they had enough to make an arrest. In an unusual move, Digital, normally intent on keeping the lowest profile possible when it came to security matters, agreed to press charges and KW: 1U DMk-$Ut fMe* ▼ 135 risk public exposure. It was a daring move, for once Digital customers learned that someone had been roaming freely throughout a network they believed was secure, and that he not only had helped himself to company software but, by reading people's electronic mail, had discov ered security weaknesses, Digital would have a lot of explaining to do. But as far as some Digital officials were concerned, seeing this criminal behind bars might be worth a little public disgrace. Once they had Mitnick taken care of, they would handle the more nettlesome problem of Lenny. Headrick went to find Lenny. "How do we find your friend to pick him up?" Lenny was overjoyed. He told Headrick he knew exactly where to find him. Kevin had just come by to have his car towed to a nearby garage. Lenny called the garage. Lenny knew Kevin well enough to know that money ranked only behind food and computers on Kevin's priority list. Lenny had lost a $100 bet a few weeks earlier that Kevin wouldn't be able to crack one of the electronic door codes at VPA. When Kevin punched the correct code after just a couple of tries, Lenny accused him of cheating. He must have seen the code scribbled on a scrap of paper inside someone's desk. But Kevin not only demanded his winnings, he charged Lenny 10 per cent interest for each day that Lenny failed to pay him. So Lenny called him at the garage to tell him he had just gotten some vacation pay and he had the money for him. "I'll be there in twenty minutes," Kevin said, and hung up, Headrick told Lenny he didn't want to arrest Kevin unless he had his blue canvas duffel bag with him. Lenny had explained that the bag was Kevin's tabernacle. It contained all his diskettes, papers and other com puting paraphernalia, as well as the computer-age equivalent of a lock picker's kit—handwritten access codes and passwords Kevin used to steal his way into heavily guarded computers from the safe remove of thou sands of miles. Lenny had told Headrick that the bag contained docu ments linking him to the stolen Digital security programs, as well as to the abuse of the USC computer. In fact, Lenny had said, if they were going to get any hard evidence, it would come from that bag. Kevin's house had been searched so many times that he no longer kept anything incriminating there. The material gathered from the eight hours of surveillance was help ful, but if the bag contained as much incriminating evidence as Lenny claimed, it would be indispensable in building a case against Mitnick. Lenny cheerfully suggested that he steer Kevin to the trunk of the car, 136 a CYBERPUNK where Kevin always kept the blue bag. As soon as Lenny saw it, he would scratch his head. The signal was carefully arranged. When Lenny reached up and gave the back of his head an absentminded scratch, they would make the arrest. It was just after sunset, and in the gathering darkness half a dozen FBI agents slouched under the steering wheels of their unmarked govern ment cars inside the small open parking garage beneath VPA. Just after 5:00 p.m. , Kevin's black Nissan Pulsar rolled into the garage. Luring Kevin there had been easy enough. His next challenge was to get Kevin to open the trunk. Lenny told Kevin he needed an empty disk from him to copy a piece of software from upstairs in VPA. But snaring the quarry wasn't so easy. When Kevin pulled into the garage, he said nothing about the money. He wasn't even eager to get out of his car. "Let's go eat," he said, apparently forgetting the argument they had had the previous night. "I'm hungry." Lenny had to think fast. "But Kev, I really want to make a copy of this great terminal emulator. Let me just run up and do it. Then we can eat." "No, I wanna go eat now. Copy it later." Kevin's desire for nourish ment didn't surprise Lenny, but his insistence seemed unusual. This was one test of wills Lenny planned to win. He stood his ground. Kevin finally agreed to get a disk for him. Grumbling, he went to the trunk, opened it and lifted out the large blue canvas duffel bag. He put one foot on the bumper and propped the bag on his knee. Lenny reached up behind his head and gave his hair a tousle. Suddenly, the garage filled with the sound of engines starting and tires screeching. Kevin looked around, surprised and confused. Lenny grinned broadly: "Kev, you know that queasy feeling you get in your stomach when you know you've been caught and you're about to get arrested?" Kevin looked at his friend. "Yeah?" "Well, get ready." Kevin was taken completely by surprise. The broad grin on Lenny's face left him confounded. The FBI agents jumped out of their cars and shouted to Kevin that he was under arrest. They demanded that Kevin put his hands up and lean against the car. Kevin laughed a tight little laugh. "You guys aren't from the FBI. Show me your folds." Six large FBI identification folds emerged. Kevin looked at Lenny, who was dancing in little circles and laughing. "Len, why'd you do this to me?" "Because you fucked me over" came Lenny's reply. fa*: 1U M-SUc W+ck* T 137 The agents hustled Kevin into one of the cars. "Lenny!" Kevin cried out. "Could you call my mom and tell her I've been arrested?" Ignoring the plea, Lenny turned to Chris Headrick and smiled. Head rick nodded approvingly. "You did so well you should be in my business." PA R T T W O Pa»co Ahd- Project I,.n the late fall of 1986, two young men took the subway across the border and got off at Friedrichstrasse in East Berlin. When they arrived at passport control, Peter Carl, a dark and slightly gnomish man in his early thirties, took over. With a businesslike flick of his wrist, he slapped his passport down in front of the guard and said he had an appointment. His companion, a tall and slender teen ager with a pale complexion who called himself Pengo, sat to one side and waited to be cleared. As Pengo understood it, Carl had made the initial contact a few weeks earlier by slipping a note containing secret code inside his passport. From then on, he could enter East Berlin any time he pleased, without exchanging the requisite 25 marks. A West Berliner usually had to apply a day in advance to travel the few miles across the border. The guard waved the two men through. The corner where they emerged from the U-Bahn, Berlin's subway network, was bustling by East German standards. But the elegance of the cafes that once defined this part of Berlin had long since been replaced by tall public buildings, their dull finish suggestive of a more proletarian aesthetic. Carl and Pengo made their way to Alexanderplatz to kill some time. If not exactly friends, the two were caught up in a 141 142 a CYBERPUNK mutual adventure that bound them. They sat down on a bench. Peter Carl produced a joint from his pocket, lit it and offered it to Pengo. Eager as Pengo might otherwise be to do something so daring—smoke a joint in the middle of Alexanderplatz, East Berlin, in broad daylight— he declined. He was nervous. Shortly before noon, they walked the ten minutes to Leipzigerstrasse, a wide boulevard that began at Checkpoint Charlie and flowed eastward. The building they were headed toward—number 60 Leipzigerstrasse— didn't differ in appearance from the dozens of other postwar apartment buildings that lined the wide boulevard. While West Berlin had em braced a haphazard, extroverted approach to reconstruction, a Sovietinspired blueprint informed East Berlin. The dreary designs of the fourteen-story buildings along Leipzigerstrasse were first cousins to the high-rise apartments ringing Moscow's outskirts. But its proximity to the West always gave East Berlin a bit of an edge over its East Bloc brethren. Technology had been creeping into East Berlin, and the change was especially evident on Leipzigerstrasse. There was a peculiarly capitalist innovation—an automated teller machine—just outside num ber 60. From the names listed next to the buzzers in the entryway, the build ing appeared to be chiefly residential. They took an elevator the size of a refrigerator, which jerked its way up to the fifth floor. They were greeted at the door by a bearded, slightly stocky, well-tailored man in his forties. He and Carl shook hands like old friends. Then Carl gestured to his associate. "Hier ist mein Hacker. Pengo," he announced with a note of triumph in his voice. Sergei turned to Pengo—his real name was Hans Hiibner, but he had been better known as Pengo for years—and extended his hand. The meeting was relaxed enough at the start. A secretary served coffee. Sergei, cordial and businesslike, inquired about Pengo in accom plished German somewhat overwhelmed by a Russian accent. What was the young West Berliner's background? What were his views, his poli tics? Pengo responded proudly that he was a product of West Berlin's leftist scene—the sixties movement—and that he was sympathetic with what Mikhail Gorbachev was trying to achieve in the Soviet Union. Sergei seemed unfazed, perhaps even slightly amused. Then he got down to business. "Do you have something for me?" he asked, turning to Peter Carl. Carl produced a magnetic tape and diskettes from his briefcase, handed them to Sergei, and the discussion turned serious. On the disks, Pengo explained, was a security program for Digital Equipment Corpo- Pc*^ toU Piejut E*j<**lty* ▼ 143 ration computers, the computers of choice in the Soviet Union, and on the tape Sergei would find some other interesting software. Barely acknowledging what he had just heard, Sergei told Pengo ex actly what he was interested in. Referring to what appeared to be an order list, Sergei said he was anxious to obtain state-of-the-art engineer ing software—expensive and sophisticated programs that fell high on the embargo lists intended to stop American and Western European high-technology products from landing in Eastern Europe. He asked, for example, if it would be possible for Pengo to obtain computer-aideddesign software for designing chips. Pengo deliberated for a few moments, then decided he should tell Sergei what a hacker really did. He explained that he was capable of traveling the world through a computer. He could hop from West Berlin to Pasadena in a few seconds, dipping in and out of foreign computer systems in the blink of an eye. But at the moment, Pengo complained, his means of transmitting information were limited. He had a modem, but it sent and received information at a paltry 120 characters per sec ond. The electronic theft of the kind of software that Sergei wanted might take days at the rate Pengo would be able to gather it, making such an exercise far too risky. Pengo began to make his pitch. "Of course, I could do it if I had the right equipment"—perhaps a high-speed modem, one that would allow him to manuever more swiftly, and a more powerful computer with plenty of disk space. It was, after all, his dream to hack on powerful computer systems, but he didn't mention that to Sergei. Pengo hesitated. Sergei was silent. The teenager continued: How would the Russians like to set him up to do safe hacking from phone lines that couldn't be tapped, perhaps even to do his hacking from East Berlin? It would be to everyone's benefit. Pengo sensed no sympathy, nor could he see even a flicker of compre hension on Sergei's part. His only response was to suggest that Pengo try to fulfill his requests, after which they could talk again. If Pengo needed to talk in the interim, Sergei said, he should feel free to come back. With that, the Russian invited his two visitors to take a meal with him. If not an unqualified success for the two West Germans, the visit was in its own way instructive: Pengo had established contact with a KGB agent and had learned what it might take to engage in espionage for the Soviets. A T A 144 a CYBERPUNK Most eighteen-year-olds, no matter how interested in computers, wouldn't have had the chance to talk business with a KGB agent. If Pengo had been asked to describe how he felt about what he had just done in political or even ethical terms, he would likely have shrugged his bony shoulders, rolled another cigarette and passed the question off not just as unimportant but as annoyingly beside the point. Politics and ethics, he would say, had nothing to do with it. Hacking was the means and the end, the information and its destination secondary. He wanted a powerful machine to hack with. He couldn't afford one, the Russians could, and it was the Russians who seemed interested in letting him indulge his passion. He might even say that the purity of his purpose struck him as somewhat heroic; his goal was to be the world's best hacker. That he was living what he might have read in a spy novel made it all the more exciting. Pengo was the son of middle-class Berliners whose lives were torn apart in 1961 by the wall that divided their city. In 1945, five years after his father, Gottfried Heinrich Hubner, was born, the first Western troops marched in and Berlin became a city administered jointly by the four Allied powers. It had been badly damaged, with only half its resi dents remaining and a fifth of its buildings destroyed; there was no electricity or gas, and drinking water had to be hauled in from the country. In the late 1950s, when travel between East and West required only the price of a subway ticket, Gottfried went to the technical university in West Berlin to study engineering. Renate, small, blond and his high school love, traveled frequently from East Berlin to visit him, against strict orders from her father, an impassioned Communist Party function ary. Renate's trips to the west so enraged her father that he informed the East German authorities of the nineteen-year-old girl's hostile act against the Party. He banished her from his home. Renate continued her trips to visit Gottfried, assuming that she could return at will despite her father's opposition. Fate decided her future, however, during one latesummer visit in 1961. On the day before she was to return, a line was cut through the city's heart. The young couple went to the Brandenburg Gate and watched East German soldiers unfurl a twenty-eight-mile-long barbed-wire barrier. Within days, the Berlin Wall was under construc tion. Gottfried and Renate settled in Schoneberg, an older section of West Berlin that became famous for its town hall, from the steps of which John F. Kennedy delivered his famed "Ich bin ein Berliner" speech. Pv*$o mU Pwjut E<)4**ltyi ▼ 145 Renate was studying graphic design and Gottfried was just starting out as a construction engineer. Both were pulled into the anti-authoritarian movement, the European equivalent of the American Left's countercul ture that was sweeping through Europe. They married when Renate got pregnant, and Renate dropped her studies to become a full-time mother. Hans Heinrich was born in July 1968 into a tumultuous time. Three months earlier, Rudi Dutschke, a brilliant sociology student and pacifist who had founded an opposition party in West Berlin, had been shot and nearly killed outside his apartment on Kurfurstendamm, West Berlin's main boulevard. Dutschke was shot by a housepainter who couldn't stand what "Communist pigs" like Dutschke represented. The incident triggered mass riots in the city, and the unrest in Berlin inspired student uprisings throughout West Germany. Hans tended more than most children to give free rein to his fantasies. As a young child, he used the rubble of a partially reconstructed Berlin as an endlessly fascinating playground. Hitler's massive concrete fortifi cations, scattered throughout the city, were indestructible, so architects learned to design their way around them, occasionally just building new apartments on top of them. The abandoned bunkers beneath were ap propriated by the child explorers of Berlin, and Schoneberg had one of the best. It stretched for half a block, stood several stories high and reached four stories below-ground into a catacomb that was filled with endless stretches of ramps and passages. Oblivious to the historical sig nificance of their romping place, neighborhood children scouted its ex panse for old helmets, uniforms and other remnants. The building was a real-life fantasy world, a secret domain perfect for role-playing adven tures; perhaps it was even a first taste of the kinds of interlocking paths and channels that computer networks would come to offer. Partly out of boredom at home, Renate joined a group of mothers who were exploring alternative education for their children. Every day after kindergarten the five-year-old Hans went to a Kinderladen, an experi mental preschool not unlike the Montessori schools in the United States. Parents of Kinderladen children generally belonged to the antiauthoritarian movement of the time and believed that their children should decide for themselves what they would eat, when they would learn to eat with utensils and even when their diapers needed changing. Parents like Gottfried and Renate favored uninhibited self-expression in their children, encouraging them to resolve conflicts by themselves and to assert themselves in ways that had been forbidden to their parents. Yet the Hubner family was drifting apart. Hans was still in school 146 a CYBERPUNK when his father and mother divorced. Hans stayed with Renate, and his younger brother, Ferdinand, moved in with Gottfried. Renate went to work as a dental technician building ceramic teeth, and Hans joined the ranks of latchkey children. He wasn't much of a student. At ten, he was an awkward, slightly plump, bespectacled kid who showed little aptitude for penmanship, English or art, and none at all for sports. His performance wasn't en hanced by the breakup of his family. His teachers regularly sent home reports stressing Hans's potential, while complaining that he was lazy and disruptive. The only subjects in which he excelled were math and physics. When report cards were issued and Hans called Renate with the news, she would tell him to forget the grades and just read her the written remarks. But Hans had a charm that tended to obscure his failings. From an early age, he displayed a sophisticated, relaxed and dry sense of humor. Whenever he got into trouble, he was able to talk his way out of punish ment, inspiring awe among his more academically diligent friends. His teachers decided that what the young charmer needed was more intellec tual stimulation: they decided to advance him by having him skip the eighth grade. But this backfired. The youngster did not throw himself into schoolwork in a more mature surrounding. Instead, he withdrew into his own world, alienated from the classmates for whom he felt little affinity. When he was twelve, Hans discovered squatting. Squatting in Berlin started in the 1970s when artists, punks and runaway teenagers laid claim to abandoned industrial buildings, apartment houses and stores. By 1980, there were more than one hundred buildings in West Berlin oc cupied by squatters. Hans joined a group that took over an abandoned store in Schoneberg, where they set up a punk band. What the adoles cent lacked in musical talent he made up in aesthetic sensibility: his sixinch spikes of hair dyed jet black soared above his head with the help of copious applications of soap. He completed the costume with black mil itary boots and a heavy chain around his hips. He was now growing quickly, and sharp angles were replacing the soft folds of childhood. The wild adolescent distressed his parents. First there were incidents of shoplifting—a cola, for instance, or the electronic parts to build an amplifier. When Renate went to the police precinct to retrieve Hans after the cola episode, officers displayed pity mixed with disgust at her for having borne such a son. She was so enraged that she slapped Hans across the face, but she succeeded only in stinging her own Pim^o mU P+ejut Ey*LtyA ▼ 147 palm. And then there was the time Gottfried was called to the hospital to fetch his barely conscious son, who had gone to a rock concert, drunk too much and smoked his first appreciable quantity of marijuana. A T A Personal computers arrived in Germany in the early 1980s, mainly by way of England. The first wave were toys that went into the bedrooms of teenage experimenters, children of middle-class homes in trim and tidy neighborhoods in antiseptic towns across West Germany. Parents gladly paid the money for an Atari or a Commodore 64, toys that seemed capable of serving an educational function, rather than see their adoles cent children experimenting with drugs or joining the punk scene. Hans was destined to become an electronics freak. In 1982, Sven, a friend since first grade, borrowed a hand-held computer the size of a large paperback from someone at his school and took it home. Hans began to program it immediately, as if he had been programming all his life. Though a miserable English student, he had learned enough to write his first BASIC program, a loop that produces an infinite number of hellos: 1 0 print 20 goto 10 "hello" It was a rudimentary program, to be sure. Later Hans was to develop an elegant self-taught programming style. He had a logical mind, stimulated by the discovery of an ability to create something from nothing. He was transfixed. Squatting in abandoned houses had its pull, and spending time with girls was nice enough, but here was something that could command Hans's attention as nothing ever had. It wasn't long before the hand-held computer yielded to mail-order kits for bigger computers that had to be soldered together. As their first big project Hans and Sven put together an entire computer—a Sinclair. Until the advent of the Sinclair, personal computers, even those assem bled from kits, were out of the reach of most young pockets. But now, for $250, Sven and Hans could buy a complete computer. Even measured against the standards of the day, the Sinclair was exceedingly primitive. At that time Apple Computer, Commodore and IBM were already on the market with machines that look similar to what people now use. But all that the two young Berliners could afford was a kit that, once assem bled, resembled a small box of chocolates plugged into a television set. The software for the Sinclair came on tape cassettes, not on the floppy 148 a CYBERPUNK disks of today. The machine had very limited memory, but it was enough to write a program or two. For Hans, the Sinclair provided a taste of the hidden power of the machine, of binary worlds to be explored. Even as the computer lay in pieces in his room, waiting to be assem bled, Hans was getting ready to start programming it. He had taken the programming manual with him on a vacation to southern Italy that summer with his father and his father's girlfriend. Culture just annoyed him, and if the two adults coaxed him into accompanying them to museums and ancient churches, he sulked. Finally, they gave up and left him in the rented villa, inseparable from the book. When Hans returned from Italy, the two budding computer experts spent day after day in Hans's room, a dark little chamber covered with graffiti, putting together the Sinclair. Oddly enough, although Hans had never done much with his hands, and wouldn't have known what to do with a hammer, his instincts for putting together the computer were perfect. But after he had put it together, his desire for a better computer was immediate. As soon as he could, Hans ordered a more powerful model, the Spectrum. It had the same design as the Sinclair, but twice the internal memory. Circumventing rules became an early obsession for Hans. His main activity in programming was piracy—he attempted to bypass the copy right restrictions on the commercial software cassettes, mostly games. Hans wrote little programs that allowed him to load a game into the computer, save it and put it onto another cassette. It was a challenge to the young hacker, not an ethical question. If the publishers tried to build anticopying devices into their programs, they just had to expect hackers to try to unravel them. Hans and Sven turned into computer-game freaks. Their favorites were those with good graphics, arcade-style games that involved some relatively simple task, such as shooting lasers at successive waves of bugeyed aliens. These electronic games really came to life when played on the colorful, large screens at a video arcade. Hans was spending much of his free time at the video arcade around the corner from his school. The arcade was run by a shifty character who hired teenage boys willing to work in exchange for the privilege of communing with the electronic gadgetry. For doing minor repairs on the games, renting out videos (mostly pornographic) and generally watching over things, Hans had the run of the place. He also set up something of a pirate's copy center, making illegal copies of Sinclair Spectrum software for all his friends. The arcade also provided the setting for his first true hack. Hans Pthfe mU P*u>jut E
Pwjtct E*i<**ltyt, T 167
friends, Hess dismissed the Illuminatus theories as so much nonsense,
but like everyone else he was drawn in by Hagbard's soft-spoken zeal.
Unlike the other three hackers, Hess had no use for the drugs that he
saw at once sustaining and destroying Hagbard. Hash was the mainstay,
but LSD appeared to be the drug of choice for Hagbard and the major
inspiration for his paranoid fantasies. Hess's only real vice was his chain
smoking, accompanied by the occasional beer. And whereas he main
tained a semblance of order in his two-room Hannover apartment, Hag
bard inhabited chaos. He lived in a surround of overflowing ashtrays,
heaps of dirty laundry and other signs of the necessities of daily life not
just neglected but transcended.
As one of the few on the West German scene specializing in UNIX,
Hess was something of an oddball, and he wanted nothing to do with
organized hacking, so he had no use for the "VAXbusters" from Ham
burg. Further, their area of expertise, VMS, was of no interest to him.
Besides, Hess had a real job at Focus to attend to; he didn't have Hag
bard's freedom to devote every waking moment to hacking. Even if he
had, he wasn't sure he would be able to sit as Hagbard did, with a
meditator's stillness, oblivious to outside distractions for hours on end.
However, it was such an infectious passion that before long Hess was
using any spare moment he had exploring networks. In a way, it was
Hess's own break from the predictable way of life he had always known,
with its built-in constraints and expectations. Hess may not have been
interested in group hacking or VMS, but he was interested in hacking
into UNIX systems. Most of the time, he stayed late at Focus and worked
from there. Sometimes he used Focus's NUI, sometimes he used his own,
legitimately acquired NUI. Only occasionally did he resort to the stan
dard practice of using stolen NUIs. That, as far as Hess was concerned,
was straying too far toward questionable ethics.
One of the most useful lessons Hess learned from Hagbard was that
this pursuit required endless patience. It meant sitting for hours on end,
dialing and redialing. Once you had reached a system, and the friendly
log-in prompt at a computer's portal asked for an account and password,
it meant more time expended in getting in. Once you were on the
machine, exploring its crevices and testing the limits of your powers took
still more perseverance. Although Hagbard was no programmer, and was
fully dependent on others to write programs for him, his infinite patience
and utter single-mindedness made him a more effective cracker than
many of the others.
168 a CYBERPUNK
Part of the tremendous attraction of computer networks for Hess,
Hagbard and Pengo came from knowing that beyond their underpowered
little personal computers, or even beyond Focus's comparatively more
powerful machines, there was always a larger, faster machine somewhere
to be explored. If a log-in prompt appeared, and a password worked, the
next task would be to try to guess the type of the machine and how
powerful it was. Privileges, sometimes referred to as superuser status,
were frequently a goal. Unlike Hagbard, Hess and Pengo could try some
creative programming once they were inside a computer. They could use
operating system commands and write programs to find and exploit weak
nesses in operating system security.
Once an intruder obtained superuser status, it meant that the machine
was entirely under his control. It was possible to read and change peo
ple's files, peruse their electronic messages, destroy their work or even
do their work for them. The ultimate benign hack would be to send
someone a note announcing that the intruder had just visited and had
found—and fixed—a bug in his program. Nothing could be protected
from a superuser. And hacking was far more efficient than rifling through
a roomful of filing cabinets, scrutinizing every scrap of paper for some
thing interesting. The power of the computer could easily be turned back
on itself. The machine could be instructed to show a list of all its
documents that mentioned a key word or phrase, such as classified or
nuclear, or whatever an intruder was seeking.
Like the others, Hess was transfixed by the sheer number of possibili
ties. The Arpanet alone linked thousands of computers. It in turn was
part of the Internet, a network that linked so many computers that no
one was really sure how many there were.
Pengo's first visit to Hannover ended when, at a party at Hagbard's,
Dob said he was on his way back to Berlin and asked Pengo if he wanted
a lift. It was five in the morning. Pengo had been away from home for
two weeks. He had run out of money and clean clothes and he welcomed
the ride. When they got into Dob's sports car, Dob produced a nugget of
hash the size of a walnut. The two smoked it as they sped through East
Germany at over one hundred miles an hour. Dob told Pengo he made
the trip all the time, always at high speed, and always in an altered state
of mind. Dob liked to carry out logistical chores such as a trip from
Hannover to Berlin in the most efficient way possible, even if it meant
placing his life in danger.
Pengo enrolled at the technical university in Berlin to study computer
science, but he couldn't stay away from Hannover too long. He started
Puty mU Pi*jut E*i<**kyt\ T J 69
to travel there frequently to spend a few days at a time with Hagbard. A
visit usually started off with a round or two of hash and progressed to allnight hacking sessions. Once or twice, they went to Focus to visit Hess
and watch him hack from there.
A T A
It would have been natural to select Cliff Stoll out of a lineup of sus
pected computer fanatics. Skinny Cliff had a maniacal edge to his per
sonality, cultivating what might even be a parody of the eccentric
scientist. Wild corkscrews of brown hair projected six inches from his
head; he had the gait of a pogo stick, a yo-yo always in hand and in
perpetual motion. Stoll's speech was punctuated by a parade of excla
mations—"Hot ziggity!" and "Holy smokes!," "Jeez" and "Really, really
neat!" If his computer kept him waiting for more than half a second
before executing a command, he would yell "Commie!" at it. In fact,
"Commie!" was the mocking charge leveled against any recalcitrant
inanimate object.
Stoll's political views leaned appropriately leftward, in part because it
never occurred to him to think otherwise. He went to college during the
1960s, and he opposed the Vietnam War, but he wasn't much of an
active crusader for the Left. In fact, he considered himself a nonideologue who resisted left-wing dogma. He operated more on his principles.
It was on principle, for instance, that he made certain that all of his
employers were involved in nothing but the purest of research. He
couldn't bring himself to work for the Lawrence Livermore Laboratory,
a government research center whose bread-and-butter projects include
designing nuclear warheads and Star Wars weapons for the U.S. mili
tary, to say nothing of the National Security Agency, whose computer
scientists were, by definition, spies.
So in 1986, Stoll took a postdoctoral job at Lawrence Berkeley Labo
ratory designing mirrors for the Keck Observatory in Hawaii. High atop
the Berkeley campus, LBL is Livermore's sister laboratory thirty miles to
the west. LBL is one of the United States' national research labs and the
site of broad-based unclassified scientific research. When Stoll's grant
money ran dry in late 1986, he was forced to look for something else to
do.
For an astronomer in the midst of the Reagan era it wasn't an unusual
fate. Federal money to support the basic sciences was shrinking. The
money was over the hill, literally, at the weapons laboratories. As it
happened, the computer knowledge Stoll had picked up in high school
170 a CYBERPUNK
and college gave him a certain advantage over other astronomers who
lost their funding. In August 1986 he became a system administrator, in
charge of maintaining the laboratory's dozen mainframe computers. This
meant being responsible for everything from backing up important data
and taking care of computer security to helping the scientists who were
his customers use the powerful machines more efficiently. Although it
wasn't exactly the work he was looking for, it allowed him to stay in
Berkeley.
One of his first assignments seemed simple enough: to reconcile a
small accounting error that had shown up. LBL used some home-brewed
accounting software, and the patchwork of programs, written by summer
students over the years, had come up with a seventy-five-cent discrep
ancy between the normal system accounting and the lab's own charging
scheme. Cliff stayed at work until midnight puzzling over the mysterious
seventy-five-cent error, which he suspected might be a computational
rounding error.
After careful examination, he discovered it wasn't a rounding error,
but the work of an unauthorized person from outside the lab using the
account of an LBL researcher who had left several months earlier. With
characteristic gusto, Cliff became a self-appointed one-man SWAT
team. He set up traps that captured the hacker's every keystroke on a
printer and alerted him every time the intruder was in the computer. He
kept a detailed logbook, and he wrote a software program that tripped
his pocket pager whenever the trespasser logged on. Before long, he was
doing little else but tracking the uninvited guest. Occasionally he even
slept in his sleeping bag on his office floor to keep a constant vigil over
the hacker.
Finding an intruder on a computer system is often as serendipitous as
guessing the correct password to break into a system. Detecting a breakin can be a matter of timing, perseverance and ultimately luck, especially
if the trespasser takes steps to cover his tracks. It requires the same skills
that the hacker himself employs, and it can often mean getting inside
the hacker's head to anticipate his next move. A system manager like
Cliff Stoll hunts down an intruder not only because computer security
has been broken. It's also a matter of wounded pride, and a threat to the
institution's ability to keep its doors to the outside world open and keep
hackers out at the same time.
Stoll gradually began to understand the hacker's strategy. By exploit
ing a mistake in the way LBL's computer managers had installed certain
software, the intruder had managed to give himself privileges on the
Pt*$e mJ- P\oyUX E^i^tA ▼ 171
system that are usually reserved for system managers. As a result, the
intruder was able to create accounts with names such as Hunter and
Jaeger, assigning them such passwords as Benson and Hedges. And the
hacker was careful: every few minutes, he typed the command "who,"
which listed everyone using the computer. Evidently, he knew how to
log out in a hurry. If the hacker thought he detected a legitimate system
operator on the computer, or someone else with full privileges, in a
single keystroke he could instantly disappear back into the electronic
beyond.
Stoll didn't know, of course, whether it was indeed just one hacker
plaguing his computers or a gang. Some empirical evidence seemed to
support the case for just one hacker, but he wanted to be certain. So he
set up a scientific probe, to see if he could discern typing patterns from
among thirty colleagues at the lab. Once he decided he could, he applied
the same test to the hacker's typing rhythms and discovered that most of
the time the typing came across the telephone lines in methodical,
evenly spaced strokes. Only occasionally was the typing more random,
as if someone might be hunting for the keys. He didn't pause to consider
that by the time the keystrokes had been transmitted through interme
diate computers and data networks, all of the information that could
identify the typist had long since disappeared.
The most obvious solution to the problem would have been to lock
the hacker out entirely. And that would have been simple. Stoll needed
only to change all the lab's passwords and tweak a piece of software
called GNU Emacs that ran on LBL computers. A powerful program
mer's text-editing program, GNU Emacs was used by nearly everyone at
LBL.
Because LBL programmers had installed GNU Emacs on the lab's
computers in a way that gave a user special privileges, any user could
access any file on the system using a command called "movemail." In
effect, LBL created a hole in computer security—an effective window
into normally inaccessible areas within the computer, and the hacker
had discovered this. Stoll was beside himself. He decided that instead of
slamming the door and keeping the hacker out, he would let him roam
through the system with relative freedom and catalogue his every move
—and then trap him. He reasoned that by keeping the system open he
could get the hacker to stay on the line long enough to let the phone
company trace him back to his lair.
What really was the danger of an interloper browsing around anyway?
The information in the system was often personal but, as far as the LBL
172 a CYBERPUNK
system was concerned, not vital for national security. The hacker could
peruse grant proposals and information about the computer system, as
well as electronic mail carrying gossip, news and love letters. Stoll's
salary and resume were open for browsing, too.
To Stoll the problem was not so much the hacker's rummaging around
the LBL computer as his use of that computer to ricochet his way to
other computers over the Arpanet—to virtually anywhere in the Inter
net. With the simple command "telnet," the hacker could instruct the
LBL computer to connect to Internet computers anywhere in the world,
at military bases and Pentagon contractors and research laboratories. He
had only to come up with an account and password for those computers.
In fact, the hacker was losing interest in the Berkeley machines, and
was just using them as a launchpad to others, especially those on Milnet,
the unclassified military network connecting Defense Department instal
lations.
Given Stoll's studious avoidance of military matters, he had no real
idea what went on in those computers, but their locations alone sounded
like serious business: Redstone Missile Command in Alabama, the Jet
Propulsion Laboratory in Pasadena, Anniston Army Depot, Navy instal
lations in Virginia and Florida and the Air Force Systems Command
Space Division in El Segundo, California. Not only was the hacker
logging on, but he was directing his searches in an ominous way. He
told the computer to seek out files containing such words as stealth,
nuclear and NORAD. He latched on to files about the space shuttle's
secret missions.
Stoll had heard a lot of stories about hackers from colleagues at Stan
ford, fifty miles south of the San Francisco peninsula, and Fermilab, near
Chicago, but they had struck him as harmless pranksters. This interloper
seemed different. Stoll was stunned by the hacker's ability to traverse
the nation, nudging computers open just by guessing obvious passwords.
The nation's computers appeared to be surprisingly unprotected. A guest
account, for instance, might have guest as its login and guest as its
password. Or the login might be a user's last name, the password his
first. So the hacker could ask the computer to show him a list of users
on the system, then try breaking in simply by typing in people's names.
On the handful of occasions that the hacker managed to give himself
superuser status, he would create his own accounts or change passwords
of existing accounts for his future use.
When the hacker hopped over the network to a computer at Lawrence
Poi^o **J> Pi* jut E^sl^A ▼ 173
Livermore, Stoll panicked. He called Lawrence Livermore and told the
system manager to shut down that machine.
A T A
In 1986, thoughts of breaking into computers for money were beginning
to waft through the air. One Hamburg district attorney had developed a
theory of how young hackers might unwittingly allow their computer
expertise to be exploited for purposes of industrial espionage, or even by
the East Bloc: Communist agents, he reasoned, already expert at manip
ulation, would have no trouble engaging the minds of wayward teenag
ers. Not only did nervous West German authorities and imaginative
computer crime experts have their own finely crafted theories about the
potential for exploiting impressionable young hackers, but the hackers
themselves were beginning to see what was possible.
Sometime in early 1986 the West German group decided to try in
earnest to market its talents. Back in Dob's Hannover apartment, under
the influence of many pipes of hash passed back and forth, Carl, Dob
and Hagbard had a night of intense discussion. The first question, of
course, was how to execute the initial contact. One idea was to go up to
the door of the Soviet embassy in Bonn. Another idea, lifted perhaps
from the pages of an espionage potboiler, was for one of them to slip a
note written in code into his passport, a missive that would alert a border
guard to his mission. It was a fine idea, all agreed, but no one was quite
sure what the note should say. Peter Carl didn't have the technical talent
of his colleagues but he had made up for that with sheer bravado and a
sense of the possible, so the intrepid Carl readily agreed to travel to East
Berlin and do a little cold calling. The idea was simple enough: they
were hackers who could get into some of the world's most sensitive
computers. From those computers they could extract sensitive informa
tion, information they knew would interest the Soviets. What was more,
they could provide the Soviets with some of the software they needed to
catch up with the technologically more advanced West. Why shouldn't
the Soviets want to do business with them? Of course it was illegal. They
all knew that. But in selling the Russians military and scientific infor
mation, they argued, they would be doing their part for world peace. A
name for the project? Equalizer.
The idea was not to teach the Soviets how to hack themselves but to
keep them dependent on the group somehow, to tell them just as much
as they needed to know to stay interested, but not so much that they
174 a CYBERPUNK
would be able to hack on their own. If the hackers were going to sell the
access codes and hacking knowledge itself, then it would have to be a
onetime deal and their price would have to be steep. A million marks,
they decided. For that they would tell the Soviets about networks, and
throw in the lists of logins and passwords for computer systems world
wide. The night wore on, and so did the hash. More hacking business
ventures came to mind. Why restrict themselves to doing business with
the Soviets? Why not include the Chinese? That idea was discarded
when the group agreed that China wasn't enough of a player in the
struggle between world powers. Project Equalizer had to stay focused.
Hagbard and Dob took on the job of putting together a "demonstra
tion package" to show to their future business partners. Hagbard assem
bled a list of logins to computers, including those at SLAC in California,
a computer at the Department of Energy and the U.S. Defense Depart
ment's Optimis computer. Once Hagbard had opened a computer, he
left it to Dob to do research inside the computer, looking for material
that might interest the Soviets. One document with the title "Radioac
tive Fallouts in Areas 9a and 9b" sounded good. So did one called
"Propellants of ICBMs." Once he had downloaded the data, Dob trans
ferred it onto diskettes and made printouts of each file, being careful to
delete any clues to passwords and break-in methods. All told, they gath
ered material from thirty different computers.
In early September 1986, Peter Carl drove across East Germany from
Hannover, left his car in West Berlin and took the subway to the Soviet
trade mission in East Berlin at Unter den Linden. He approached a guard
who was seated behind a glass partition, introduced himself as Peter Carl
from Hannover and asked to speak to someone from the mission, as he
had a business proposition to discuss. He assumed it was obvious that he
was there to speak to someone from the KGB. The guard told him to
take a seat. After a thirty-minute wait, a man appeared in the waiting
area and asked Carl what he wanted to propose. Carl explained that he
was a hacker from the West with access to interesting information, and
he wanted to propose a business deal. The man nodded and disappeared.
Ten minutes later, a tall, dark-haired man emerged from the building's
recesses. He introduced himself to Carl as Serge, the French pronuncia
tion of the Russian name Sergei, and showed the visitor into a sparsely
furnished conference room.
Sergei asked Carl what he had in mind. Carl explained again that he
was a member of a group that could get its hands on interesting infor
mation. Sergei was only vaguely familiar with the term hacker, and asked
Pu^c toU P*ejut E<)4**kyt\ ▼ 175
Carl to explain. Carl described most of what he knew. He said hackers
were people who could break into computers and retrieve information
and programs quickly and surreptitiously. Sergei still appeared to be
confused, but his interest was piqued and he asked for more specifics.
This particular band of hackers, Carl said, had the means to break into
dozens of Western computers and get everything from information on
high-energy-physics research to proprietary banking data. Carl said he
would like to offer the Soviets a package of West German hacking knowhow, including logins and passwords to dozens of military computers in
the United States. His price: one million marks—more than half a
million dollars. Sergei raised his eyebrows but remained silent.
Carl kept talking. He wanted very badly to appear to be someone
worth one million marks. He had a salesman's delivery and a salesman's
confidence even if the terms he tossed around were not quite accurate.
He said he didn't have the demonstration package with him, that it was
in West Berlin, ready for him to pick up and deliver to Sergei. He hadn't
wanted to bring it with him on this first trip, as there was no telling who
might search his bags.
Sergei must have been amused and curious. If nothing else, the ap
pearance of a computer hacker at the trade mission in East Berlin had
no precedent. As a rule, when it came to gathering technology the
Soviets had a long tradition of doing their own fieldwork. Since most of
what they were interested in, especially technology for advanced com
puting, was on a list of highly restricted technologies maintained by a
consortium of Western nations known as COCOM, the Soviets had
long since resorted to extralegal means of procuring hardware and soft
ware. The FBI liked to maintain that Northern California's Silicon Val
ley, where much of American computer innovation resided, was
crawling with KGB agents. The FBI claimed that one of the primary
missions of the Soviet consulate in San Francisco was to funnel U.S.
technology into the Soviet Union. The consulate building was suspected
of having a hidden forest of antennae and other surveillance equipment
on its roof—all targeted at capturing sensitive telephone calls in Silicon
Valley.
Through the years, a smattering of Soviet espionage cases had become
public, but only because the spies were caught. The Soviets acquired
advanced computers by hiring agents to set up dummy companies, order
whatever was needed and then fold quietly. For the most part, the
Soviets had a long-standing practice of reverse-engineering technology
based on what they were able to gather. Of course, there was no way the
176 a CYBERPUNK
Soviet Union was going to build a technological infrastructure by that
method. Nevertheless, it was a system the Soviets continued to use
partly because of trade restrictions, and partly from a simple predilection
for doing things that way. All told, their software was a motley collection
of retooled operating systems and compilers, roughly equivalent to the
American originals but transposed into Cyrillic. Their hardware was
based principally on VAX and older IBM 360 designs and they were
always on the lookout for good VAX software, especially VMS source
code.
Given the ease with which American computer networks can be
entered from a safe redoubt outside of the United States, it isn't hard to
consider the possibility of a sophisticated Soviet intelligence-gathering
operation targeting the vulnerable computers of commercial American
high-technology ventures and nonclassified U.S. military systems. In the
early 1980s, officials in the Reagan administration expressed alarm at the
existence of a circuitous computer link that would have allowed Soviets
in Moscow to log directly in to American computers: an out-of-way
international research center located outside of Vienna and known as
the International Institute for Advanced Statistical Analysis was con
nected by a commercial computer network to the United States and had
a direct computer tie to a research center in Moscow. The institute lost
its U.S. funding as a result of the computer link.
Some American officials argued that even though nothing secret was
accessible from the center, it was conceivable that the Soviets could use
the power inherent in computers to scan quickly through vast amounts
of information and piece together a clearer picture of classified data. But
there was no evidence to support this scenario, and several years later
U.S. funding for the Vienna institute was quietly restored.
Whether the Soviets truly had designs on young computer outlaws is
unclear. That the Soviets would have called upon a select group of young
experts to rummage around inside U.S. computers for them, or would
have dispatched someone like Sergei on a recruiting spree to the Chaos
meetings in Hamburg, was probably a notion that existed only in the
minds of nervous Western officials. But with this self-described hacker
on his doorstep promising tapes filled with digital delicacies from the
West, it wasn't surprising that Sergei considered the idea worth pursu
ing.
The Soviet official made it clear to his visitor that while he was by no
means uninterested in what Carl was suggesting, he could hardly agree
to hand over a million West German marks for something he not only
Poi~£e mU P\ejut E<\**Lyi\ ▼ 177
hadn't seen but didn't quite understand. And Carl himself, still strug
gling with some of the technical concepts with which his cohorts seemed
so comfortable, was in no position to deliver an extemporaneous lecture
on the navigation of data communications networks, the computers that
resided on those networks or the specific information they contained.
Like that of any marketing man, Carl's job wasn't so much to understand
what he was trying to sell but, by virtue of his unerring enthusiasm, to
convey the value of his product. But even Sergei's most basic questions
were too tough for him. Sergei asked Carl to return in the next few days
with his demonstration package. It would be sent to Moscow for a thor
ough analysis and, if it were deemed to be worth a million marks, then
a million marks would be forthcoming. Sergei then asked to see Carl's
passport. He took some notes and left the room briefly. When he re
turned, he told Carl that the next time he came, as long as he used the
border crossings at Friedrichstrasse and Bornholmer Strasse, the guards
would let him pass freely.
Two days later, Carl took Dob's car and drove to the border at Born
holmer Strasse. After a brief glance at his passport, the guard waved him
through. At the trade mission, he asked for Sergei. This time, Carl had
with him the demonstration package: an index to computers around the
U.S., with Pentagon computers at the top of the list. Under each head
ing was an index of what was contained in the individual computers.
Account names and passwords had been carefully deleted. Sergei re
mained polite but skeptical. This time, Sergei gave Carl 300 marks for
his expenses and made out a receipt. He also gave Carl a telephone
number in East Berlin where Carl could reach him. He told Carl to learn
the number by heart and to call only in an emergency. Carl used part of
the money to fly back to Hannover. With the rest, he went straight out
and bought a small Casio electronic notebook, where he entered Sergei's
telephone number. When he spoke on the telephone to Hagbard or Dob
about his trip, he imparted his information in an appropriately cryptic
manner. Paris meant East Berlin. Teddy Bear stood for Sergei, Russia and
the East Bloc. Equalizer, of course, was understood by all as the code
name of the operation.
A week later, on instructions from Sergei, Carl appeared at a building
on Leipzigerstrasse, a main thoroughfare for traffic in and out of East
Berlin. He took a rickety elevator to the fifth floor. From what Carl
could observe, the office served as a business dealing in heavy machinery
and railroads. Sergei greeted him, and this time they had a general
conversation. Sergei wanted to know more about Carl's background.
178 a CYBERPUNK
Carl could only assume that Sergei hadn't yet received word back from
Moscow on the demonstration material. From then on, Sergei said, their
meetings would take place at the Leipzigerstrasse location.
At the next meeting the following week, Sergei told Carl that he had
gotten a response from Moscow. While the package contained some
interesting information and bore out Carl's claim that the group could
get into certain interesting computers, it wasn't exactly what they were
looking for. More to the point, a million marks for the demonstration
package was out of the question. However, Sergei was interested in
certain things that could bring the hackers some money. While he
wasn't interested in general hacker know-how per se, he wanted to know
if Carl's group could produce information about radar techniques, nu
clear weapons and the Strategic Defense Initiative. Moreover, he said,
the source code for VMS and UNIX, compiler programs and programs
for computer-aided design and computer-aided manufacturing could
bring the West Germans a tidy sum. Sergei said his customers back in
Moscow also wanted software from the American firms Ashton-Tate and
Borland, two highly successful personal computer software companies.
Such an exchange wasn't precisely what Carl had in mind. He had
imagined that he would present Sergei with a menu of sorts, courtesy of
Hagbard and Dob, and that Sergei would tick off the various computers
he was interested in. Then Carl would dispatch Hagbard to root out
whatever he could. But Sergei appeared to have a different notion of
what a hacker could provide. Not only was Carl not altogether certain
he could get what Sergei needed, but he wasn't altogether certain what
Sergei was talking about. Source code and compilers? These were things
to consult with Dob about. It was beginning to look as if the things Carl
had to offer Sergei didn't want, and the things he wanted Carl couldn't
offer. Nonetheless, Sergei remained sanguine about the prospects of
what Carl and his friends might be able to supply. This time, he gave
Carl 600 marks, or $300, for his expenses and took him out to eat. Over
lunch, they made small talk. Carl learned that Sergei was married with
children, and that he liked to go fishing. But when Carl asked him to
explain precisely what his job was, Sergei declined to answer.
Sergei gave Carl photographs of a young woman and a small child,
along with the woman's name, address and telephone number. In the
event that his frequent trips to East Berlin should prompt Western au
thorities to question him, Sergei said, Carl should tell them that he went
to visit his girlfriend, with whom he had a daughter.
Sergei seemed to keep at least two lists containing names of data bases
Pch$e> mU P*cjuX Entity, ▼ 179
and software. It appeared to be a priority system of sorts, as the lists had
a numbering scheme and items that were crossed out. By the fifth meet
ing or so, Sergei asked Carl to tell him something about the others in
the group. Carl told him about Hagbard and Dob while Sergei made
notes in a black binder.
And so the meetings went, once every week or so, through late 1986,
always starting at noon, always consisting of a meal in a restaurant at
which Sergei smoked Marlboros, drank glass after glass of orange juice
and at the end handed Carl 600 marks for his expenses. Even when Carl
had nothing to deliver, he went anyway, just for the 600 marks. Occa
sionally Sergei gave Carl small presents: a nice cigarette lighter, a bottle
of spirits, some Russian caviar.
In spite of Sergei's measures for protecting Carl and his generally
solicitous manner, the Soviet didn't appear to be particularly satisfied
with what he was getting. Most of the material, he told Carl, consisted
of indexes to information rather than the information itself. And that
was often available only on microfiche. So Sergei brought his own com
puter expert to one of the meetings, but the expert could speak only
English and Russian. He and Carl could barely communicate. Carl was
frustrated. He didn't want the entire business going sour just because of
a communications problem. So he asked Dob to accompany him on one
of the trips to East Berlin. Carl told Dob that he would be able to clear
things up because he would be able to understand exactly what Sergei
was looking for. It took some persuading, but Dob finally agreed to go.
During the meeting Sergei explained once again that he was not going
to buy the hacker know-how for a million marks, and that he wasn't
satisfied with the material that had been delivered so far. His interest,
he emphasized, was in information from U.S. military computers, source
code and compilers. Dob knew exactly what Sergei was saying, but the
meeting was a disappointment. He didn't see that he would be able to
get source code, nor could he get very excited about the idea of making
a lot of small, low-paying deliveries over an extended period.
Then Carl told Sergei about Pengo. He told him that Pengo was
a particularly capable hacker specializing in VAX computers, and that
he could get good material. The Soviet expressed a great deal of inter
est in what Pengo might have to offer. He said he wanted to meet
him in person and make his own assessment. Carl said he would bring
him by.
A T A
180 a CYBERPUNK
Meanwhile, Cliff Stoll's vigil wore on. He was obsessed with his hacker;
all but the most basic housekeeping for the lab's computers was shunted
aside. And the hacker seemed to get even more single-minded. It be
came clear to Stoll that this was no mere computer science student
romping in an electronic playground—he had developed a keen interest
in things military. Now he seemed to want to see files pertaining to
intercontinental ballistic missiles and the Strategic Defense Initiative.
Stoll watched him try with a persistent series of educated guesses to get
into a computer at the White Sands Missile Range:
login: guest
Password: guest
Invalid password, try again
login:
visitor
Password: visitor
Invalid password, try again
login: root
Password: root
Invalid password, try again
login: sys t em
Password: manager
Invalid password, disconnecting after 4
tries
If it seemed that the hacker could cause some harm in the system he
was poking around in, or if Stoll thought that the people in charge of
the computer should know there was a hacker poking around in their
data, he would call them. Perturbed and incredulous at first, they would
close the hole that the hacker had used to climb in. So far the hacker
hadn't found any sensitive national security data, or at least Stoll didn't
think he had. But it was almost certainly on his agenda.
The hacker plaguing Cliff Stoll didn't seem to be much in the way of
a computer genius. He was seldom inventive. In fact, his most remark
able trait was his plodding persistence: he created connection after con
nection, then, like a dog trained to sniff out drugs, systematically
searched each system for military information. Long after Stoll had be
come overcome with fatigue, the hacker would continue twisting door
knobs. Stoll began to think the intruder might not be human at all.
Could it be a robot, a computer programmed to look for military infor
mation? Stoll decided that it wasn't, simply because whatever it was
made spelling errors.
Pohfe MUP\*jutE^4**JUytx ▼ 181
At first, Stoll believed the intruder to be somewhere on the Berkeley
campus. But there was evidence against that theory. The hacker was
very familiar with UNIX, but his behavior showed that he didn't know
anything about Berkeley UNIX, a variation on UNIX that was de rigueur
in Berkeley. Instead, he was using the traditional UNIX commands first
developed at AT&T's Bell Laboratories. He was speaking UNIX with a
strong AT&T accent.
From the high keep of various universities, Stoll had never had much
cause to interact with the outside world. His view of things left little
room for shades of gray. As Stoll saw it, scientists who engaged in pure
research and divorced themselves from the military were on the right
side. The CIA, NSA, FBI and military establishment were, by contrast,
sinister and shifty, not to be trusted. And so was this hacker. Not only
was he inside computer systems that he had no right to be using, but he
was robbing Stoll of his time, time to spend on the work he had been
hired to do: to help the lab's astronomers use computers to design their
telescope. If his more forgiving colleagues were entertained rather than
upset by teenagers who broke into computers, Stoll saw nothing to
excuse. In something of a contradiction to his self-consciously liberal
way, Cliff Stoll was, in the end, a bit of a crank. He saw the hacker as a
dark foe and he wanted to see him behind bars.
If he was going to catch the hacker in the act, Stoll knew he would
have to trace the telephone calls. And in order to trace them, he would
need a search warrant. So Stoll did something that was at odds with his
political sensibilities: he called the local FBI office. He explained that
there was a hacker in his computer who seemed to have a taste for
military information. He was surprised and upset by the FBI's response:
the agency had far bigger things to worry about than a loss of seventyfive cents.
The second call across the great academic divide to the nasty world of
bureaucratic authority proved more successful. The Oakland district at
torney's office was immediately interested. Stoll explained that the
hacker was coming in through one of LBL's Tymnet links. Tymnet's
network ran all over the United States; the hacker could be calling LBL
from almost anywhere. In order to trace the call farther than the Oak
land Tymnet connection, Stoll needed help from the phone company,
and the phone company required a search warrant. The Oakland DA
took care of that.
Pacific Bell, the local telephone company, traced the call from the
Tymnet node to McLean, Virginia, and from there to Mitre Corpora-
182 a CYBERPUNK
tion. An MIT spin-off, Mitre is a Pentagon-funded research center.
When Stoll confronted computer security managers at Mitre with the
news that a mysterious hacker was using it on his way to supposedly
secure military and university computers all over the United States, the
Mitre officials swore it couldn't be true; their computers were absolutely
impenetrable, secured from the outside world, they claimed. But it
turned out there was an enormous hole. The hacker was using a local
area network (these networks tie computers within a building, permit
ting them to communicate locally at high speed) at Mitre to slip around
the side of the company's computer security protections. He would dial
into a pool of modems at Mitre that were shared by the local area
network and then use the same modems to dial back out again.
The hacker used the loophole as his personal bridge to reach other
computers. It was costing Mitre thousands of dollars in long-distance
telephone calls because when the hacker called from Mitre he stopped
network hopping and started dialing directly into other computers. He
had also planted a Trojan horse program in the Mitre system that cap
tured passwords as others typed them in and copied them to a hidden file
he could retrieve later. Mitre's computer people were shocked by this
discovery. They pleaded with Stoll to keep the whole matter secret. For
the public to discover that a defense contractor engaged not just in
classified work but with contracts to build secure computer systems had
fallen prey to a hacker would have been a disastrous turn. In exchange
for that promise, Stoll coaxed Mitre out of its past months' telephone
bills. From scrutinizing the telephone bills, he discovered that the hacker
had been active for several months before Stoll had even detected him
—for far longer than Stoll had thought. Stoll had already counted close
to thirty computer systems the hacker had broken into. The number of
attempts was at least ten times that.
Soon after the phone company had completed the Mitre trace, Stoll
watched the hacker jump from LBL into the Milnet Network Informa
tion Center, a computer network directory information service, where
he discovered four network addresses and telephone numbers for CIA
personnel. The hacker wasn't actually inside a CIA computer. That
would have been far more difficult, because those machines are not
directly connected to public computer networks. But he seemed to be
getting closer. Stoll wrestled for a moment with his conscience. Why
consort with the Establishment and alert the CIA to the electronic spy
in its midst? Why not just drop the matter right there and let the hacker
romp unchecked? But before he could do much more ruminating, Stoll
Pvh^O MU P\*JUX E<)4**kytA, t 183
was reaching for the telephone and calling the phone numbers the
hacker had discovered. In contrast to the tepid response Stoll had gotten
from the FBI, the CIA immediately dispatched four people to Berkeley
to discuss the matter.
A T A
It hadn't taken much to convince Pengo to join Project Equalizer. At
first, Dob flattered him by letting him know how much they needed him
and by telling him that Sergei had expressed a particular interest in
meeting him. Hagbard had too many limitations. Given enough phone
numbers and passwords, Hagbard could browse for hours inside VMS
systems. He knew how to log in and find a directory. He knew how to
search for keywords and files. He knew what a disk was and where
electronic mail was stored. But beyond that, he was lost. Ask him, for
instance, to determine which machines were connected to the system
he was on and he was utterly confused. Often, he was too stoned to work
very efficiently. He needed too much time to think of the next step. A
gifted hacker worked as much on spontaneous leaps of intuition as on
anything else. And for all his grandiose theories, Hagbard couldn't pro
gram. The group needed a VMS expert who could program. Pengo was
the natural choice. Carl made it clear that it could be a lucrative ven
ture.
Pengo had theories of his own on how to get money for hacking. He
developed a three-point strategy. One idea was to sell a certain amount
of know-how and charge a more reasonable sum, perhaps 150,000 marks,
or $75,000. Another suggestion was that he organize some seminars for
the East Bloc, to teach the Soviets about technology and hacking. The
third idea, which Pengo seemed to latch onto with the most enthusiasm,
was to convince the Soviets to set him up to do "safe" network prowling
from East Berlin—that is, to supply him with a top-of-the-line VAX
computer with plenty of storage capacity, a high-speed modem for fast
data transfer and secure telephone lines that couldn't be traced. Of the
three ideas, the last one seemed to have the most potential: it would
give the Soviets the software they needed while providing Pengo with
some easy money. That, Pengo decided, was the idea he would empha
size with Sergei.
But he could hardly meet Sergei empty-handed. At Carl's urging,
Pengo looked for something to take over as a first enticement. Any
software he could get his hands on, as long as it seemed impressive,
would probably do. First he managed to procure a magnetic tape contain-
184 a CYBERPUNK
ing some software from previous forays—a chip-design program called a
PAL assembler from a hack into Thomson-Brandt, the state-owned
French electronics manufacturer, and smaller programs for the VAX.
But to get something worthwhile from the networks, he would have to
stay logged on to a computer system for a long time. That meant choos
ing a computer on which he knew the security was lax. He had been
inside Digital Equipment Corporation's Singapore computer center be
fore and he knew it fairly well. As far as he could tell, there was little
security at the Singapore facility. The system manager seemed to be
asleep at the switch, seldom checking to see who was logged on to the
computer. It was easy to get on the Singapore VAX with full privileges,
and Pengo knew it would be easy to stay on for a long time. He logged
on late one night and found exactly what he needed. It was a security
program for VMS called Securepack, developed at Digital in 1983 for
internal use on Digital computers. The program, which allowed system
managers to alter levels of privilege on a computer, would make an
interesting nugget for the Soviets. Pengo downloaded the program and
put it onto several diskettes. He also made about thirty pages of print
outs, taking care to delete any information as to how the computers were
actually penetrated.
On the night before the trip to East Berlin, Pengo, Dob and Peter
Carl spent long hours hacking from Dob's room at the Hotel Schweizerhof. Hash was burning in abundance, and although it helped to keep
spirits high, it also produced one unfortunate side effect: when he was
high, Pengo had the habit of dwelling for hours at a time on one prob
lem, which undermined his overall productivity considerably and aug
mented the phone bill. Every few hours, Peter Carl would poke his head
into the room to check on Pengo's progress, and each time he threw up
his hands in disgust. Pengo was costing them hundreds of marks in
connect time, and from what Carl could tell, he wasn't producing any
thing.
Pengo decided to put a digital record of the session from the Schweizerhof onto several diskettes and take those over too. He and Carl
emerged bleary-eyed from the hotel the following morning and started
out for Sergei's office while Dob slept off the excesses of the night. Their
loot stored in Carl's briefcase, they boarded the subway at Wittenbergplatz, a short walk from the hotel. They changed to a different line and
boarded the train that traversed the eastern portion of the city, speeding
past abandoned stations. It was a familiar trip to Pengo. He had been to
Pchfe mU Pie jut E*j4**li%tr T 185
East Berlin many times when he was younger. On Christmas and Easter,
when his parents were still together, the Hiibners from West Berlin went
to visit the Hiibners in East Berlin. And even if Pengo hadn't stopped
to consider the quirk of fate that brought him into the world in the
West, it's likely that his indifference to borders was a sign that he
understood, if only subconsciously, Berlin's provisional nature, a place
where, in the end, allegiance was arbitrary.
Just fifteen minutes from the time they set out, they had reached the
Friedrichstrasse station in East Berlin. With forty-five minutes to spare,
they took a slight detour to Alexanderplatz. Carl produced a fat joint
and lit it, muttering that he needed it. Pengo could only laugh and wave
his hand at the offering. It was too early in the day to get stoned. Besides,
he was nervous.
When Sergei greeted them in his office, Pengo already had an inkling
that this was not going to be an easy sell. He had to convince the Russian
that he was a valuable asset, someone worth investing in. Dob had
portrayed Sergei as someone who knew nothing about computers and
could only recite from a list of things the Soviets might be interested in:
compilers, source code and information from military computers. Pengo
could see that he might not get much further that day. But where Dob
tended to be passive, letting things happen to him, Pengo was more
aggressive and outspoken. He told Sergei that he was well versed in
VMS, and that he could bore his way into many different computers. By
way of example, he named Mostek, a U.S. semiconductor maker; Teradyne, a Boston high-technology company; Thomson-Brandt; Philips in
France; and Genrad in Dallas. He went on to list more conquests:
SLAC, Fermilab, MIT, Union Carbide. If Sergei were interested in
individual accounts and logins, Pengo said, he would sell them. For an
account at the Jet Propulsion Laboratory, for instance, he suggested a
price of 150,000 marks.
Sergei didn't seem to be responding, so Pengo came out with the rest
of his plan. First he suggested that he conduct hacking seminars for the
Soviets. An alternative would be that the Soviets set him up to conduct
safe hacking from East Berlin. Sergei said that didn't interest him. He
took out his order list and read aloud from it. His "customers" back in
Moscow, he said, needed UNIX and VMS source code and compilers.
VMS version 4.5 alone could bring the West Germans 250,000 marks
($125,000), compilers another 30,000 marks each. As for the thirty or
so pages of computer printouts the two young visitors had brought along,
186 a CYBERPUNK
Sergei said he had no idea what to do with them. Nonetheless, in
addition to the customary 600 marks, Sergei handed Carl an envelope
packed with 100-mark notes and invited his two visitors out to a meal.
As he and Carl left East Berlin and headed back to Dob's room at the
Schweizerhof, they counted the money. It was 3,000 marks, of which
Carl gave Pengo 1,000. Pengo felt less discouraged than self-important.
He had made progress. A Russian KGB agent had listened to him talk
for an hour. The Russian hadn't said yes, but then again he hadn't said
no, and when he examined more closely the information Pengo had
already provided, Sergei would be ready to deliver the VAX. Project
Equalizer was becoming Pengo's own first step toward becoming a paid
hacker—not just any hacker, but the best hacker in the world. He knew
that he could get what the Russians wanted, if only he had the right
equipment.
A T A
It was Markus Hess, the one who liked to hack alone, who turned out
to be Cliff Stoll's intruder. When Markus and Hagbard had first met,
Hagbard had told of being in Fermilab and CERN. With a little guid
ance, Markus learned to explore around West Germany and Switzerland
and the United States. Soon, he found a gateway into the Internet
through University College, London. He called Hagbard immediately to
have him come over and watch. The London computer was just the kind
of springboard into the Internet they were looking for. From there they
found a Tymnet node, and from there Hagbard discovered a way into a
bank of modems at Mitre Corporation. Neither knew precisely what
Mitre was, or even where it was, but it was a rich find. The modems at
Mitre, it seemed, saved the last number called, and Hagbard and Hess
could easily redial those numbers. That, was how they first happened
upon a computer at the Anniston Army Depot and Optimis, a U.S.
Defense Department computer data base with information about military
studies. Optimis gave access to anyone who typed anonymous as a login
and guest as the password. Guest and guest did the trick at Anniston.
In the middle of 1986, Hess and Hagbard discovered SLAC in Cali
fornia. Hagbard was content to stay there and poke around a bit, engag
ing the system managers in occasional on-line conversation and chatting
with others who had also found a way into the SLAC computer system.
But Markus wanted to see where he could go from there. From SLAC
he soon found a path that led to the University of California at Berkeley,
and Lawrence Berkeley Laboratory. The Berkeley university computers
Pthfie *+J* PwjuX E*j<**Oyt* T 187
foiled Markus's attempts to get in, but LBL was wide open. The labora
tory liked to encourage outside researchers to use the LBL computers,
and passwords at LBL were often the same as user names. The situation
in Berkeley, in fact, seemed too good to be true. Security seemed to be
a joke to these laid-back Californians.
Hagbard, with his pedestrian approach and his lack of programming
skill, didn't fully appreciate what the LBL computers had to offer. Mar
kus, however, could spot bugs in programs and exploit holes in the
system. He had been playing around with the GNU Emacs umovemailn
program on the LBL computers and it dawned on him that the program
had been installed to run with superuser privileges. It was a major dis
covery. It freed him to wander through the LBL system as much as he
liked. He began poking around in people's directories and looked for an
account to appropriate that had lain unused for some time. It was always
a better idea to use an existing account than raise eyebrows by creating
a new one. He found that someone named Joe Sventek hadn't logged on
for months and decided to become Sventek for a while. With superuser
privileges, he could change his password to anything he pleased. Benson
was one choice. Hedges was another. When he noticed that one of the
people whose directories he was peeking into was getting suspicious, he
logged out at once. From then on, he made certain to check to see who
might be on the system whenever he logged on, just in case a real system
manager was surveying the system's activities.
Sometimes Hess connected straight to America; other times he went
via the University of Bremen, another security sieve, where he added a
new account for himself called Langmann and used the university's mo
dems to dial out to the Datex-P international data network. From there
he got to LBL. Others discovered the fuzzy security in Berkeley. In the
early summer of 1986, a lot of different hackers broke into LBL, partly
because it was easy to get into, and partly because it was so easy to go
from LBL into other computers. And from LBL Hess could explore a
rich array of other computers. Military sites offered a special thrill. He
never logged on without checking a computer for its military informa
tion. Before long, Markus had developed an expertise of sorts in U.S.
military acronyms.
A T A
By late 1986, Stoll had settled into a routine based on the hacker's
movements. Every time the hacker appeared, Stoll's pocket pager
sounded. Whatever the time of day and wherever he was, in the shower,
188 a CYBERPUNK
on his bicycle or sitting down to breakfast, Stoll would drop everything,
call Tymnet to start a trace, then run to a computer, log on to the LBL
system and watch the intrusion. But the hacker wouldn't stay on the line
long enough for a trace to be completed. One Saturday in early Decem
ber, Stoll came a step closer. A Tymnet trace showed one of the calls
coming from a transatlantic satellite, and to the satellite from the DatexP network in West Germany. From somewhere in Germany, it seemed,
the hacker called into Datex-P, asked for Tymnet and then connected
to U.S. computers.
By now, Stoll was locked in a Faustian embrace with the CIA, the
National Security Agency, the FBI, the Air Force Office of Special
Investigations and the Defense Intelligence Agency. But even as he
probed his conscience, he was caught up in the excitement. As far as
Stoll was concerned, any international links to the hacker smacked of
intrigue. He envisioned spies muttering to one another in darkened
alleys. Yet back in Berkeley, there wasn't much he could do. For all his
vigilance, he was powerless. His success in tracing the hacking depended
entirely on the cooperation he got from those authorized to do the
tracing. He kept watching the hacker's every move. The wheels of the
Establishment forces turned slowly; all Stoll could do was conjure up his
own visions of "the other side"—and try to minimize the damage.
If the hacker began to delete files or tamper with a system, Stoll could
use the UNIX "kill" command to disconnect him immediately. And
when the hacker seemed to be getting into computers containing sensi
tive information, or tried to download sensitive files, or what Stoll could
only surmise were sensitive files, Stoll employed a low-tech but effective
solution: he took his keys from his pocket and dangled them next to the
wires connected to the hacker's line, shorting out the circuit for just an
instant. To the hacker, it looked as if his connection was being inter
rupted by simple line noise and he would try again. Again came the
keys. Eventually the hacker would give up.
The next step was to trace the call within Germany. Stoll stood by as
the network experts at Tymnet negotiated with the Bundespost authori
ties to put on a trace. Finally, he got word that the call had been made
from the University of Bremen. The German authorities informed the
university that its computer systems were being infiltrated by an outsider.
Flustered by the news, the university shut down all outside connections
for three weeks. But that didn't seem to stop the hacker. The next trace
showed he was coming from Hannover. But even that wasn't conclusive
proof that he was a German. Who was to say that Hannover wasn't just
Pchfc mU Pwjut E P^ejut E*\4A*ttyA t 247
Redstone Army Missile Base in Alabama and an Army computer at the
Pentagon. The hacker searched for such hair-raising words and phrases
as nuclear, Strategic Air Command and stealth bomber.
"Excuse me," interrupted the judge. "What does stealth mean?"
"I consider myself lucky that I don't know what it means," answered
Stoll. And just as he had done the previous summer before the police in
Meckenheim and the magistrate in Karlsruhe, in court in Celle Stoll
used such words as copy and print out to describe what he saw happening
on his computer screen in Berkeley. "As an astronomer, I wasn't all that
familiar with military stuff," Stoll said. "So it surprised me to see space
shuttle information being copied out." Once he had planted the false
SDInet inside the LBL computer, Stoll testified, the hacker "spent sev
eral hours copying it back to his own home."
This was the very point on which Hess and his lawyer were poised to
attack Stoll's credibility. Hess's lawyer spoke up. "We seem to be having
some trouble with the language," the defense attorney said. "Herr Stoll,
what is really meant with print and copy7."
Stoll began to bounce in his seat. "Excellent question! Excellent!
Excellent!" he exclaimed, as if he were in front of a freshman computer
science class, encouraging a clever student. "To print means 'to look at,
to list, to see.' "
Once that point had been set straight, it was clear that what Stoll
had said in his testimony during the summer, and what he was repeating
in the Celle courtroom, was scant proof that the hacker was downloading
and storing anything at all. It could well have been months of browsing,
mere electronic joyriding and nothing more. Prosecutor Kohlhaas saw
his case weaken.
Stoll's testimony lasted nearly three days. Most of that time Stoll
spent reciting page after page of his logbook. Exact dates and times of
the break-ins were of particular importance, as German telephone offi
cials were expected to come to court immediately after Stoll's testimony
with corroborating evidence matching the dates and times of their tele
phone traces to Markus Hess with the dates and times in Stoll's logbook.
On the final day of Stoll's testimony, it was the defendants' turn to
interrogate the witness. Neither Dob nor Carl had much to ask Stoll.
Hess, on the other hand, was ready for some confrontation, a battle of
technical prowess. Hess first asked Stoll if it wasn't true that he had little
way of knowing that it was the same hacker inside the computer each
time. Stoll agreed that there were some break-ins that occurred on VMS
computers, not UNIX computers, and that with the exception of the
248 a CYBERPUNK
traces made directly to Hannover, he had no way of knowing that it was
the same hacker each time. Hess also wanted to know if Stoll's SDInet
file was his and Martha's own invention entirely. Hess's motive, appar
ently, was to provoke Stoll into admitting that he was in league with the
FBI or the CIA. Hess would maintain to the end that the FBI had
assigned Laszlo Balogh to ask for the information, in order to speed up
the pace of the investigation.
Stoll's answer was curt. "It was fictitious," Stoll responded, "but I
tried to make it look as realistic as possible."
Hess wouldn't give up. He questioned Stoll's "typing rhythms" exper
iment. How could this prove anything given the great distance? Any
unique characteristics would certainly be lost, he suggested, in the laby
rinth of networks between Germany and California. Stoll countered that
he had believed the validity of his experiment.
The interrogation at times required that Hess and Stoll gather in front
of the bench. Together they bent over computer printouts to examine
the details of their arguments. It was odd to see the hunter and the
hunted analyzing documents like two academic colleagues. One morning
before court was in session, Stoll and Hess happened to arrive before
anyone else. It was an awkward but cordial encounter. Hess suggested
that the two get together for a beer sometime. Stoll, an outspoken
nondrinker, nodded politely and excused himself.
By the time Stoll's testimony in Celle had ended, it was unclear
whether he had helped or hurt the prosecution. Ask Stoll what he
considered to be the ultimate value of his sleuthing and he would say,
"Chasing the bastards down." For his part, Kohlhaas was grateful for the
existence of Stoll's logbook, and pleased that Stoll had kept such careful
note of the times the hacker had been inside LBL. Otherwise, the Bun
despost's telephone traces would have been difficult to present in court
as incontrovertible evidence. Then again, Kohlhaas had to admit that
establishing Hess as the LBL hacker wasn't as relevant to the espionage
charge as proving that the information he had seen had gone to the
Soviets. And no one would know until the verdict was delivered how
the testimony was viewed by the judges. For the judges to impose stiff
sentences, the prosecution had to demonstrate that sensitive military
information had changed hands. Prosecutor Kohlhaas's efforts to bring a
U.S. military expert to Celle to assess the sensitivity of the material had
ended in frustration. And in the end, Hagbard's testimony to the police,
in which he had claimed that hundreds of logins to sensitive U.S. and
Ptv^o **J* P\ejut E^id&pA, t 249
European computers went to the East, was stricken from the record for
lack of credibility.
At the time Markus Hess was caught, the media were making him
and his friends out to be half the KGB, when in reality Hess was a fairly
conventional young man who claimed to take inspiration from a movie.
As notorious as the hacker spies became, the judges would have to admit
that the defendants really did very little damage to Western security. In
the end the only person who was damaged irretrievably was Hagbard.
So it wasn't a great surprise when the sentences turned out to be light.
Peter Carl, whom the court viewed as the one most actively engaged in
espionage itself, and the one who exhibited the most "criminal energy,"
got two years and a 3,000-mark ($1,500) fine. Hess was sentenced to a
year and eight months and ordered to pay 10,000 marks; Dob got a year
and two months and a 5,000-mark fine. But instead of having to serve
prison time, all three defendants were put on probation. At the time of
their actions, the judges remarked, Dob and Carl were operating in such
a drug-filtered haze that they were in no position to recognize the gravity
of their deed.
In his conclusions to the court, presiding judge Spiller said he believed
the hackers had indeed sold information out of military computers to the
KGB, and that the KGB had probably found the information very inter
esting. But, he added, Sergei couldn't have seen it as terribly valuable
because he didn't yield to the hackers' demands for a million marks. In
the end, all that hacker know-how went unappreciated, even by the
Soviets.
PA R T T H R E E
ZTH
JL hil Lapsley, an engineering student at the University of Califor
nia at Berkeley, was puzzled. No sooner had he logged in to a Sun
Microsystems workstation than it was clear something was amiss.
Computers such as the Sun run dozens of programs at once, so it is
routine for people like Lapsley who maintain them to peek periodically
to see which programs are currently active. But on November 2, 1988
he saw, hidden among dozens of routine tasks, a small program con
trolled by an unusual user named daemon. Daemon is not the name of
any particular human, but an apt label conventionally used for the utility
programs that scurry around in the background and perform useful tasks.
But this program was not one that Lapsley recognized.
"Is anyone running a job as daemon7." he asked the others in the
"fishbowl," room 199B at the Berkeley's Experimental Computing Facil
ity. People shook their heads. Then somebody else in the room pointed
to one of the screens, where a program that monitored the status of
various other computers in the department was displayed. Lapsley looked
more closely and discovered that a number of people appeared to be
trying to log in to other Berkeley computers. He decided it must be an
attempted break-in. At least once a year, someone tried to break into
the computers in Cory Hall, which houses the school's prestigious elec253
254 a CYBERPUNK
trical engineering department. The school year wouldn't be complete
otherwise.
Whoever this intruder was, he was apparently quite intent on getting
in, trying time after time to log in to Berkeley's computers. So Lapsley
started to jot down the names of the machines from which the break-in
attempts were coming. But he was startled to see that they were scrolling
by faster than he could write them down. In fact, they were coming so
rapidly they were scrolling straight off the screen before he could even
read them. At that point, Lapsley realized it wasn't a person at all who
was trying to break in. It was a program. When it wasn't running as
daemon, it was running under the names of other users.
The program kept pounding at Berkeley's electronic doors. Worse,
when Lapsley tried to control the break-in attempts, he found that they
came faster than he could kill them. And by this point, Berkeley ma
chines being attacked were slowing down as the demonic intruder de
voured more and more computer processing time. They were being
overwhelmed. Computers started to crash or become catatonic. They
would just sit there stalled, accepting no input. And even though the
workstations were programmed to start running again automatically after
crashing, as soon as they were up and running they were invaded again.
The university was under attack by a computer virus.
Lapsley called Mike Karels, a programmer a hundred yards away in
Evans Hall, an imposing concrete tower and home to the school's com
puter science faculty. As the principal programmer at the Computer
Systems Research Group, Karels was the scientist most knowledgeable
about Berkeley UNIX, the operating system widely adopted by universi
ties and research institutions everywhere. If anyone would have good
advice, it would be Karels.
All Lapsley got from Karels was a short, stiff laugh, then, "So you've
got it too, huh?"
After another thirty minutes of puzzling over the enigmatic intruder,
Lapsley and others in the fishbowl discovered that the program was
expanding beyond Berkeley. Peter Yee, another undergraduate working
with Lapsley, logged in to a computer at NASA's Ames Research Center
fifty miles to the south and saw it there. And when Lapsley logged in to
a computer at Berkeley's sister campus in San Diego, he saw it there,
too. By the time a call came from a system manager at Lawrence Liver
more National Laboratory to say it was on his machines, there was no
doubt that this was no local problem. It was all over the nationwide
network known as the Internet.
RIM ▼ 255
A T A
The people who care for the networks of computers used on college
campuses and scientific research centers had spent many years preparing
themselves for various eventualities. And for years, computer scientists
had spoken theoretically of the possibility of a program running loose in
the network. But no one was prepared to cope with the massive assault
on November 2, 1988.
Within minutes of each other, computers all over the nation felt the
presence of the rogue program. Shortly before 6:30 p.m., computer man
agers at the Rand Corporation in Santa Monica, a famous think tank
where Daniel Ellsberg once photocopied the Pentagon Papers, noticed
that their computers were unusually sluggish. There appeared to be a
program running that was robbing the computers of speed and slowing
them to a near standstill. Fifty-five minutes later, across the country in
Cambridge, Massachusetts, computers at the MIT Artificial Intelligence
Lab were under attack. Almost immediately after penetrating MIT, the
program struck Lawrence Livermore National Laboratory and a computer
at the University of Maryland. Then it struck Stanford, Princeton and
the Los Alamos National Laboratory in New Mexico. Once inside a
computer, the program propagated to other computers much like a bio
logical virus. On some computers there were hundreds of copies of the
program running, slowing the machines to a halt. Even when its at
tempts to get into a new computer were unsuccessful, this electronic
virus's repeated knocks on the door were often enough to cripple the
machine. And even after it was killed, it would reappear almost imme
diately. Moreover, once it entered a workstation, the program had a
mysterious way of finding other computers to attack. Throughout the
night it hopped back and forth through the network, setting off havoc
wherever it touched down.
System managers around the country, responding to frantic calls from
night operators, were racing to their offices at 2:00 a.m., 3:00 a.m., and
4:00 a.m. to wrest back control of their computers. Others noticed it
when they had trouble logging in to their institutions' computers from
home. Still others wouldn't learn about the program until they arrived
at work on Thursday morning to find their computers besieged. Program
mers at the University of Illinois at Champaign-Urbana were convinced
they were going to have to rebuild the software for their entire campus
computer system from the ground up.
Worse than what could be observed about the program was the fear
256 a CYBERPUNK
that it might be a Trojan horse program—apparently innocent, but
carrying a string of code instructing the computer to carry out a specific
damaging instruction at some later time. System administrators at an
aerospace company in San Diego got so frightened by the threat of a
malevolent string of code that they pulled everything off their computers
and installed their most recent set of backup tapes.
When the program started entering computers shortly before midnight
at the Army's Ballistic Research Laboratory in Maryland, system man
agers feared invasion by a foreign power. And since the program came
in over the network, they were afraid it might also be taking Army data
out over the network. Assuming the worst, at 10:00 on Thursday morn
ing Mike Muuss, the chief Ballistic Research Laboratory system program
mer, did what dozens of other managers across the Internet had already
done: he disconnected his computers from the network. The laboratory
would stay off the network for nearly a week.
Taking computers off the network stopped the program from coming
in or leaving, but it had the unfortunate side effect of cutting off com
munications among people accustomed to staying in touch with elec
tronic messages. Few people thought to pick up the telephone, and those
who did were at a loss: the electronic network had become the sole form
of communication for most computer experts, who seldom bothered to
give out their telephone numbers.
A T A
If any place could grapple with such a bizarre and troubling situation,
Berkeley could. The university was the birthplace of the very version of
the UNIX operating system that the rogue program was targeting when
it broke into computers on the network. During the evening it became
apparent that the intended targets of the mysterious program were com
puters made by Sun Microsystems and the Digital Equipment Corpora
tion, two of the most common machines on the Internet.
Fifteen minutes after Lapsley first noticed it, the program had broken
into at least thirty workstations on the Berkeley campus. From the way
it was acting, it appeared to be a selective beast, setting its sights on
machines that were connected to as many other systems as possible. It
used simple, quick and powerful methods to break in immediately. Two
Berkeley computers were especially attractive targets. One, called
CSGW, which was a gateway to local area networks on the Berkeley
campus, crashed after dozens of copies of the virus arrived. So did
UCBVAX, a major gateway to the Internet. It seemed that infecting
R1H t 257
such a vital organ had strategic value for the program, increasing manyfold the number of computers it could reach in just a single hop. Thus,
UCBVAX was under constant attack. Still, the team of Berkeley de
fenders decided against pulling their computers off the network. That
would have been admitting defeat. The challenge, they decided, was to
stay connected to the network and still kill off the program.
One of Berkeley's first tasks was to capture a snapshot of the program
as it was running, in effect to catch it in freeze-frame, and then to
analyze it. From there, they could examine strings of code and try to
figure out what the program was doing. But most of it was encrypted, as
if whoever wrote it knew someone would take such a snapshot. The
Berkeley programmers found that the coding scheme used to obscure the
program was a simple one—unscrambling the data was much like
the child's game of translating words from pig latin. The programmers
quickly uncovered the original instructions. The snapshot of code also
told the programmers that the program was trying to crack passwords
using what was known as a dictionary attack, comparing encrypted pass
words to an on-line dictionary that had been encrypted. The snapshot
also showed them that the program was using cracked passwords to get
onto one system, then go from there to other computers by taking ad
vantage of the fact that a password validation on one computer often
grants access to other computers across the network.
Other things quickly became obvious. The Berkeley programmers
soon figured out that the program was exploiting a subtle flaw—or
bug—in a communications program called sendmail, which it used to
send messages and data between computers over the network. The flaw
in sendmail arose from the subtle concatenation of two features of the
program, much as a binary poison gas is deadly only when two inert gases
are combined. One feature made it possible for someone at a remote
location to embed a program in a message. Instead of being handled as
an electronic letter, the message fooled the computer into running it as
a program.
The second feature allowed those programmers who needed to
"debug" or maintain the mail program to examine mail connections over
the network. This "debug" feature made it possible to switch on the first
feature from a remote location. Once the first feature had been switched
on, a program embedded in electronic mail could be sent to run on
another computer immediately. The combination of the two features,
known to only a few, proved to be a glaring loophole in the mail pro
gram.
258 a CYBERPUNK
Whoever had written the rogue program made use of this obscure flaw
to send a small "scout" or "grappling hook" program across the network.
This program in turn immediately called back and brought over the main
body of the virus. Having taken hold of each new computer, the process
would repeat itself indefinitely. That much, at least, was obvious.
Their first look at the program suggested to the Berkeley group that
the invader had no intention of destroying data. Apparently, it exam
ined actual information inside computers only in order to find ways of
breaking into other systems. But they realized that was just a superficial
impression. The possibility of a Trojan horse still lingered. The only way
to determine what it was actually doing would be to pick it apart line by
line, a painstaking task that could take days or weeks. Until the program
had been thoroughly analyzed "with microscope and tweezers," as at the
Massachusetts Institute of Technology titled a later paper on the virus,
there was no knowing what kind of dangers lurked inside.
For the next three hours, programmers at both the Experimental
Computing Facility in Cory Hall and the Computer Systems Research
Group (CSRG) on the fourth floor of Evans Hall worked simultaneously
at shaking the program out of their systems and building a clearer under
standing of how it worked. If it were a playful hoax, they reasoned,
wouldn't it have come with a set of instructions on how to get rid of it?
But there were no such instructions, and all potentially useful details
hidden inside were encoded, sheltered from prying eyes. The program
tried to remain hidden by giving itself the name of an innocuous com
mand that its author obviously hoped would avoid scrutiny. Apparently,
the idea was that to anyone taking casual stock of the computer's activ
ities, nothing would appear out of the ordinary. And to further elude
detection, like a chameleon the program constantly changed its identi
fying number, taking on new aliases to make itself less conspicuous.
By 11:00 p.m., most of the Berkeley programming staff had congre
gated in one of the two computer labs. Keith Bostic, a twenty-eightyear-old programmer at CSRG, was in his office at Evans Hall, working
with Mike Karels. As two of the principal software engineers behind
Berkeley UNIX, they had good reason to take the attack personally.
Bostic had seen his machines hacked and crashed by outsiders before,
but this episode was on an entirely new scale. Meanwhile, Lapsley and a
group of others gathered in the fishbowl at Cory Hall. At 11:30 p.m.,
Peter Yee sent a message from Berkeley to an electronic mailing list on
the Internet: "We are currently under attack from an Internet virus,"
R1H t 259
the message began. "It has hit UC Berkeley, UC San Diego, Lawrence
Livermore, Stanford and NASA Ames."
Fueled by adrenaline, sugar and caffeine, the Berkeley group was
meeting the break-in head-on. A software invader that brought scores,
perhaps hundreds, of computers to their knees was just the sort of night
mare that every computer manager feared. At the same time, it was as if
someone had just handed the group at Berkeley an imposing crossword
puzzle to solve—the ultimate challenge. And the possibility that the
program could contain virulent code infused the evening with tension.
Someone made a sign that read, "Center for Disease Control," and taped
it to the door of the Experimental Computing Facility.
Sometime after midnight, Lapsley walked back to a machine room
containing most of Cory Hall's largest computers and began the arduous
task of going from machine to machine, plugging the holes the invader
was using and killing off all copies of the foreign program. He recon
figured each system with a patch that blocked the sendmail loophole.
And in Evans there were dozens more. One by one, the Berkeley com
puters were immunized from the attacker. Berkeley had survived the
plague.
By 3:00 a.m. Thursday, the tired programmers knew enough about
the program to issue a broad alert to other computer sites. Bostic sent
messages to several electronic mailing lists describing how to fix systems
in a way that would stop the program. His message reached some parts
of the network, but, unfortunately, not the centers that had already cut
themselves away from the network and were working in solitude to stop
the rogue program. The Internet sites that stayed connected found their
messages bogged down by a form of electronic gridlock; the program had
clogged some of the network's crucial mail machines. In some cases it
took messages hours, even days, to travel routes that normally took a
few minutes.
Exhausted, Bostic went home to sleep. Lapsley stayed in the fishbowl.
He knew the program was somehow using other methods to break in,
but he hadn't yet been able to figure out exactly what they were. At 8:30
a.m. Thursday, Lapsley finally went home, too.
It had been one of the most harrowing nights that anyone in the
computer science community had ever faced. For others, though, it was
just the beginning. The following morning, news of the program spread
around the country. Word of the previous night's invasion had circulated
not just among computer scientists but in the national press as well.
260 a CYBERPUNK
During the day, Lawrence Livermore National Laboratory, one of the
nation's leading weapons laboratories, held a press conference to describe
the attack in detail.
A T A
The anonymous caller to The New York Times on Thursday afternoon
made it clear that he didn't want to disclose who had written the Inter
net virus. He just wanted to let the Times know that the person who had
written it was a well-intentioned soul who had made a terrible mistake
in the code.
The switchboard first routed the call to the paper's national news
desk.
"Uh, I know something about the virus that's going around," said the
caller.
"What virus?" The editor sounded confused.
"The computer virus that's crashing computers all over the country."
"Give me your number and someone will call you back," said the
editor.
The editor gave the message and a telephone number to John Mar
koff, the paper's computer reporter. Markoff had already heard about the
incident. He had received a call at 10:00 that morning from Cliff Stoll,
the Berkeley astronomer who had gumshoed his way to the bottom of
the West German hacker case a year earlier. Stoll, who was now working
at the Harvard-Smithsonian Center for Astrophysics, told Markoff he
had been up the night battling the program, which had swamped fifty of
the center's machines. The reporter then spent the morning calling
universities and research centers to see if they, too, had been infected.
One of his calls was to an occasional contact at the National Security
Agency. Markoff had called the NSA in the past on security-related
stories, and he thought his contact there might tell him something about
what was going on. But his contact wasn't there and his call wasn't
returned.
Nobody Markoff spoke with at universities, corporations or military
sites seemed to have any inkling of the program's origin. Theories ranged
from prankster to foreign agent. So the anonymous call to the Times was
intriguing. When Markoff returned the call to a number in the Boston
area, it was immediately clear to the reporter that the caller, who would
identify himself only as Paul, knew a great deal about the program and
how it was written. The excited-sounding young man said he was a friend
RIM t 261
of the program's "brilliant" author. The author, Paul said, had meant to
write a harmless virus, but had made a small error that caused the
program to multiply around the network.
By Friday, Paul and Markoff had talked on the phone several times.
Paul referred to the author only as Mr. X. The two went back and forth
about what kind of trouble the program's author might be in. By this
time, news of the program, which by now was being described altematingly as a "virus" or a "worm," had been on the front pages of newspapers
and on the nightly television news around the nation. It was the first
wholesale assault ever on the nation's computer systems. More disturb
ingly, military computers had been infiltrated. The program had been
contained, but there was still no full assessment of the damage it had
done.
Then Paul made a mistake. During one conversation, instead of say
ing "Mr. X," he slipped and referred to his friend by the initials rtm.
Markoff was close enough to the computer scene to recognize rtm, in
lower case, as a likely computer login. After hanging up, he phoned Cliff
Stoll, with whom he had been trading information all morning. From
his computer at home, Stoll used a network "white pages" directory and
finger, a utility program that acts as a computerized directory-assistance
tool giving users limited information about others on the network. When
Stoll fingered rtm on the Harvard University computers, he retrieved the
name Robert Tappan Morris, identified as a graduate student at Cornell
University. A phone number and an address were included. Stoll called
the Times.
Now Markoff had a name, but he still didn't have a story. Without
an independent confirmation, he couldn't be sure if Paul was telling the
truth, or if the rtm the caller was referring to was the same person as
the rtm Stoll had just found on the Internet directory. Markoff called
the Cornell telephone number. Nobody answered.
Late that afternoon, the NSA finally rang back. The caller was Bob
Morris, a computer security expert who was the chief scientist at the
agency's National Computer Security Center.
"I think I know the name of the person who wrote the virus," Markoff
said.
"Who is it?" Morris shot back.
Markoff bridled. "I'm not going to tell you. You're the computer
police."
A strained conversation followed and before long it became clear that
262 a CV&ZPUNIC
Morris knew exactly who had written the program. In fact, the man
from the security agency appeared to know more about the event and its
perpetrator than the reporter did.
Finally Markoff said, "I think the program was written by Robert
Tappan Morris."
"You're right," Morris answered, giving the paper the confirmation it
needed. They talked for a while longer. It had been a chaotic day of
sifting through dozens of sometimes contradictory reports on the event.
Markoff still wasn't certain what to do with this new information. If the
program had been written by a Cornell graduate student, how was it that
computer security experts at the National Security Agency already knew
that? What was going on, anyway? Just as he was about to hang up, he
had a sudden thought. "Isn't that a funny coincidence," he said. "You
both have the same name."
Without missing a beat, Morris replied, "That's no coincidence. He's
my son."
A T A
Bob Morris entered Harvard in 1950 as a chemistry major. His father
had been a salesman for an etching and engraving company and Bob
thought he too might end up a salesman, perhaps at a place like Du
Pont. He interrupted his studies to spend two years in the Army, and
when he returned to Harvard he decided his options would be broader
with a degree in mathematics, so he switched majors in his senior year
and completed all the remaining math requirements in time to graduate
that same year. He earned his master's in 1958 and embarked on his
Ph.D., with plans to write his dissertation on number theory. In 1960,
he took a summer job at Bell Labs.
By the time Bob Morris got there, Bell Labs had as many scientists
with Ph.D.'s as did most universities. Since its inception in 1925, Bell
Labs has been a monument to the degree of innovation that can spring
from within the walls of a monopoly. From its considerable investment
in both basic and applied research AT&T has seen ample reward. Bell
Labs scientists hold nine Nobel prizes. There are few other industrial
research institutions like it.
Some areas of research were of uncertain commercial value, but it was
rare that a project would be blocked simply because its immediate prac
tical benefit to telephony was unclear. AT&T managers were astute
enough to recognize that significant breakthroughs are born not of rules
RIM t 263
or plans but of people, and those in the upper echelons at Bell Labs
governed their hiring practices accordingly. Bob's summer job was to
stretch into two summers and eventually into a twenty-six-year career.
He started out in telephony, working on data transmission, but he was a
frequent visitor to the mathematics department, some of whose scientists
were developing computer software. Morris made the acquaintance of
Doug Mcllroy, a mathematician who was to become his boss and close
friend for many years. After a year or so Bob transferred to the mathe
matics department, took over the job of someone who left and became
so entrenched that there didn't seem to be much point in returning to
his Ph.D. work. Besides, he was pushing thirty, an age at which almost
all of the best mathematicians have already done their major work.
It didn't take long for him to migrate into computer research. By
then, in the sixties, the field of computer science had begun to burst
open with new discoveries. Computers were appearing everywhere
within the scientific community. Practically every mathematician who
came near a computer had a chance of doing something original. None
of those people had been brought up on computers, of course, but all
were captivated by them. Mathematical solutions to problems were more
and more often complemented by a computer's ability to calculate rap
idly. The notion of programming, of being able to instruct a machine to
do almost anything, of inventing artificial worlds on a computer, was a
source of absolute fascination for Mcllroy, Morris and their colleagues.
Morris, in particular, seemed to have an uncanny understanding of com
puters. Whenever a convoluted computer problem presented itself,
bringing it to Morris's attention was almost certain to produce a creative
answer.
Morris established himself early as a programming wizard. One of his
first displays of such mastery came when he joined in on a simple game
called Darwin. Darwin was the 1962 invention of Mcllroy and a colleague
named Victor Vyssotsky. Vyssotsky thought it would be fun to have a
computer game in which the program played against other programs
rather than against people. The idea was to create a program that tried
to kill opposing programs. At the end of each round, the winning design
would be shared with the group. A concept well ahead of its time,
Darwin was a predecessor to a later program called Core Wars, a simple
computer game that became popular after the advent of the personal
computer. Core Wars came with its own simple programming language.
Players designed tiny software "warrior" programs, then turned them
264 a MEWNIL
loose on an imaginary playing field in the computer's memory. The
winner was the program that disabled the opposing program and still
remained functioning at the end.
The three young scientists had been playing around with Darwin for a
week when Bob came in one day with the toughest survivor of all. Bob's
program was composed of just thirty instructions, and its power lay in
the fact that it was adaptive: it learned how opponents were protecting
themselves and devised its attacks accordingly. Bob's program was un
failingly lethal, and the game ended.
Even in an environment where quirkiness abounded, Bob was re
garded by his colleagues as an original. Shortly after arriving at Bell
Labs, he grew a beard, which was to remain aggressively unkempt for the
next three decades. An iconoclast by nature, Bob had a habit of chal
lenging others' assumptions and would go to any length to make his
point. But he carried out his challenges playfully, never dogmatically. In
answer to a colleague's assertion that all the equipment in the computer
room was fireproof, he took a lit match to a computer tape's write-protect
ring (an attachment that prevents computer information from being
erased) and tossed it in the wastebasket, setting off smoke alarms and
causing pandemonium throughout the lab. And so acute was his sense
of a system's vulnerable points that as his colleagues buzzed proudly
around the computer lab on the day a new operating system called
Multics was first unveiled, Bob strode in and typed two specific charac
ters he suspected would confound the system. They did. The computer
crashed.
It was such stunts that earned Bob his reputation as a scientist whose
biggest strength was his capacity for offbeat thinking. When he wrote a
program designed to spot typographical errors, the program contained no
dictionary and knew no English. Instead it was based on statistical prob
ability; it sifted through a document searching for uncommon sequences
of characters. And it found many of the mistyped words.
Bob loved having inside information, and he enjoyed possessing in
sight into arcana that others were only vaguely familiar with. He often
subjected his colleagues to intellectual popquizzes. If he discovered that
someone down the hall had a passing interest in, say, relativity, he would
learn all that he could on the subject and start asking questions. It was
less a show of intellectual bravado than a sign of Morris's constant
curiosity.
In a report for the twenty-fifth reunion of his Harvard class in 1979,
Morris wrote, "A long time ago I promised myself that I would learn to
£TM t 265
read Greek, learn in some detail how the planets move in their orbits
and how to decipher secret codes. I have gone a long way toward keeping
all three promises." In his thirties, he had taught himself ancient Greek.
And one project that occupied him for nearly a year at Bell Labs was an
astronomy program for predicting planetary orbits. But the promise with
the most relevance to his work at Bell Labs was the third one.
A T A
In 1964, Bob was one of the first people at Bell Labs to have a terminal
in his home. His modem carried data back and forth at an excruciatingly
slow rate of 135 bits per second, about a tenth the speed of the slowest
of today's most common modems. Retrieving or sending even a small
amount of information was a process that left plenty of time to go get a
cup of coffee while the modem churned away.
The terminal itself, called an IBM 2741, looked like an oversize IBM
typewriter with an IBM type-ball mechanism. The typewriter perched
atop a pedestal and inside the pedestal was a mass of electronics. Later
came a slightly faster terminal, the Teletype Model 37, a cumbersome
affair that was roughly half the size of a standard desk. The Teletype
terminal had a mechanical encoding grid of rods under the keys that
converted keystrokes into binary signals, which in turn made their way
over a modem into the Bell Labs central computer. Any Bell Labs sci
entist with a terminal got to know the repairman pretty well. Every
repair visit finished with an oiling of the encoding mechanism; the next
time the terminal was used, fresh oil often dripped onto the user's legs.
In the early 1960s computer security wasn't a problem. Locked doors
sufficed. It first became an issue with time-shared computers. The origi
nal idea of time-sharing was simply that everybody could apparently have
his own computer when he needed it, with the cost shared among many
people. This was the first time people had thought about sharing the
power of a computer. With the development of time-sharing, there arose
the need for accounting and security mechanisms of some kind, because
more than one person at a time could use a computer.
Multics was one of the first time-sharing systems that paid real atten
tion to security as an explicit design goal. The main goal of Multics, a
joint research project of MIT, Bell Labs and General Electric, was to
make time-sharing commercially available. The dream was that Multics
would be a computer utility with capabilities far beyond those of existing
commercial time-sharing systems. It had to permit cooperation among
users who wanted it while guaranteeing privacy to others.
266 a CYBERPUNK
The earliest self-described computer hackers, those at MIT who
abhorred computer security, or anything else that would inhibit the
sharing of information and free access to computers, had it in for Multics
from the start. MIT hackers often tried to bring the system to its knees,
and occasionally they succeeded.
But ultimately, Multics developed to the point of becoming too un
wieldy. As Morris would describe it many years later, continuing to
support its development was "like kicking a dead whale down a beach."
Bell Labs pulled out of the project in early 1969, after which Multics was
adopted by Honeywell as a secure operating system to run on military
computers. But the "tiger teams" of the 1970s—groups of people who
were authorized to probe the security of Defense Department computers
by trying to break into them—put Multics computers through rigorous
tests and eventually got in. The teams even managed to confound the
system's meticulous audit trail, modifying it so there would be no trace
of a penetration of the computer.
Breaking into computers in order to improve security was an impor
tant tactic used by people who worked in the field of computer security.
Members of a tiger team were allowed to have at least limited access to
a target computer. That was one thing. But what about those would-be
invaders with no legal access at all? People like Bob Morris and Ken
Thompson, another talented computer scientist, thought about such
problems extensively. The first step, of course, would be for intruders to
find out what telephone numbers dialed in to a computer, perhaps by
using a scanning program that could dial every possible telephone num
ber sequentially. Ten years later, it would be common for twelve-yearold computer hackers to write programs similar to those they saw de
picted in the movie WarGames. If a hacker's modem detected another
computer, signaled by a high-pitched tone, his next step was to log in
and identify himself to the computer's satisfaction by supplying an ac
count name and a password. Unless the perpetrator already had inside
information of some kind, coming up with the correct password could be
the most difficult step. But once he had logged in, it was possible for
him, depending on the level of privileges achieved, to enter other com
puters over a network illicitly.
Bob's interest in computer security grew with the development of
UNIX, the successor to Multics. UNIX was a play on the name Multics.
Where Multics was complex and its name referred to computing in
multiples, UNIX signified simplicity and uniformity. UNIX began as a
backlash to the Multics system; it was developed for a small computer,
RIM t 267
and programmers grew to like it for two primary reasons: its flexibility let
them tailor it to suit the needs of whatever program they were working
on, and it was designed to be "portable," meaning it could be made to
work on computers of many different brands. Future versions of the
system grew slightly in complexity as new capabilities were added, but
each new edition of UNIX remained faithful to the principles of simplic
ity. UNIX would bring fame to a few Bell Labs programmers and become
a fixture at universities and research institutions around the world.
The UNIX development team consisted of two principals—Ken
Thompson and Dennis Ritchie—and a peripheral group that made
smaller contributions. Bob's work on UNIX involved the mathematical
functions of the software. Something as simple as asking for the time,
for instance, involved a calculation. But his main interest lay in writing
the encoding algorithm used in UNIX, the procedure that transformed
the uncoded, plain text in a file into encrypted text.
When Bob wrote the crypt program, his fascination with ciphers in
tensified. He was a mathematician, and his deepest interest lay in num
ber theory, which typically involves the study of prime numbers and
creative uses of randomness. Cryptology is a natural extension of number
theory since it requires turning a message of clear text into a code
through manipulation of numbers. Cryptology is more than a mathemat
ical discipline; it requires linguistic skills as well. To do exceptional work
in cryptology requires remarkable intuition and leaps of imagination.
Morris had that. He also had an ability to see the security holes where
others saw protection.
In the mid-1970s, Morris was working on a method of cracking the
encryption machines developed during the 1930s by a Swedish cryptologist named Boris Hagelin. The machine, known as the M-209, was
considerably more sophisticated than the earlier German Enigma ma
chine used by the Nazis in World War II, which was decoded in 1939 by
British cryptanalysts, including the famous mathematician Alan Turing.
The M-209, which looked like a cash register with letters as its keys,
coded messages in such a way that each letter was turned into one of
more than a hundred million possible substitutes. Morris devised an
elegant method for taking a passage of text encoded by the M-209 and
transforming it into clear, readable English without relying on machines.
At the same time, Jim Reeds, then a mathematician at the University
of California at Berkeley, came up with a different method for breaking
the code that could be done with a computer program. Reeds and Morris
learned of each other's work and, with the help of Dennis Ritchie,
268 a CYBERPUNK
created a program that would read encoded text and generate a clear
translation. The trio then wrote a joint paper describing their feat, and
submitted it to the academic journal Cryptologia. At the same time,
however, as a courtesy Bob sent a preprint of the paper to the National
Security Agency, whose mission—indeed, whose very existence—was
largely unknown to the general public at the time. The NSA spreads a
far-flung net for gathering communications intelligence in every corner
of the world. For example, when a Korean airliner strayed off course in
1983 and was shot down by a Soviet interceptor, NSA monitors captured
the radio conversation between the Russian pilot and his flight control
lers. And in 1989, when the United States accused a German company
of selling materials that enabled Libyans to build a poison gas plant,
intelligence on the matter was gathered by a massive and permanent
NSA communications surveillance operation in Europe.
The mission of the NSA, which was classified until recently, also
required that the agency maintain the world's best cryptographic capa
bilities. The NSA maintained that it was not in its interest for the most
advanced cryptographic research to be widely disseminated to the public.
So it was perhaps not surprising that shortly after submitting their paper
to the agency for review, the three Bell Labs researchers received a visit
from a retired Virginia gentleman to discuss the impending publication
of the paper. He was, in fact, a former intelligence officer and still had
close ties with his former employers.
The agency was divided, he told them. Some didn't see a problem
with the article, but one conservative group was opposed to any publi
cation of information that would advance the public knowledge of cryp
tography. The initial contact over lunch at Bell Labs led to other
meetings. The researchers traveled to visit agency officials several times.
In the end, the Bell Labs scientists decided to withdraw the paper.
As Ritchie remembers the incident, it was at this time that Bob
Morris's flirtation with the NSA began. What went on inside America's
most secret intelligence agency held a certain fascination for all of them,
and for Morris in particular. Already, the NSA was a customer for UNIX
and the accompanying C programming language that the Bell Labs group
had designed. Morris was offered a summer appointment at the Institute
for Defense Analyses, the NSA's classified think tank. But at this point
all three still felt that if they took security clearances, it would mean
sacrificing much of the freedom they enjoyed as outsiders. They decided
to keep their contact with the computer spooks informal.
£TM ▼ 269
A T A
Anne Burr Farlow came from a long line of New Englanders. Moonfaced
and slightly plump, Anne was a music graduate fresh out of Bryn Mawr
College in 1959 when she moved to Cambridge to work as an office
assistant in the geology department at MIT. On occasion, a Harvard
graduate student in mathematics named Bob Morris would stop by
Anne's apartment to visit her roommate, but Anne didn't take much
notice of him until one day when he asked the roommate to a concert.
When the young woman declined the invitation, the serious young
student turned straight to Anne and asked if she would be interested.
She accepted. Their two-year courtship consisted of frequent ski trips in
the winter and long sailing trips in the summer. In June of 1962, Anne
and Bob married.
When Bob decided to settle permanently into the Bell Labs job, the
young couple went house hunting. Bob, who had grown up in farming
country north of Hartford in the Connecticut Valley, wanted ample
privacy. They settled on a farmhouse in the small town of Millington,
New Jersey. The house dated back to 1740; it had few modern amenities
and abutted a steep wooded hillside, a wildlife preserve that served as a
woodlot for the family. The house sat on a nine-acre triangle of land on
a dead-end road. A two-acre field lay between the house and the Passaic
River. Unless the temperature dipped below twenty degrees, the nineroom house was heated entirely by a wood stove and a fireplace.
Meredith, the first child, was born three weeks after Bob and Anne
moved into the Millington house. Gradually the house filled up with
three large dogs and two more children. Robert was born in November
of 1965, Ben two years later. On the property, farm animals were accu
mulating: sheep, chickens and geese. At least a dozen cats, "working
cats" as Bob called them, roamed freely. When Meredith asked for a
horse one year, Bob compromised and got her a pig. The entire house
hold later joined Meredith in her hobby of training Seeing Eye dogs. A
large vegetable garden provided much of the family's fresh produce, and
within a few years nearly half the family food came from the animals and
the earth. Every lamb they owned was named Lambchop, lest the chil
dren lose sight of its fate.
Anne would always describe marriage to Bob as "complex." He was
completely lacking in conventional traits. For stretches at a time, in
fact, he was missing in action. He kept odd hours; for years his pattern
270 a CYBERPUNK
was to work half the night and sleep until eleven the next morning. He
believed firmly that if he was going to work hard, it should be at some
thing he enjoyed doing. The children occasionally had trouble under
standing that their father wasn't going to be like the fathers of their
friends, conventional workaday men who would spin through the
kitchen at 8:00 a.m., briefcase in hand, returning promptly at 6:00 p.m.
Bob's erratic schedule was dictated by the nature of his work.
But once Bob finished a major project at work, he would spend several
weeks at home working on a domestic job that he found equally absorb
ing. Bob had a natural inclination to integrate his practical skills with
his broader cultural knowledge. One of his more ambitious projects was
to design and build a sheep pen. Dissatisfied with the conventional
designs he found in home construction books, he turned to the February
leaf of a famed fifteenth-century illuminated manuscript, the Tres riches
hemes du due de Berry, a wintry scene of peasants working on a farm,
depicted in exacting miniature in blues and golds and whites. A center
piece of the picture is a simple yet elegant sheep pen. The sheep pen on
this page of the fabled Book of Hours proved the most practical and
aesthetically pleasing design. Bob built its precise twentieth-century rep
lica in rural New Jersey.
Bob's good salary at Bell Labs enabled Anne to do what was important
to her rather than work just to supplement the family income. For the
first few years, that meant raising the children. Then she involved her
self in local and state environmental work; eventually she became exec
utive director of the Association of New Jersey Environmental
Commissions, a statewide umbrella organization for municipal environ
mental commissions. For his part, Bob became chairman of the local
planning board.
Sending the children to the best schools possible was all part of the
plan, too. Bob and Anne considered the quality of the local public
schools inadequate to the task of educating their children, so they sent
them all to private schools. Not only was it a financial burden, but for
Anne it meant she would have to drive them to school every day for
fourteen years. In order to pay the hefty school bills, Bob and Anne
remained frugal. The house was furnished with pieces both inherited and
discovered. Seldom was a new household appliance purchased. Washing
machines and other large appliances were mostly other people's discards
that were old but still functioning. Bob kept a stockpile of appliances in
various stages of disrepair in the barn, with at least one at the ready
should the one on duty fail.
RTM ▼ 271
Bob and Anne Morris provided their children with an idyllic, if some
what eccentric life. Their range of options and their exposure to life in
general were far broader than those of the vast majority of children their
age. And the family was unusually close-knit. They played in orchestras
together, sang in choirs together and took regular trips to Manhattan.
And when the family went on vacations together, it wasn't to island
resorts, but to Iceland for a month, or to England for canal boating. Bob
Morris's work was on the cutting edge of a discipline that was defining
the future; yet when friends came to visit from more suburban commu
nities, they felt as if they had stepped into a time warp. And to complete
the picture, the computer terminal resided in the basement next to an
enormous eighteenth-century beehive oven.
Bob left the task of child rearing to Anne. She believed that children
should be exposed to a full range of experiences and should be able to
draw on that broad spectrum when choosing the direction of their adult
lives. Ben would eventually pursue a life outdoors, working as a tree
surgeon in Millington. Meredith would choose liberal arts and become a
researcher at the Library of Congress. And from an early age, Robert
seemed destined to follow his father into science.
It was an admirable approach, but it also required a disciplined house
hold. Anne instilled in her children a strict work ethic: each had morn
ing chores to do outside, animals to feed, eggs to collect, wood to gather.
For the most part, the three children discharged their chores without
complaint. Some of the work was also a great deal of fun. Gathering
wood in winter, for instance, meant cutting a path up the icebound river
with shovels and skates, and carrying the wood back down on sleds.
Anne also made it clear that they were wholly responsible for their
assigned work around the house. If Robert neglected to feed the sheep
in the morning, he would return from school in the afternoon to a chorus
of bleats.
Through the years, changes were made to the house that reflected the
Morris way of life. Bookshelves went up everywhere. In time, the family
library included six thousand volumes, their subject matter ranging from
theology to natural history to sailing and navigation. Every book had
been read by at least one member of the family. One day, Bob brought
home one of the original Enigma cryptographic machines. On one of
what had become regular visits to Fort Meade, Bob had simply walked
out the front door of the NSA, accompanied by the agency's deputy
director, with the machine stuffed into a brown paper bag. Eventually it
became yet another Morris household curio.
272 a CYBERPUNK
The children weren't given an allowance. Instead, they were paid for
work they did around the house outside of their normal obligations, such
as digging drainage ditches and building fences. Anne was always careful
not to pay them very much, in order to get them to see that they could
earn more money by working elsewhere. Other kids always had more
money than the Morris children, and later, when others had the use of
their parents' cars, Bob and Anne told their children that if they wanted
to drive, they had better figure out a way to buy their own cars. Robert
and Meredith accepted the arrangement perhaps more easily than Ben,
who groused mildly at the restriction.
Like many children in rural settings, the Morris children grew up
without a gang of neighborhood kids to run with, a nearby shopping
mall or a video arcade. When the children were very small, the family
had no television set. But when it turned out that six-year-old Meredith
was a mass-culture "illiterate," as Anne described it years later, the
family bought a tiny black-and-white set specifically to view "Sesame
Street." An upgrade in size came only because all three children had
trouble seeing the screen at the same time. Still, television wasn't so
much prohibited as quietly discouraged. The black-and-white set with
poor reception competed for space in the living room with the computer
terminal, which had migrated upstairs. When Anne voiced complaints
about having a computer terminal in the middle of the living room, Bob
gently reminded her that he could have put it where some of his col
leagues had theirs—in the bedroom.
The young Morrises were early and voracious readers. Meredith was
already reading at age four. By the third grade, Robert had read Tolkien's
Lord of the Rings trilogy and memorized its many poems. By age nine he
was devouring back issues of Scientific American, and by the time he was
in his early teens his reading list had expanded to include the classics,
history and copious science fiction.
Robert's intelligence was especially apparent from an early age. As a
preschooler, he built working-scale models of cars out of whatever tools
he found lying around—paper clips, cardboard and file folders. Before
long, following his father's example, he was pulling electronic equipment
apart and piecing it back together.
Anne saw that Robert sensed that he was different from others his
age. But he recognized only that he was different, not why he was
different. In fact, he once confided to his mother that he thought he was
"weird." She occasionally tried to inquire just enough to test whether he
understood that his abnormality lay in his intelligence. But even though
RIM t 273
it was clear to his parents that Robert was more intelligent than his
schoolmates, he seemed only confused, and occasionally frustrated, by
the difference between him and his peers.
Robert and Ben started out at the Country Day School in Far Hills.
Robert was easily bored and his performance suffered accordingly. When
Robert got to the fifth grade, Bob took matters into his own hands: he
went to the headmaster and suggested that Robert skip into sixth grade.
The headmaster refused, citing school policy. Bob's response was to keep
Robert home for four days. The headmaster relented, put Robert in sixth
grade, and his grades improved immediately. Nonetheless, unhappy with
the direction of the school's curriculum, Anne and Bob pulled the boys
out and enrolled them in the Peck School, twelves miles away in Morristown.
Following the Peck School's more traditionally rigorous curriculum,
Robert improved his scholastic performance dramatically. Still, he was
well beyond his classmates on most subjects. By the time he was in
seventh grade, Robert was reading science fiction at a clip of two or
three volumes a day. Bob and Ben were avid science fiction fans, too,
but Robert was the one who seldom went anywhere without a science
fiction novel tucked under his arm. When Anne went to parents' day at
the Peck School one day, she saw her son seated in the front row of his
math class, his nose buried in a science fiction book. When called upon,
Robert simply looked up from his book, recited the correct answer and
returned to his reading. It was clear to Anne that this wasn't cheek on
her son's part. It seemed a perfectly suitable arrangement between the
teacher and a student who could read his books and still stay a step ahead
of the class.
High school meant yet another private school. Delbarton was an
exclusive boys' school, also in Morristown, run by Benedictine monks.
Delbarton was known for its excellent music department, and after Rob
ert's third week there he came home one day and announced that he
planned to learn the violin. Once Robert started, Ben took up the viola,
Anne played the bassoon, Meredith started on the French horn and Bob
dabbled, starting out on the oboe, then turning to the cello. Anne and
Bob made music a family focal point. Each child was introduced to grand
opera at age ten, with a trip to New York. For years, Bob's annual
Christmas present to the family was Hansel und Gretel at the Metropoli
tan.
Ben and Meredith liked using the computer well enough. They logged
on mostly to play games. But of the three children, Robert was the one
274 a CYBERPUNK
to fasten onto computers most earnestly. When Bob stepped away from
the terminal it was only a matter of minutes before Robert logged on. In
front of the terminal was a cavernous and comfortable old armchair, its
back facing the rest of the living room. Whoever sat in the chair was
enveloped by it, and the young Robert nearly disappeared.
Then there were the electronic friendships computers created. To give
the children a sense of what was possible with computers and communi
cations, some of the parents gave their children their own accounts on
the computer at Bell Labs. Aside from some fairly strict ground rules
about behavior on the network, the kids were allowed, and even en
couraged, to explore the world of computers firsthand. Ken Thompson's
son Corey was a regular on the network. At times, there were up to
twenty-five kids using the Bell Labs computers and communicating with
each other. Many of them, in fact, developed strong electronic friend
ships before they ever met in person.
Robert's was the first generation to grow up with ubiquitous computer
networks. Using the computer gave the fourteen-year-old Robert his first
taste of the power of instantaneous communications, and the social
equality that computers made possible. Tapping the computational
power of a machine ten miles away presented an irresistible lure. Robert
became a regular, making friends on-line and exchanging homemade
computer adventure games. Not only were they cleverly programmed,
but the kids' games also required a fairly sophisticated knowledge of data
communications. They were similar to early adventure games such as
Zork and Adventure. These games were really vast puzzle-solving exercises
played at a computer terminal. They were interactive, permitting the
player to explore by typing commands at the keyboard. The games re
volved around treasure hunts and magic words. One of the teenagers
wrote a game called t4c (The Four Corners), complete with underground
passageways. The best thing about the game was its interactive, multi
user nature. Players ran into each other while playing.
Robert then wrote a game called Run-Me, an enhanced spinoff of t4c.
In t4c, characters could only talk to one another. Run-Me players could
also hug, kiss, hit and tickle. With Run-Me, Robert established himself
as the games master of his group.
Not only were the teenagers learning about computers, but they were
learning the rules of the computer community. For some of them, the
Bell Labs computer was a telephone and television rolled into one,
fulfilling their social needs and their need for entertainment.
One of Robert's best friends on the network was the unusually bright
RTM ▼ 275
daughter of a Bell Labs scientist, one of the few girls on the network.
Robert set up some features of the Run-Me game specifically for her. For
example, the altar in the church would shimmer when her character
entered. One of her most impressive achievements was her own war
drobe program, which told her what to wear each day. Her automated
decision was a function of the articles of clothing in her drawers and
closet. Each morning when she called up the program, it would tell her
which pants and shirts hadn't been worn recently and would select
several possible combinations for her. Though they lived just eight miles
apart, she and Robert carried on an electronic courtship for a year before
actually meeting.
Only rarely did the children of the network overstep their bounds.
One day Bob arrived at work and stormed into an office where some
colleagues were sitting. He announced to the group in his trademark
summary manner that all the kids' accounts had to be taken away im
mediately. Deciding there must be a story behind this sudden decision,
the others prodded him into telling them that one of the kids had been
operating as a superuser on the computer.
"Well, then, just take away that kid's account," suggested one in the
group.
Bob shook his head.
After more probing, Bob broke down and said it had been his own
kid.
"How did he manage to get the root password?" someone asked.
"He didn't."
"Well how did he get in there?"
It finally surfaced that Bob had absentmindedly walked away from the
terminal at a point where he had access to everything on the Bell Labs
computer, leaving Robert the run of the system. Robert had just walked
up to the machine and started using it.
Robert was clearly interested in more than just playing games on the
computer. By the time he entered junior high, his father had introduced
him to UNIX and he was already finding holes in it. He was soon writing
his own UNIX "shell," a sophisticated program for carrying out user
commands. As soon as the UNIX source code was on line, Robert started
to study it with a special zeal. In his mid-teens, Robert was showing his
best friend, Doug Mcllroy's son Peter, how it was possible to get superuser privileges on one computer, then parlay those privileges into a tour
of various computers at the lab. Robert even modified a few files before
alerting his father's colleagues at Bell Labs to the security hole he had
276 a CYBERPUNK
found. If researchers at Bell Labs were amused, or grateful to a teenager
for pointing out weaknesses in their own handiwork, they didn't let on.
He was told to stop and that was that.
Even as a ninth grader, Robert was more his father's colleague than
his disciple. Bob was careful never to sit Robert down and say, "Here,
I'm going to give you a lecture." For weeks at a time, father and son
could be steeped in an ongoing discussion of a technical problem. A
conversation could last for hours or for days, and while they were talking
about whatever it was—it could be a discussion of a security flaw in
UNIX or of building an electronic circuit together—they remained
oblivious to the rest of the family. As the one with more knowledge to
impart, Bob could occasionally be hard on Robert, and extremely chal
lenging. In overhearing some of these exchanges, Anne could tell from
the tone of Bob's questions and Robert's quiet responses that Bob was
pushing Robert. But that was Bob's way. He was accustomed to quizzing
everyone anyway, asking his questions in short, clipped phrases that
might seem abrupt and impatient to an outsider but were unthreatening,
at times even playful, to those who knew him. Mostly, the part of their
relationship that involved computers centered on theoretical questions.
Yet Bob always encouraged Robert to refine his practical programming
skills.
To outsiders, it seemed that Bob might even be encouraging Robert
to break into computers. In 1982, Gina Kolata, a writer for Science
magazine working on a story about computer crime for Smithsonian mag
azine, went to interview Bob Morris about security. He told her about
tiger teams and smugly predicted that after a few minutes of looking in
her wallet he would know enough about her to guess her computer
password. When she asked him if he knew of any young hackers she
could interview, he suggested she speak to his son on an anonymous
basis and invited her to the house. The sixteen-year-old Robert struck
Kolata as unusually shy, almost intimidated by the reporter. Anne Morris
supervised the interview, and while Anne appeared to be protective of
Robert, Kolata got the impression that father and son were a duo, egging
each other on. Young Robert told her that yes, he had read private
computer mail and had broken into computers that were linked together
in networks. "I never told myself that there was nothing wrong with
what I was doing," he told her. But, he said, he continued to do it for
its challenge and excitement. In an ironic coda, that year Robert placed
eleventh in a state high school physics competition. His prize was a
RTM t 277
subscription to Smithsonian, and the first issue he received was the one
with Kolata's article in it.
The Smithsonian article came out at a time when awareness of com
puter security was growing gradually. By the 1980s, hundreds and then
thousands of personal computers were linked together via networks and
one user, one machine was the new computing philosophy. But then
another idea began to form: why not create a computing system that
wasn't found in a single computer but was spread throughout a network
of computers? Could the system itself be so intelligent that when a
particular computing task needed to be done, it could be distributed
automatically to the geographic point that had the best available re
sources? A computer revolution that is still only partially realized was
under way.
A T A
When Robert was growing up, networks were for the most part private
laboratories used by computer scientists who were experimenting with
new ways of using computers. The things he observed his father do, and
the research he heard and learned about, served only to reinforce that
perception. But the world was changing rapidly, and the most powerful
instrument of change over the next decade was the Arpanet. Its name
derives from ARPA, the Pentagon's Advanced Research Projects
Agency, which was renamed Defense Advanced Research Projects
Agency during the 1970s. This agency was run by scientists rather than
soldiers and it was charged with exploring high-risk ideas. For American
computer science in university and corporate research centers, DARPA
created an entirely new world. During the 1960s and the 1970s DARPA
funding was crucial to the most significant advances in computer science.
Personal computers, networks, artificial intelligence and voice recogni
tion all in one way or another were the fruit of DARPA-funded experi
ments.
The Arpanet network in turn was the brainchild of a community of
computer scientists who, during the late 1960s, were among the first to
envision permitting scientists and engineers to share computers and ex
pensive resources instantly and easily no matter where they were. That
a computer network could serve as both a means for instantaneous com
munication among researchers and an experimental communications
laboratory was a revolutionary notion.
At the beginning of the 1960s, Paul Baran, a scientist at the Rand
278 a CYBERPUNK
Corporation, was searching for ways to make telephone networks more
reliable in the event of nuclear war. Out of his research came the idea
of breaking digitized messages up into "packets of numbers." Each packet
would carry an electronic address, and each could be routed by the most
efficient route. Packet switching dramatically lowered the cost of data
communications, making low-cost computer networks possible. The no
tion of actually linking computers to share these networks came from
J. C. R. Licklider, a psychologist who went on to become the first
director of DARPA's information processing and technology office.
The original Arpanet was built around separate message-passing com
puters known as Interface Message Processors, or IMPs, which were the
backbone of the network. Later small computers, known as TIPs (ter
minal interface processors), which handled connections with slow dialup terminals, were added. Each of the IMPs would be connected to
another IMP on a leased phone line and was capable of sending and
receiving at what then seemed like an extremely high speed. Contem
porary networks routinely carry data at twenty times that speed and
network designers are working to build a "national data highway" that
would increase the speed of today's fastest commercial links by up to
seven hundred times.
The first Arpanet node was installed at the University of California at
Los Angeles in late 1969 and the next three nodes were placed at the
University of California at Santa Barbara; Stanford Research Institute, a
California think tank; and the University of Utah. The next year three
more nodes were added on the East Coast: at the Massachusetts Institute
of Technology; Bolt, Beranek and Newman, the Cambridge, Massachu
setts, think tank that designed the Arpanet network; and Harvard Uni
versity.
Other research projects had linked computers experimentally, but the
Arpanet was to grow into the first nationwide computer network. The
Arpanet connected research centers, military sites and universities. Ini
tially, virtually all of the computers on it were identical (almost all were
Digital PDP-lOs), and virtually all of the people at those sites were
government-funded computer science researchers. By 1973, the Arpanet
consisted of twenty-five machines.
To be at a site connected to the Arpanet was to be among an elite.
So coveted was a connection to the network that academic job offers
were sometimes accepted or turned down on the basis of promised access
to the network. For some computer scientists, access to the network was
a requirement for doing their jobs. For these scientists, going to a uni-
RTM t 279
versity without a network connection would have been like a research
microbiologist accepting a job at a school with no microscopes.
In its early days and even into its middle years, the Arpanet had the
feel of a private club. "Are you on the net?" was a question heard among
the most elite computer scientists. Getting into the club wasn't easy, but
once you were in, you were given free rein. There was no concept
whatsoever of security. Anyone anywhere could read a file anywhere in
the network. At Carnegie-Mellon University, for example, every file on
every computer, save those that were explicitly protected, was available
for examination or copying by anybody on the Arpanet. Graduate stu
dents at those places spent many happy hours cruising around through
the files on outside computers to see if there was anything worth reading.
In 1975 the operation of the network was turned over to the Defense
Communications Agency, a Pentagon organization that is responsible
for military voice and data traffic. By then, there were more than sixty
sites on the network, and the amount of data traffic carried by Arpanet
had increased dramatically.
Part of the clubbishness that defined the early Arpanet grew up around
the technical limitations of the network. Through the 1970s, the
Arpanet could only support 256 computers. But by 1982, a new
network-addressing scheme was developed to allow for exponential
growth of the network. By the mid-1980s, the Arpanet had become the
seed for a complex of networks called the Internet, which touched down
in more than fifty countries. It was no longer just an engineering exper
iment. Computer centers used the network for technical support, re
searchers sent papers back and forth in an instant and software of all
kinds flowed around the globe. Commercial enterprises adopted the
technology of the network to create their own private versions of the
network based on the same set of communication protocols. These cor
porations also used the Internet itself to stay in contact with operations
spread around the world. The Internet in turn was connected through
gateway computers to hundreds or thousands of other networks. Some
began to speak of an even broader concept of interconnected net
works. They referred to it as the Matrix, taking the name from the allencompassing computer network in William Gibson's Neuromancer.
It was with some indignation that the Arpanet pioneers watched their
network be appropriated by society at large. Whereas in the early days it
could cost as much as $250,000 a year to maintain a connection to the
network, the base of support had since grown to the point where the
cost was minimal. Universities and corporate research centers still com-
280 a CYBERPUNK
posed most of the links, but by 1988 the function of the network had
broadened considerably. The Arpanet was supposed to be primarily a
computing laboratory, but mostly it was used for sending electronic mail
about every topic imaginable. The network pioneers were puzzled and
not a little miffed to see newspaper reporters, of all people, with accounts
on machines linked to the net. That was nearly as preposterous as the
notion of walking into the campus chemistry lab and seeing a bunch of
reporters wielding Bunsen burners and pipettes.
Gradually, over a period of years the original Arpanet network links
were supplanted by faster data paths, and by 1990 the Arpanet ceased to
exist as a separate entity, having been absorbed into the Internet. By
one current estimate, several hundred thousand different computers are
currently on the network, from supercomputers to personal computers.
The best guess is that there are more than two million Internet users.
This data highway already carries the work of scientists, students, sol
diers and businessmen, and many now argue that connecting it to mil
lions of American homes and businesses will revolutionize the country
with new business, educational and entertainment services.
But at first, the reason for the existence of networks was to carry out
experiments that explored the reach and power of the networks them
selves. In 1971, Bob Thomas, a scientist at Bolt, Beranek and Newman,
was working on distributed computing software. His group designed an
air traffic control simulation that was intended to model different airports
on different computers. The idea was to be able to move control of an
airplane from one computer to another and tell all the other computers
so that they would know the location of a particular aircraft had been
changed. To do this, Thomas wrote a clever program whose mission was
to crawl through the network and pop up on each screen, leaving the
message, "I'm creeper! Catch me if you can!" Some time later, as word
of the program grew within the early network community, other hackers
wrote similar programs—some of which multiplied as they worked their
way around the net {Creeper didn't reproduce itself, it simply moved),
and others of which included "reaper" programs that sought out and
destroyed creepers. Writing such programs became a minor fad for a few
months and then died out.
In the early 1980s, two computer researchers at Xerox's Palo Alto
Research Center started experimenting with programs they called
"worms" that were able to run on many computers in a local-area net
work. (The Arpanet was a wide-area network, connecting computers
over long distances.) The term worm was taken from the book The
RT M t 2 8 1
Shockwave Rider, a science-fiction classic written by John Brunner in
1975. It describes an authoritarian government that exercises power
through an omnipotent computer network until a rebel programmer
infests the network with a program called a "tapeworm." In order to kill
the worm, the government has to turn off the network, losing its power
in the process.
Brunner became a cult figure, as the book swept through the world
wide community of science fiction readers. It had a strong influence on
an emerging American computer underground—a loose affiliation of
phone phreaks and computer hackers in places like Silicon Valley and
Cambridge who appeared simultaneously with the development of the
personal computer. John Shoch and Jon Hepp, the Xerox researchers,
were looking for a way to make shared computing power more widely
and easily accessible over a local area network. They came up with five
or six useful worms. One was called a "town crier worm." Its job was to
travel through the network posting announcements as it went. Another
was a "diagnostic worm." It was intended to hop from machine to ma
chine, constantly checking to see if anything was amiss. Certainly the
most dramatic distributed program the two conceived was the "vampire
worm." Such a program, they suggested, would take advantage of the
almost limitless free processing power in a network of computer worksta
tions. After all, these machines spent many idle hours that could be
harnessed for useful work. The Xerox vampire worm automatically
turned itself on at night when people had gone home, setting to work
on complex problems that required vast amounts of computing power.
In the morning, when the computers' human owners returned to reclaim
their machines, the vampire program would temporarily store the partial
solution computed so far and shrink back to wait for the next evening.
But early on, Shoch and Hepp were also to learn of the potential
dangers of worms. One night a malfunctioning program went out of
control on a local area network at the Palo Alto Research Center. In
the morning, when scientists arrived, they found that computers
throughout the building had crashed. They began to restart their sys
tems, but soon found that each time they attempted to start a machine
the defective worm caused it to crash again immediately. The problem
was that many computers were behind locked doors and couldn't be
reached. Finally they wrote a "vaccine" program that traveled through
the network and electronically inoculated each computer in the network
against the worm.
The Arpanet was also a resource to Bell Laboratories scientist Ken
282 a etmpuw
Thompson, who used it for a computer security experiment. In the late
1970s, when Thompson was working on a paper about breaking pass
word security, he used several network sites, such as Harvard, MIT,
Carnegie-Mellon and Berkeley, on which password files were publicly
accessible or on which he had accounts with access to these files. His
password-cracking program was successful and he discovered that he had
inadvertently captured passwords used by some of the Arpanet's key
administrators, people with accounts on many machines throughout the
network. He tried the passwords and discovered they worked. In the
hands of those whom Thompson and Bob Morris thought of as network
"bad guys," such a security flaw was dangerous. So Thompson sent mail
to the people who owned the passwords to tell them about the problem.
A T A
Robert leapfrogged entirely the process of learning computers in school.
The Delbarton School had early Apple computers, but from age twelve
Robert had access to a machine ten times more powerful. While the
school was handing out computer achievement awards to other students
for mastering the Apples, Robert was already writing complicated pro
grams and technical papers.
Yet few of Robert's friends and teachers at Delbarton even suspected
that the diffident sophomore had such a level of expertise in computers.
Robert had launched his computer career entirely from home. During
Robert's senior year, Bob's old friend Fred Grampp hired Robert parttime at Bell Labs. Robert at sixteen behaved like any of the dozens of
college students who took part-time jobs and internships at the Labs.
Unlike his father, he was inordinately quiet, but he shared his father's
tremendous curiosity about the world around him.
Robert had already made something of a name for himself at Bell Labs
with his earlier unsanctioned tours of Bell Labs computers. But he was a
hard worker. His project there was his own idea: to write a more secure
and efficient implementation of UUCP, the program used for copying
files from UNIX machine to UNIX machine. The challenge was to write
a UUCP implementation that could cope with the volume and variety
of traffic that had evolved on the network over the years. It's not every
high school student who can redesign a major piece of software. Despite
a few problems, Robert's program was so good that it became the model
for UUCP that Bell Labs eventually adopted. He even produced a tech
nical paper on results of his work, titled "Another Try at UUCP."
Yet he wasn't single-minded in his devotion to computers. Robert
RTM t 283
distinguished himself early in other ways at Delbarton. He swam on the
school team and sang with the chorus. Yet he remained shy and, as far
as his parents could tell, still unaware of his intellectual gifts, so Anne
took it upon herself to have a talk with the headmaster at Delbarton.
She explained that she thought Robert might benefit from a boost from
his superiors at the school. Apparently in agreement with this concerned
parent, the headmaster went out of his way to praise Robert in the
presence of other students. On the day the school received the results of
that year's SAT exams, the headmaster greeted Robert in the front hall
of the school and, in front of a dozen other students, told Robert that
his scores—a perfect 800 in verbal and a 790 in math—were the highest
in the school's history. From that point on, Robert's self-esteem seemed
to soar. For college, he set his sights on Harvard. Not only had his father
gone there, but for several generations back the Burrs and the Farlows
on Anne's side of the family had as well. Robert applied for early accep
tance and got in.
When Robert entered Harvard in the fall of 1983, he was still shy and
socially awkward. But he knew of one place he could go where he would
have a good chance at fitting in quickly: the Aiken Computation Labo
ratory. Most college campuses have a research computer center, distinct
from where the university's own central data processing is performed. At
Harvard it's Aiken, which takes care of the computing needs of the
university's Division of Applied Sciences. The central computer center,
with operators who don't need to know much more than how to feed the
printer, is across the campus at the Office of Information Technology.
Aiken is a little faster and looser with its computers, and hence a more
interesting place to work. When Robert arrived at Harvard, there was
in fact no computer science department per se at the school. Instead,
there was a computer science faculty, a group of seventeen faculty mem
bers within Applied Sciences. Serious computer science students at Har
vard gravitated, more often than not, toward Aiken, where computer
science faculty spent their time.
An all-brick monument to an architectural aesthetic grounded in
common sense, Aiken stands diagonally across from the magnificent
law school building on the Law School Quadrangle. Inside the Aiken
lobby, spanning an entire wall, stands Howard Aiken's fifty-one-footlong, eight-foot-tall legacy to modern computing—the Mark I Auto
matic Sequence Controlled Calculator. During the thirties, the mathe
matics professor had a dream of building a large-scale calculator, a
switchboard-mounted device that would do arithmetical operations
284 a CYBERPUNK
without the intervention of an operator. In 1944, in collaboration with
IBM, Aiken completed the Mark I, at a cost of $250,000. It was the
world's first large-scale electric calculator. A typical problem that would
have taken a team of four experts three weeks to solve occupied the
machine for only nineteen hours. By the late 1980s, a problem that
would have really challenged the Mark I could be done in a second or
two on a $40 programmable hand-held calculator. Still, the Mark I was
a revolutionary development in its time and Aiken's place in the history
of technology was duly secured inside the building named for him.
Across from the Mark I is a glass-enclosed room of terminals and
workstations, a place where students and Aiken staffers work. In 1983,
the hard-core computer people at Aiken who didn't have their own
offices spent most of their waking hours in the room and others drifted
in and out. In the 1950s, Bob Morris had also spent time at the com
putation lab, helping to build the Mark IV, the fourth generation of
Aiken's calculator.
Shortly after arriving at Harvard, the younger Morris walked into the
Aiken administrator's office and asked for an account on the lab's com
puter. Eleanor Sacks, the Aiken administrator, patiently explained that
freshmen weren't given accounts at Aiken, that Aiken was the exclusive
province of faculty and more advanced students. She gently told him to
join the other freshmen a few doors down at the Science Center. But
Robert didn't especially want to join the masses in the basement of the
Science Center, a sea of computer terminals and personal computers
that resembled a word-processing pool more than a computer science
lab. Not only was Aiken a more civilized place to sit and program, but
there were more computer resources available there. But instead of trying
to argue about it, Robert wandered back out of her office. A few days
later, he took care of the problem himself by turning the Aiken VAX
into a single-user machine, creating an account for himself and then
returning the VAX to multiuser status. His login, which he had used
since the days on the Bell Labs computer, was rtm. Shortly thereafter, a
faculty member who knew Bob Morris saw to it that Robert received a
legitimate account.
Nick Horton, the Aiken manager, knew little about UNIX, and be
fore long Robert was a permanent fixture there. He wasn't one to learn
a little about a lot of things. Like his father, Robert learned a lot about
a lot of things. He could handle hardware emergencies as well as software
problems. Once his expertise became know at Aiken, his services were
in great demand.
RTM t 285
The number of computer science majors at Harvard is relatively small
—each year, about thirty students get their undergraduate degrees in
computer science—but they pride themselves on being more well
rounded than their counterparts down the street at MIT. Robert may
have had an unusual aptitude, but he was certainly no freak. Everyone
around him had a dozen other interests. The spirit of a place like Aiken
was personified by the students who worked there as part-time staff
programmers. One professor who needed a student to do some program
ming for him was amazed by what he saw: there the student sat, and as
he waited for output from the computer he appeared to be reading two
books at once, one in French and one in German, just to keep himself
occupied.
Perhaps what made Robert stand out most was his impressive knowl
edge of UNIX. He could sit for hours just reading UNIX manuals. The
UNIX documentation had grown to consist of more than two thousand
pages, and on each page was a new set of minutiae concerning the
workings of the operating system. Most people kept the manuals on hand
purely for reference, but Robert appeared to enjoy simply reading them.
Before long, he was regarded as the most knowledgeable UNIX techni
cian on campus. And he had more than a theoretical understanding. He
had a tremendous capacity for remembering details. If someone had a
question about UNIX, it was often easier just to ask Robert than to look
it up. While some people were in awe of his capacity for minutiae, others
wondered if that was all he thought about. He was, in computer par
lance, a systems hacker through and through.
Like his father, Robert was especially talented at putting together a
quick program that would solve a pressing problem. On one occasion,
when a professor got a new computer, he needed some software written
for it. He asked Robert if he could do it, and without needing to pick up
a pen to sketch an outline of the program first, Robert sat down at the
computer and just typed. He was finished within a few hours, and the
program, while not the most refined of code, certainly did the job.
By the end of his freshman year, Robert was spending almost all of his
time at Aiken. He was doing odd programming jobs and technical sup
port, all of it gratis, and he had become indispensable. When others
asked him why he didn't apply for a job at Aiken so that he could at
least get paid, Robert replied that his father had told him not to take a
job right away so that he could concentrate on his schoolwork. This
way, he could keep to his word but still have fun at Aiken. And since
he wasn't on the payroll, he could work on projects of his own choosing.
286 a CYBERPUNK
Robert spent the summer of his freshman year living at home in
Millington and working at Bell Labs. A second technical paper came
from the summer's work, calling attention to a security hole in Berkeley
UNIX. By this time, Robert's expertise was so well appreciated at Har
vard that a special data line was set up between Harvard and the research
machine at Bell Labs so that Robert could perform remote diagnostics
and maintenance from New Jersey during the summer. Robert's notes
were always terse and they almost always fixed the problem. Even when
he wasn't asked directly for help, he offered it anyway. For example,
while browsing around in the Aiken system he noticed that some hard
ware had been installed improperly. A message showed up in Nick Horton's mailbox one day: "Try swapping the two boards in Positions A and
B." It was from Robert. The problem was fixed.
When it came time to declare his major, Robert started out in math,
but soon switched to computer science. In the first semester of his soph
omore year at Harvard he was hired as a staff programmer. He wasn't
actually doing much more than he had done when he worked for no pay,
but now he spent even more time at Aiken, to the exclusion of nearly
all else, including his coursework. His academic performance fell to the
point where the college ordered him to take 1985 off. Rather than tell
his parents right away that he was in trouble with Harvard, Robert lined
up a full-time job as a programmer at Convex, a hot new computer
company in Dallas, and presented the news of academic probation to his
parents as a problem for which he already had the solution. Once again,
while in Dallas, Robert was a remote diagnostician and consultant for
Aiken. When Nick Horton asked him a technical question, he would
send back not just a paragraph of explanation, but a lengthy example
and tutorial.
While at Convex, Robert helped run the company's time-sharing
systems, and wrote software that would analyze and simulate the perfor
mance of Convex hardware. He was also flown out to customer sites as
the company's troubleshooting whiz kid. It was a pretty lonely time for
someone so young and so shy. When people gave him projects to do, he
invariably finished them early and waited for something else to do.
Outside of work he learned rock climbing and scuba diving, and he
played Photon, a high-tech version of Capture the Flag. When he went
to visit his friends at Aiken, he said he was looking forward to coming
back. One of the conditions of Robert's return to Harvard in early 1986
was that he not work again on the Aiken staff, at least not right away.
RTM t 287
So although he continued to spend time there, he was no longer a formal
employee.
The Aiken staff came and went, but in early 1986 the esprit de corps
was especially strong and the group especially diverse. There were Nick
Horton, a psychology major and social activist; Andy Sudduth, a tall,
red-haired Olympic rower; Steve Kaufer, captain of Harvard's fencing
team and in the midst of starting a software company; Karen Beausey,
on her way to law school; and David Hendler, one of Robert's closest
friends, a linguist and history of science major. It was a group that
somehow clicked together particularly well, doing things outside the lab,
taking trips to museums, going on ski vacations and eating dinner to
gether. They all knew a lot about computers but they also knew a lot
about other things. David was a gourmet cook who found some of his
best recipes on the USENET Cookbook, a network recipe exchange.
Nick Horton was also an avid subscriber to the recipe exchange and, as
a Christmas present one year, Nick printed out the archives of the
cookbook, bound it and sent it to everyone at the lab. Around his friends
at Aiken, Robert's shyness melted away. Engaged in a technical discus
sion, Robert was quite animated. In his element, he could be positively
expansive.
Working at Aiken meant keeping irregular hours and adjusting to a
hectic and occasionally demanding environment. Aiken staffers did so
uncomplainingly. Dozens of computer start-ups were eager to use places
like Aiken as a test-bed for their new hardware and software. There was
also a push among the Aiken staff and some of the faculty to procure
equipment that was new and interesting, if not entirely reliable. The
popular sentiment was that if it didn't work, then it could be made to
work, so Aiken staffers spent a lot of their time trying to fix things. If
there was a problem in an area that no one knew anything about,
someone would volunteer to become an expert in the course of an eve
ning.
Robert always managed to find time for some harmless pranks. Ex
ploiting people's tendency to type "mial" by mistake when asking for
their electronic mail, Robert wrote a program so that each time someone
made the error, instead of mail a Dungeons & Dragons-like adventure
game appeared on the screen. He excluded senior faculty members from
the prank; when they made the typing error, the system simply said it
did not recognize the command. The "mial" prank was clever and harm
less, but after a while people became annoyed with the game and Robert
288 a CYBERPUNK
was told to remove it from the system. Then, as an April Fool's joke,
Robert wrote a program that made it appear to anyone who logged in
that Harvard had gone back in time ten years and was using a longobsolete operating system on equally obsolete hardware. Whenever Rob
ert was asked if he was the source of a prank, he would look down with
a shy smirk.
Then there was the Oracle. Anyone logging on to the computer was
told to ask any question of the Oracle. But before the question could be
asked, a question from the Oracle had to be answered first. Some ques
tions tested one's knowledge of technical trivia; others were just silly
("Why do we have 8:30 a.m. classes?"). It took everyone a while to
figure out that it wasn't the computer itself generating questions but
others using the system. Whenever someone logged on, he or she ful
filled the computer's request to ask a question, which was sent on to the
next person to log on. That person's answer was mailed to the user who
posed the question, and so on. The Oracle's cleverness lay in making it
look as if the computer were doing everything, when in reality people
were both asking and answering questions and the computer was just
mailing messages back and forth.
Those who knew Robert well were aware that he had a special interest
in computer security. He wasn't one to boast about his computer security
expertise, but it helped to explain his preoccupation with studying UNIX
line by line. Careful examination of the code itself was the best way to
unearth security flaws. But he didn't flaunt his detailed knowledge of the
operating system, and he certainly didn't announce plans to follow a
career in security. Nonetheless, one of his favorite refrains was how
many holes there were in Berkeley UNIX.
At the same time, Robert had a sense for where to draw the line when
probing security. Once, he and David Hendler were discussing a partic
ular way of logging in to machines around the network. Taken with the
notion, David considered logging in to Brian Reid's computer at Digital
Equipment's research laboratory in Palo Alto, but Robert advised him
strongly against doing that. David knew Reid for his network recipe
exchange, but Robert knew him to be an especially conscientious net
work sentinel who would notice something amiss immediately if some
one logged on to his computer. Robert made a practice of breaking into
only the computers of people he knew wouldn't mind.
A T A
RTM t 289
Paul Graham, a hyperactive and pink-cheeked computer science gradu
ate student, had always considered himself more intelligent than vir
tually everyone else. In his twenty-one years he hadn't seen much
evidence to indicate otherwise. Then Paul heard from a friend about
someone who, the friend said, was on another plane altogether.
One day at an Aiken party shortly after Robert's return from Dallas,
someone pointed out the brilliant young Morris.
Paul went up to him. "Hey, aren't you Robert Morris?"
The young man lowered his head and grinned, then pointed across
the room at someone else and said, "No, that's him."
It wasn't until several days later that Paul learned that he had been
duped, if only because the same person who had disowned the name
Robert Morris was always at Aiken Lab, always working until at least
3:00 a.m. and always working on something that seemed complex.
When Paul started spending time at Aiken, Robert Morris was writing a
program called a ray tracer for a graduate-level computer graphics course.
A ray tracer produces images of three-dimensional scenes. Given a model
of the scene in geometric shapes, the ray tracer follows the path of
individual rays of light from their source as they bounce off objects in
the scene and eventually enter an observer's eye. The most impressive
thing to Paul was that even though the course had ended and Robert
had already received his grade, he was still working on perfecting the
program for the sheer intellectual challenge of it. In fact, Robert's pro
gram was so interesting that it caught the interest of his roommate, Greg
Kuperberg, a math student, who helped him with some of the more
complex mathematics needed for constructing solid shapes.
Ray tracing requires vast numbers of computing cycles and Robert
took them wherever he could find them. But he was scrupulous about
not affecting the other users on the system. So he wrote a program a bit
like John Shoch's vampire worm for making use of perfectly good cycles
on computers around the lab that would have otherwise gone to waste.
When a user sat down at a workstation and began to type, the computer
stopped doing Robert's work and went to work for its rightful owner.
Robert extended his clever redistribution of cycle wealth so that other
students could use it, too.
Paul came to call him by his login: rtm. There was no limit, it seemed,
to rtm's knowledge. He not only knew about the workings of the VAX,
but he also knew about graphics, and he had read ail of the UNIX source
code. In Paul's view, rtm was no single-minded geek. This guy had read
290 a CYBERPUNK
all of the Norse Sagas. And he liked to go to the opera, of all things. He
was nothing like Paul's suburban contemporaries, who had grown up
addicted to video games, television and junk food. When Paul left Monroeville, a Pittsburgh suburb known for its immense shopping mall (it
served as the set for the cult film Dawn of the Dead), his years in front of
the television haunted him through college. When he got to college, he
tried to make up for lost time by going cold turkey. One glance at a
television screen could well turn into a week-long binge. But here was
someone with no interest in that electronic drug, nor in video games.
Paul felt that, compared to Robert's, his childhood had been wasted. He
envied Robert's upbringing: the rustic environment, the private-school
education, the adventurous vacations, the prominent father. Paul was
in awe. He was a reluctant computer scientist who would rather have
studied painting and looked upon others in the graduate program as
irredeemably narrow-minded digit-heads. Meeting rtm was the best thing
that had happened to him all year.
Paul knew that he and rtm were going to be good friends when he
discovered one thing they had in common: neither of them liked to sit
in classrooms, and if a course failed to challenge them, both were in
clined to skip class frequently. One day, Paul was sitting outside on the
steps of Aiken reading a book when he was supposed to be sitting inside
absorbing a lecture on artificial intelligence. When rtm walked up to
him and took a look at Paul's book, the historian Jacob Burkhardt's
history of the Italian Renaissance, he smiled. Both agreed that reading
Burkhardt was a far better way to spend one's time.
Others at Aiken considered Paul too unrestrained, but Robert was
more willing to be his friend. He once took Paul along to a relative's
house on an island off the Maine coast. As they were in a boat headed
for the barren island, which had no electricity or telephones, Robert
said, "You're going to like this. From now on, things are done right." It
was Robert's appreciation for things that had nothing to do with material
possessions that impressed Paul.
But Paul was concerned that his friend rtm didn't have girlfriends. "If
you like someone, rtm, you've got to say something to her," Paul would
insist. "You can't expect her to read your mind."
"But what are shy people supposed to do?" Robert would reply.
More than once, Robert and his friends got the itch to make a killing
from their specialized knowledge. After completing their much-praised
ray tracer, Robert and Kuperberg gave brief thought to launching a
RTM t 291
computer graphics firm. And with David Hendler, Robert mulled over
the idea of a computerized method for predicting the commodities mar
ket. Robert hatched his most farfetched get-rich plan with Paul Graham,
when the two decided they could make a bundle predicting the horse
races at Suffolk Downs. Paul kept copies of the Racing Form locked in
his desk drawer and the two spent hours entering reams of data about
past races into the computer. But after two depressing afternoons of
mingling with the crowds of desperate middle-aged men as they walked
from the subway station to the racetrack, they decided that it wasn't
worth the effort.
The summer after his junior year in 1987, Robert worked at Digital
for the second year in a row, this time in Palo Alto. The previous
summer he had spent at Digital's engineering facility in Nashua, New
Hampshire—the same facility Kevin Mitnick would later break into
electronically—working on routine programming tasks, which he found
only moderately interesting. But the Palo Alto summer was wonderful.
While there he worked on graphics programs and programming lan
guages, trying things that had never been done. The work was extremely
challenging and Robert thrived.
The Morris family, in the meantime, was uprooting itself from New
Jersey and Bell Labs after twenty-six years. Bob had gotten frustrated at
the labs. He had been waiting for months to be appointed to a new
position that would oversee the creation of a secure version of UNIX, a
version with no security flaws. The job got stalled in the bureaucracy,
and while Bob's patience was wearing thin, the National Security
Agency came to him with an offer he couldn't refuse: to be chief scientist
at the National Computer Security Center, the unclassified component
of the NSA. The center had been established to improve the security of
computers within the military services but was later given a broader
mandate that encompassed establishing computer security standards in
the commercial world as well. The job was particularly attractive to Bob
because, while most of his work revolved around the more public center,
there was a classified aspect as well. Part of the time he worked in the
arcane intelligence-gathering world of the NSA.
Bob and Anne sold the old house in Millington and moved to Arnold,
a small Maryland suburb along the banks of the Severn River. Bob had
crossed the line from theoretical research into a real game with real
players. Anne was sad to give up her job as director of the Association
of New Jersey Environmental Commissions, but she knew this was pre-
292 a CYBERPUNK
cisely the career boost Bob wanted. She eventually took a job with an
environmental group in Washington, which required a long commute
each day.
Meanwhile, Robert's senior year was another period of both intense
work and good fun at Aiken. Schoolwork was shunted aside yet again—
one geometry course that Robert found excruciatingly dull he scarcely
attended at all. Despite a lot of cramming for the final, he failed the
course. He spent little time in his room at Dunster House (the Harvard
dormitory where his father had also once lived) preferring to sleep on
the couch at the group house where David Hendler was living. Many
evenings were spent cooking elaborate dinners and baking cookies to
send to out-of-town friends. During his spring break, at his father's
suggestion, Robert gave a talk at Bob's division of the NSA on every
thing he knew about UNIX security. The following day, he repeated the
lecture to a group at the Naval Research Laboratory.
A T A
When Robert applied to graduate school in computer science, Stanford
was at the top of his list, followed by Cornell and Harvard. Stanford has
the most rigorous program; while Harvard fosters a more nurturing at
mosphere for its students, it isn't uncommon for first-year graduate stu
dents at Stanford and Carnegie-Mellon to fail their qualifying exams.
Stanford's program is also by far the most difficult to get into. Of 1,000
applicants each year, the graduate program admits just 30. Cornell,
which ranks among the nation's top ten graduate programs, is also very
difficult to get into. Of 550 or so applicants, the school admits just 40
into each entering class.
Robert gathered letters of recommendation from some of the most
respected figures in computer science. Doug Mcllroy from Bell Labs
wrote one. And Mark Manasse, for whom Robert had worked at Digital's
Palo Alto Research Center, wrote an effusive letter. "I fully believe that
Robert will succeed at almost anything he undertakes," Manasse wrote.
Nonetheless, Stanford rejected him, partly because of his spotty aca
demic record, possibly because his score on the math section of the
standard Graduate Record Exam, though high, wasn't a standout in the
fiercely competitive Stanford applicant pool.
But both Harvard and Cornell accepted him. His thesis adviser rec
ommended against his staying at Harvard for graduate school. Perhaps it
was time for a change, and Cornell was a renowned center of computer
science theory. If Robert was to be faulted for anything, it was his
RTM t 293
tendency to allow himself to be seduced by the machines themselves, at
the expense of a theoretical understanding. Robert's father, on the other
hand, had such a strong mathematical foundation that he would instinc
tively bring mathematics to bear on problems that didn't appear mathe
matical at first. Cornell would be a perfect place for Robert to gain a
better theoretical foothold on computer science. So Robert decided to
go to Cornell.
He spent his last summer in Cambridge working at a plum job. At the
recommendation of Jamie Frankel, the same adjunct professor who had
recommended Robert for one of the summer jobs at Digital, Robert spent
the summer of 1988 at Thinking Machines Corporation in Cambridge.
One of the most interesting companies to work for, Thinking Machines
had developed a supercomputer based on "massive parallelism," applying
thousands of small processors—rather than one or a handful of processors
running at tremendous speed—to divide up the burden of particularly
numerically intensive tasks. The "Connection Machine" was being used
for such applications as picking out ground structures from satellite pho
tographs, predicting the behavior of molecules and making three-dimen
sional maps. The company was doing so many interesting projects that
any job there promised to be fun.
Robert's principal project at Thinking Machines was to refine one of
the sophisticated languages that took special advantage of the Connec
tion Machine. On the side, he wrote a crossword puzzle generator, which
took a blank pattern and a list of about fifty thousand words and filled in
the grid. The only manual labor was in writing clues for the words. It
was a perfect use of the Connection Machine's ability to try out millions
of combinations of words very quickly. By the end of the summer, he
had a working puzzle generator. He was pleased enough with his work to
send one of the puzzles to the crossword editor of The New York Times.
To Robert's disappointment, the puzzle was rejected.
A T A
Robert enrolled at Cornell in the last week of August 1988.
Cornell is among the most isolated of major universities. Its campus
is in Ithaca, a small city with a population of twenty-nine thousand at
the southern tip of Cayuga Lake, one of the five large Finger Lakes in
upstate New York's lush farming region. In the first week he was there,
Robert skipped most of the computer orientation talks given by Dean
Krafft, the campus computer facilities manager. It seemed unnecessary
to attend basic lectures on logging in to the system and sending elec-
294 a CYBERPUNK
tronic mail. Krafft had handed everyone a copy of the computer science
department's computer use policy, which prohibited the "use of . . .
computer facilities for browsing through private computer files, decrypt
ing encrypted material, or obtaining unauthorized user privileges."
While Krafft was giving his talks, Robert was already logged in to the
computer.
He didn't make many friends at first. He moved into an old house
about a mile from campus with two other graduate students, but the
students kept to themselves. It was nothing like the easy communal
atmosphere at the house in Cambridge.
Upson Hall at Cornell didn't seem to foster the camaraderie and
closeness of Aiken at Harvard. It was larger and more anonymous. Rob
ert shared an office with seven other graduate students on the building's
fourth floor. The office had just two terminals, From his desk, Robert
had a southerly view that looked out on Cascadilla Creek gorge and on
Ithaca College across the hills on the other side of the valley. Interesting
science was happening all around him. One floor above in the building's
newer wing, the plasma physics group of the electrical engineering de
partment was working on space plasma physics using data from the space
shuttle program. And in Cornell's computer science department there
were major research efforts in physical modeling and simulation, robot
ics, and computer vision, as well as in reliable distributed computing,
which looks at ways of building systems to survive the failure of individ
ual pieces.
Robert started out taking basic graduate courses. In one, a small class
on microprocessor design, the professor noticed that Robert had an un
usual curiosity about how things work. He seemed less interested in
concentrating on his assigned piece of the project of building a micropro
cessor than in the bigger problem of chip design. If something didn't
captivate him right away, Robert was blunt about it. When another
professor gave him a paper to read, he returned it, saying it hadn't
interested him. He had spent enough years staring out the window when
something bored him. Now he spoke his mind freely.
Robert was lonely and slightly distracted. He was late in submitting
one of his first mathematics papers, and received only a fair grade. He
was spending a lot of time at the computer but he wasn't necessarily
concentrating on his schoolwork. He made friends with one of his officemates, Dawson Dean. Dawson had gone to MIT and was just the kind
of one-dimensional digit-head Paul Graham so often complained about,
but Robert was also quick to give someone the benefit of the doubt, and
RTM t 295
he thought Dawson was an okay guy. He enjoyed having technical
discussions as much as Robert did. One night while both were working
late at Upson Hall, Robert and Dawson started talking about network
security. Robert pointed out that he had figured out several ways to
bypass security on local area networks.
"Are you one of those people who breaks into computers for fun and
then gets hired?" Dawson asked.
Robert smiled and nodded. He told Dawson that he had given lectures
on security at the National Security Agency and the Naval Research
Laboratory. But, he told Dawson, he wasn't particularly interested in
making a career of computer security. "It's too boring," he told his
officemate.
Robert exchanged lots of electronic mail with his old friends from
Cambridge, most of whom had scattered to other places. A great deal of
mail came from David Hendler, as well as from Janet Abbate, a house
mate from the previous summer in whom Robert had taken a romantic
interest. A graduate student at the University of Pennsylvania, Janet
was getting ready to return to Philadelphia. She checked in regularly
with Robert, sending him warm and high-spirited notes over the network
and baked goods by mail. Eleanor Sacks, the former manager at Aiken,
sent him a note saying she hoped Cornell would give him rtm, his
beloved login. He still hadn't bothered to change the morris login
Cornell had assigned him. Nick Horton, who had moved to Oregon,
forwarded Robert a half-dozen recipes for Thai dishes from the USENET
recipe exchange.
Robert quickly developed a reputation as a talented programmer who
kept to himself. He wasn't aloof. He was just quiet. He sat apart from
others in classes and declined invitations to join professors and fellow
students for beer at a local pub on Friday evenings. Nonetheless, he took
advantage of many other things Cornell had to offer. He signed up for a
rock-climbing course, joined the computer science department's intra
mural ice-hockey team and started singing with the Sage Chapel choir.
A T A
While the first personal computer virus probably emerged on the Apple
II computer in the early 1980s, it wasn't until 1987 that viruses exploded
into the public consciousness. A computer virus that struck at the cam
pus of Lehigh University in Pennsylvania drew national attention that
year. A year later, viruses made the covers of Time and Business Week.
The programs were captivating because they were so mysterious and
296 a CYBERPUNK
because they offered such a clear analogy to their biological namesakes.
Computers became "infected." "Vaccines" were possible. Soon people
were drawing comparisons between computer viruses and the plague of
AIDS.
The American public assumed that all viruses were malicious and that
they invariably destroyed data. But those who knew more about comput
ing understood that there was no rule that such programs had to be
harmful. It would be much more interesting, in fact, to write a program
that was at once subtle and benign but still capable of spreading.
Writing a virus that would spread to as many computers as possible
was an idea that just seemed to come to Robert, and the recent examples
emboldened him. He loved the thought of an invisible piece of software
that could propel itself through an electronic universe of thousands of
computers, spreading slowly and imperceptibly, achieving immortality
by protecting itself against anyone who might want to destroy it. And
there were certain flaws in Berkeley UNIX that he had known about for
at least two years, perhaps collecting them with the intention of someday
putting them to use. By early October, Robert was thinking in earnest
about writing the program. The goal of the program was simply to see
how many computers he could reach. On October 15, he produced a
wish list, a set of two dozen or so goals for his program, including these:
The goal is to infect three machines per
Ethernet (local network).
Only work if all users are idle.
Try to avoid slow machines.
Look through host table for the other
i n t e r f a c e s o f k n o w n g a t e w a y s , t h e n fi n d
host s on that net .
S t e a l h i s p a s s w o r d fi l e , b r e a k a p a s s w o r d ,
and rexec .
In Robert's mind, it was a perfectly harmless plan for probing security
of the network. It was something his father, in the early, clubbier days
of computer science, might have dreamed up to earn the respect of his
colleagues. It probably didn't occur to Robert that this was the kind of
thing computer saboteurs might generate in order to bring down an
entire international computer network.
A T A
RTM t 297
Robert got a ride to Cambridge for the long weekend over fall break with
Dawson Dean. David Hendler was out of town on a long trip to Europe,
so Robert spent most of his time with Paul Graham. Andy Sudduth,
who was rowing that weekend in the Head of the Charles race, was
around too.
It was like old times. Robert sat upstairs, glued to one of the worksta
tions. Paul was sitting downstairs in the office of David Mumford, an
eminent mathematician on the Harvard faculty, whose office Paul occa
sionally used when Mumford wasn't around. Early Saturday evening,
Robert walked into Mumford's office, wearing his trademark smirk. Paul
knew something was up. Robert was pacing furiously. He announced
that he had been reading UNIX source code and had found a big bug in
ftp, the file transfer program that enables users to copy files from machine
to machine over a computer network. The hole enabled someone to read
or write any file on the target computer.
From the level of Robert's excitement, Paul got the impression that
he had just discovered this hole a few minutes earlier and was bursting
to tell someone. Robert's pacing in the small office picked up.
Encountering Mumford's desk at the end of one of his paces, instead
of turning around again, Robert walked straight ahead and paced atop
the desk. It was a sure sign that he was completely lost in his discovery.
"rtm! You're on Mumford's desk," Paul cried as he watched his friend's
sneakers shuffle the papers on Mumford's desk.
"Oh," Robert replied, and descended from the desk.
At first, Paul wasn't sure what Robert was driving at. It sounded like
just another way of breaking into UNIX. "Well that's an amusing hole,
but what's the point?" he asked.
"I could use this hole to write a virus," Robert explained. He said that
for much of the fall term at Cornell he had been thinking about writing
a virus, one that would spread slowly over the Internet. As Robert
described it, the virus wasn't going to do anything malicious and cer
tainly would not destroy data. In the end, it should do nothing at all
except spread to as many machines as possible.
Paul was immediately intrigued. He had been badgering Robert all
semester to make more friends at Cornell and improve his social life, but
when he heard that such efforts had been deferred in favor of something
as intriguing as this computer virus, he was delighted and envious.
"That's really great!" Paul was getting just as worked up as Robert.
"You should do this for your dissertation!"
Paul was, in some ways, the perfect friend. When he got excited about
298 a CYBERPUNK
an idea, his support was all the encouragement one needed to keep
going. He could pull others into his excitement just by virtue of his own
enthusiasm. Especially when it came to his friend and role model rtm,
Paul was a one-man cheerleading squad.
When Robert began to talk about the virus he was planning, Paul's
enthusiasm tripped into high gear. It must have had its effect even on
the usually placid and low-key Robert. Robert had meant to keep his
virus plans to himself. By telling Paul, of all people, Robert must have
gotten both a validation for his idea and a stronger sense of urgency.
Had he told anyone else about it, such as Nick or Andy or David, they
might have been less encouraging. They would probably have suggested
he simulate the experiment first, perhaps by running it on a smaller
network that had been disconnected from the Internet at large. Safety
measures like that would keep the virus from affecting the entire network
in case in contained an error. But a controlled environment would have
made it a more modest and less scientifically interesting experiment.
Robert wanted a large proving ground.
Paul and Robert went to meet Andy for dinner that night at Legal
Sea Foods, a restaurant across the street from MIT frequented by pro
grammers and engineers. While Paul and Robert were standing outside
waiting for Andy to arrive, the subject of the virus came up again. Since
neither Paul nor Robert knew of anything like this having been done
before, thinking about it required a lot of creativity. Both of them
thought the idea sounded like the kind of "great hack" that was often
dreamed up in the computer world. Robert started thinking out loud,
describing to Paul some of the more important features such a program
would require. First, of course, it would spread through the network,
secretly planting itself in many different machines. An important goal
was to make the virus as inconspicuous as possible, so as not to arouse
suspicion from system managers. Once it had taken up residence it would
need a means of knowing whether or not another copy was already
present. And it would have to regulate itself in order to limit the number
of copies in each computer. But a difficult question was still unresolved:
how to limit the growth without halting it completely.
While they waited, Robert sketched out his ideas. The virus would
enter a computer through the UNIX loopholes he had found and look
around the system for any possible copies. If it found one, the two would
"talk" to each other and decide what to do. Ideally, one would automat
ically stop running in order to limit growth. But what if someone discov
ered the virus and tried to trick the incoming virus into believing that a
RTM ▼ 299
copy was already running on the machine it approached? A programmer
could design a decoy to fool the invader into thinking that a copy already
existed on a computer. Such a program, easy to write, could prevent the
virus from spreading—serving the same purpose as a biological vaccine.
Thinking like chess players, Robert and Paul decided that there would
have to be a countermeasure against potential defensive programs. How
could they fool the decoy?
Why, randomization, of course! They had taken a graduate course
together in efficient algorithms taught by Michael Rabin, a prominent
mathematician and cryptologist. The concept of randomization was big
with Rabin, who told his students again and again that if a problem
seemed impossible to solve they should reduce it to a simpler one and
apply randomization. (This was the philosophy behind Bob Morris's
probabilistic typo checker.) Rabin had discussed randomization as it
applied to abstract problems, such as prime-number searches. But it
occurred to Paul and Robert that they could use the concept in the virus
program. When the program entered and detected another copy, it
would toss an electronic coin to decide which one should stop running.
Another way of insuring the virus's survival occurred to Robert. One
in N times the virus should enter a computer, forget about the electronic
coin toss and simply command itself never to stop running. But then
came a new question: what should N be? Five? A thousand? Ten thou
sand?
Just as they were beginning to ponder this, Andy walked up. Al
though he was a close friend, his job as system manager at Aiken would
place him in an awkward position, to say the least, if he were suddenly
privy to discussions of huge security holes in UNIX. Andy thought the
conversation had ended abruptly because his friends were discussing a
woman in whom both Andy and Robert were interested.
Robert was still thinking about the virus. And he couldn't contain his
enthusiasm for his discovery of the ftp bug. The next day, he walked into
Andy's office at Aiken and casually told him about it. Just as casually,
he told him not to spread it around.
Andy didn't waste much time before attempting to verify the bug.
When he couldn't, Robert had to give him a more explicit description
of how it worked.
A T A
The Wednesday after Robert returned to Cornell, Paul sent him some
electronic mail: "Any news on the brilliant project?" Two days later,
300 a CYBERPUNK
Robert sent a message back: "No news. I'm buried under legitimate
work." Paul took that to mean schoolwork. But the virus project was
still alive. One of the most time-consuming things Robert had done
during his four days up at Harvard was to decode a collection of en
crypted password files he had taken from various machines around the
country.
While directly decrypting a password may not be possible, guessing
often works. It's impossible to decode a password by reversing the process
that created the coded version. However, nothing prevents the decoder
from guessing at the original password by coding, say, an entire dictio
nary in the same manner and matching the results against the coded
password. Since many passwords are ordinary English words, a dictionary
method yields a surprisingly high number of matches. The faster the
computer, the more computers used, the less time it takes.
On that Friday evening, Dawson Dean walked into the computer
terminal room at Upson Hall, where Robert was seated at a Sun work
station. Dawson asked Robert what he was up to. When Robert showed
Dawson what he had on his screen, Dawson's eyes widened. It was a
long list of passwords in plain, unencrypted form. Robert scrolled down
the list to reveal passwords of dozens of Cornell students and professors.
Dexter Kozen, the graduate adviser, was on the list. His password? to
mato. Keshav Pingali, who was teaching the course in microprocessor
design, had chosen snoopy.
"Wow!" Dawson exclaimed. "Is my password on there?"
His password didn't show up because it wasn't a dictionary word.
"How about Aitken?" Bill Aitken was another graduate student whom
Dawson thought to be "really obnoxious." Robert scrolled down and
found Aitken's password, subway.
"Isn't it kind of dangerous to have a decrypted password list lying
around in your account?" Dawson asked. The very tone of the conver
sation—Dawson's excited questions, as if he were getting a vicarious
kick out of the illicitness of what Robert was doing, and Robert's careful
answers—implied that there were some real taboos being broken here.
"Well," Robert replied, "you encrypt what you can. For the rest you
basically take your chances."
Dawson's curiosity had gotten the better of him. "Could you do this
all over the place and build a nationwide data base of passwords?"
Robert told Dawson that he had other ways of getting into machines
without relying on dictionary encryption.
Dawson pressed Robert to tell him about the other ways he had of
RTM t 301
breaking into machines. Robert hesitated, but Dawson wouldn't give up.
Finally Robert said that from reading UNIX source code, he had discov
ered several bugs. One was the back door in the sendmail program.
Another was a bug in finger that would also allow him to run a program
on another machine without logging in. Robert said he had known about
the two bugs for a year and didn't think anyone else knew about them.
Dawson Dean wanted to skip the bugs talk and hear more about
specific computers Robert could get into. He asked about a specific pri
vate company. Robert shook his head. "You could get in there, too," he
said, "but you really want to stay with machines that are owned by
universities. Universities are less strict about their security in general."
Further, Robert said, it wasn't really a good idea to access machines
across state lines.
Dawson then asked about one machine at the MIT Media Lab, a
center at MIT that was studying technology and communications.
Within a few minutes, Robert had logged on to the computer.
Dawson was amazed. "What's the account you're logged in as?"
Robert typed a command that would tell him the account name he
was using. The computer replied with "nobody." Dawson was impressed.
Obviously, Robert had fooled the machine and was logged on illicitly.
But Robert didn't tell Dawson Dean he had any plans do anything
with the bugs. And Dawson Dean didn't ask. In fact, aside from Paul,
Robert hadn't told anyone of the program he had been planning all
semester, and on which he had been working in earnest since just before
the trip to Cambridge. By this time, in fact, Robert had been program
ming the virus on and off for a little more than two weeks.
A week later, on November 2, Robert was dismayed to see a posting
on the network: Keith Bostic, who worked on Berkeley UNIX, had
posted a fix to the flaw in ftp. Since it had been just the week before that
Robert had told Andy about the bug, this couldn't be a coincidence.
Robert immediately suspected that Andy had alerted someone at Berke
ley about the ftp bug. He fired off a note to Andy and asked him if he
had leaked the secret. No reply. This meant that Robert could no longer
use the ftp bug for his virus. But the flaws in sendmail and finger remained.
Robert spent that afternoon and early evening putting the final
touches on the virus. He finished the work at 7:30 p.m., Eastern Stan
dard Time. An hour later, having logged on to a computer at the MIT
Artificial Intelligence Lab, he typed in a few commands to execute the
program. He went to get some dinner.
In the time it took Robert to put on his jacket after pressing Return,
302 a CYBERPUNK
the program began to spread. Within a few minutes it was already fan
ning out over the network. Computers started infecting one another like
toddlers in a day-care center. Any VAX or Sun machine linked to any
other VAX or Sun was instantly vulnerable. While Robert was eating
his dinner, dozens of copies of the virus were already swarming around
inside machines, vying for computer time. Machines had begun to slow
down and then crash.
Robert had planned to go home after dinner, but he couldn't resist
returning to Upson Hall to check up on the program's progress. When
he logged in, the computer wouldn't respond. Something seemed to be
going wrong. The virus was replicating out of control.
A T A
Later that night, at about 11:00 p.m., Paul and Andy had just returned
to Aiken from a late dinner. As Paul was pulling his keys out of his office
door, the phone rang. Andy answered it for him. It was Robert, who
asked to speak with Paul. Andy put Paul on the line and went back to
his office.
Robert sounded miserable. "I think I've really fucked up," he said. It
was the first time Paul had heard rtm utter such strong language. From
the tone in his friend's voice, which was much softer than usual, Paul
knew rtm was very upset. Paul's first thought was that it must have
something to do with a woman.
"What do you mean?" Paul asked. "What'd you do?"
"I started a virus and it isn't working at all the way it's supposed to,"
Robert replied. "I got one of the numbers wrong on how it should
propagate."
"What number did you use?" Paul asked, referring to the question of
how frequently the virus should infect a machine even if there was
already a copy present.
"One in seven."
"One in seven?! rtm, you jerk! Why seven?" At that instant, it was
clear to Paul that the number should have been higher by a factor of a
thousand or more.
But Robert wasn't eager to sit around evaluating his error in judgment.
He told Paul that all the Suns and VAXes at Cornell were messed up,
crashing every few minutes. And if all the Suns and VAXes at Cornell
were messed up, it was reasonable to assume that lots of other computers
around the country were, too. He said he had launched the virus earlier
that evening from a computer at the MIT Artificial Intelligence Lab. He
RTM t 303
had gone out for dinner, and when he returned to check on the virus's
progress, he saw that it was stalling machines everywhere he was able to
check.
They discussed ways to fix the virus. Paul's idea was to send another
program after the virus to kill it, a Pac-Man-like program that would run
after it and eat it up. As Paul got more excited about his Pac-Man idea,
Robert just grew more morose. If he had already made a mess of one
program, what reason was there to believe that he wouldn't screw up on
a second one?
The next idea was to get Andy involved. Paul went up to Andy's
office and peered in the door. Andy was still there, working late to install
new hardware on the lab's computers. "I think you'd better get in touch
with rtm," he said. "There's something really big going on. But I can't
tell you what it is." Paul was pacing back and forth in front of Andy's
desk.
Andy was ever skeptical of anything Paul might consider really big.
"What's going on?" he asked.
"You'd better talk to him about it," Paul said. "He told me not to tell
you."
"Why don't you just tell me?" Andy was losing his patience.
That was all the coaxing Paul needed. "Well, don't let him know I
told you, but he's written this computer program and it's taken over the
whole country. It's out of control now! It's incredible!"
Andy was still skeptical. But then he remembered receiving an un
characteristically conspiratorial message from Robert that afternoon,
asking if he had told anyone about the ftp bug. Andy had in fact men
tioned it to a few people; he had even demonstrated it to them. And he
had used it to get full privileges on Nick Horton's machine in Portland
and then later told Nick about it. He figured that someone had even
tually told the Berkeley people about it. It wasn't until Robert registered
his concern that Andy remembered Robert's having asked him not to
spread the word. Andy hadn't responded to Robert's earlier note, but
now he typed a message back: "Sorry about betraying other trusts," he
wrote. "Tell me what's going on." Andy was, above all, concerned about
what could happen to the Harvard machines.
An hour or so later, Andy got a call from Robert, who sounded
unusually subdued. Robert told Andy there was a virus out in the net
work that seemed to be bringing down a lot of machines. He didn't say
he had written it, and Andy didn't need to ask. Andy wanted to know
whether the computers at Harvard would be affected. No, Robert re-
304 a CYBERPUNK
plied, because Harvard had already patched the holes the virus was using
to get in. An hour later Robert called back and asked Andy to send an
anonymous note out to the network with directions on how to fix the
virus. Robert told him the points he wanted to make and Andy com
posed the following message:
A Possible virus report:
There may be a virus loose on the internet.
Here is the gist of a message I got:
I ' m s o r r y.
Here are some steps to prevent further
transmission:
1 ) d o n ' t r u n fi n g e r , o r fi x i t t o n o t
overrun its stack when reading arguments.
2 ) r e c o m p i l e s e n d m a i l w / o D E B U G d e fi n e d
3) don't run rexecd
Hope this helps, but more, I hope it is a
hoax .
After Robert had dictated his brief apology and cure, Andy told him
that he would make sure it was sent from a remote machine that wouldn't
be traced to Robert or Andy. Andy decided that he didn't want to be
the one to say Robert had done it. He thought Robert should be the one
to decide when and if he was going to admit to having done it. Andy
told Robert to be prepared to lie to people. If anyone asked him about
the virus, he said, Robert should try not to smirk.
After he hung up, Andy thought about the best way to send the
message. He knew theoretically how to send out anonymous electronic
mail messages, or at least how to pretend to be another computer deliv
ering mail. The message had to look as if it had come from some place
other than Harvard, and certainly not from Cornell. He decided to post
the message to a network discussion group on a computer at SRI. He
realized that if he sent it directly to the computer at SRI that fed the
network, it might get traced straight back to Harvard. So he created a
RTM t 305
fictitious origin for his message—foo@bar.DARPA—and routed the
message through a computer at Brown University, expecting to see it get
sent to SRI within a few hours.
As it turned out, Andy's message got bogged down on the first leg of
its trip. The Brown computers were besieged by the virus. Worse, Andy
had not indicated the subject at the top of the message, making it likely
that it would be ignored, or given a low priority, once it finally did arrive
at SRI.
Andy also tried to make a few phone calls to Berkeley to tell the
Berkeley UNIX people there about the virus, but he wasn't sure just
whom to call, or even how to find their numbers. Calls to the main
number on the Berkeley campus brought no answer, and Andy decided
the whole thing probably didn't justify rousting people from bed in Cal
ifornia, where it was already midnight.
Andy knew that anyone, even as gifted a programmer as Robert, could
make a mistake. Andy had once inadvertently brought down two
hundred computers at Harvard because of a small error in a computer
network routing command. The blunder had been a breach of Harvard's
official policies regarding computer use, but because university officials
recognized it as an honest mistake, they didn't censure Andy. This virus
didn't seem to be as disastrous as Robert and Paul were claiming. If
Robert had indeed brought down a bunch of Cornell computers, then
perhaps some people would be upset. But it couldn't be too terrible.
Finally, satisfied that he had done what he could for his friend, Andy
went home at 4:00 a.m.
That Robert had committed a grave transgression—something illegal,
in fact—didn't occur to Robert, Andy or Paul. Robert's worst fear was
that people in the computer community would be beside themselves with
anger. He hoped he wouldn't get in trouble with Cornell. Seeing what
he had already done to the Internet was very upsetting. And his little
program was probably still ricocheting out of control. He could only
hope that Andy's message would help stem the damage.
But news of the virus that ate the Internet was all over Aiken by the
time Andy got to work on Thursday morning. And Robert Morris's
name, it seemed, was on the tip of many a tongue. After all, Robert's
reputation at Harvard was that of a security expert, Internet habitue and
occasional prankster. The only aspect of this incident that wasn't in
keeping with Robert was the apparent malice behind a move that would
crash computers all over the network.
306 a cygemm
It was unclear to Andy whether his message had reached people.
Reports were filtering in from Berkeley and MIT telling everyone on the
network how to get rid of the virus. No one mentioned an anonymous
message that was going around, but the instructions given were exactly
those Robert had dictated to Andy.
It was with some difficulty that Andy told professors around Aiken
that he didn't know a thing about the incident. Paul appeared to be
having an easier time with the deception. When another computer
science graduate student asked Paul if Robert had anything to do with
this virus he was hearing about, Paul looked him squarely in the eye and
said no. During the day, a subdued-sounding Robert called Andy to ask
if he had sent Robert's message out. Andy assured him he had.
A T A
When Keith Bostic of UC Berkeley arrived at work at 6:00 a.m. Thurs
day, after three hours' sleep, the phone was already ringing. Calls were
coming in from angry computer managers around the country, demand
ing to know what to do about the program that had infested their sys
tems. Bostic had already anticipated some of the wrath. Did he know
about these holes in Berkeley UNIX? No, Bostic responded, he didn't.
Computer managers at the Defense Department, one of the largest cus
tomers for Berkeley UNIX, were particularly irate. Did Bostic have any
idea who had committed this heinous act? Had he been aware of holes
in Berkeley UNIX? Could he assure them that there were no Trojan
horses lurking in the program? Did Berkeley plan to disassemble the virus
code layer by layer?
One of Bostic's first tasks that day was to send out Virus Posting #2,
an amendment to his first patch for the sendmail bug, providing a more
complete fix to the program. That message went out at about 8:00 a.m.
Bostic and the others had already discussed the question of disassem
bling the virus. It would be a time-consuming and arduous task, but it
was the only way to determine beyond a doubt whether there was any
destructive code hidden somewhere inside.
The work at Berkeley was being duplicated in Cambridge, Massachu
setts, by a group of MIT programmers who had also stayed up most of
the night. In the middle of the day, a message from MIT arrived in
Berkeley with news of a second method of attack the virus was using.
Exploiting a hole in the small UNIX finger program, the virus was able
to crash finger by sending it more characters than it could handle. Once
it had overflowed the storage space, the invader was able to start a small
RTM t 307
program that called back across the network and brought the entire body
of the virus into the target computer.
Bostic was skeptical about what MIT was telling him—finger, after
all, was such a trivial little program. He couldn't imagine that a program
only fifty lines long could contain significant bugs. But he was wrong: to
prove its point, the MIT crew sent him a sample program that demon
strated the hole in finger. Later that day, Bostic sent out Virus Posting
#3, a fix to the finger program.
Seeing the finger attack was enough to prove to Bostic that the only
way to find out if other dangers remained was to pore over it line by line.
The program would have to be laboriously decompiled.
Decompiling programs is something of an arcane art that entails trans
lating a program from ones and zeros, which a computer reads as "on"
and "off' instructions, into something a human programmer would write
and understand. Decompiling a computer program is like taking a book
that has already been translated from the original English into, say,
French, then translating it back into English, all without seeing the
original version. The new English version may not use the same words,
but good translators can convey the book's proper meaning. When a
program is decompiled, the language itself may be slightly different, but
its behavior should be identical to the original.
Programs are normally compiled, not decompiled. That is, once a
program is translated from the original source code into machine-execut
able code, there is seldom any reason to do things the other way around.
In fact, many commercial software licenses prohibit disassembling pro
grams precisely because the people who do so might want to break copy
protection or modify the software. But having a program's original source
code is invaluable because it is a window into the author's intentions.
And since the author of this particular program had apparently gone out
of his way to hide his program, there was no choice but to decompile
the program, an arduous task that few programmers have much practice
with.
Berkeley, as it turned out, was ideally suited to the job. Not only was
the Berkeley version of UNIX created and still maintained there, the
Berkeley campus was the site that week of an annual gathering of UNIX
experts from around the world. A year earlier, during the same UNIX
conference, the stock market had crashed. This year it was the Internet.
Bostic even had Chris Torek, one of the nation's leading UNIX experts,
staying at his home. In addition to Torek, there was a compiler expert
from the University of Utah named Don Seeley at the conference. That
308 a CYBERPUNK
much talent alone would probably have been enough to decompile the
program. But Phil Lapsley and Peter Yee knew of yet another decompi
lation ace.
Dave Pare became expert at decompiling programs as an undergradu
ate at the University of California at San Diego in 1985, when he got
miffed at the author of a computer game called Empire who refused to
distribute his source code. The twenty-two-year-old Pare put his mind
to decompiling Empire in its entirety. It took him the better part of two
years. Now he was in Silicon Valley, fifty miles south of Berkeley, work
ing for a software developer. Not only was Pare proficient at decompiling
code, but he had also written his own disassembler, a program that tried
to make decompilation as easy as possible by automating some of the
more mechanical steps. So Peter Yee called him Thursday afternoon to
say there was something they needed his help on.
This was the first Pare had heard of the virus. "Where's Phil? Can't
he handle this?" he asked.
"Phil's asleep. He was up all night," Peter replied.
That was enough to convince Pare that this was something big. He
had never known Phil to stay up all night.
Pare got in his car and made the hour's drive up to Berkeley. When
he got to Evans Hall, he sat down with Chris Torek at one workstation,
while Bostic and Don Seeley sat at another one across the room. The
office was transformed into a disassembly line. The job of the Pare-Torek
team was turning the raw ones and zeros of each of the program's routines
into assembly code, then into rough code in the C programming lan
guage. Once they had each routine in hand, they gave it to Bostic and
Seeley, who tried to make sense of the code's precise purpose. The UNIX
conference on campus was alive with talk of the virus that had taken
hold of the network the previous evening. Some who had planned to
arrive in Berkeley Thursday morning were forced to stay home and battle
the invader. For those who were there, discussions of the siege over
shadowed the workshops on subjects such as "UNIX with NPROC =
3000" and "Kernelization of MACH." Two of the attendees had already
been pulled from the conference to help in the decompilation effort, and
during breaks others wandered over to Evans Hall to see how things were
going. When the programmers got hungry, they ordered calzones from a
nearby pizzeria and kept working as they ate.
Teams of programmers on both coasts continued pulling the code
apart. But behind the spirit of cooperation, an element of competition
crept into the exercise. Each school was privately hoping to finish first.
RTM t 309
Besides, once each group had settled into its own rhythm, it was far
easier just to do the work alone than to adapt to someone else's method.
When Keith Bostic wasn't busy taking panicked telephone calls or
responding to electronic mail, he helped with the effort. At least once
an hour he got an anxious call from various branches of the Defense
Department, asking if the Berkeley team had finished disassembling the
code.
The suspense came from uncertainty over what instructions the rogue
program might contain. At one point, Pare got nervous when he saw
that there was code that appeared to have a timer on it.
"Hey, guys," Pare called to the others in the room. "After twelve
hours it does something."
"What?" came the chorus of replies.
"It calls a routine called H_Ciean."
H_Cfean? Could that mean Host Clean? And if it did mean Host
Clean, did it intend to clean out the files of the host it was running on?
Bostic rushed across the room to peer over Pare's shoulder. Anything
that was timed was not a good sign. They had no idea what would
happen once the timing mechanism was tripped. With an edge of panic
in his voice, Bostic said, "Dave. Time out. Do that routine. Now."
So Pare set to work on the H—Clean routine as the others watched.
As it turned out, the routine was designed to erase the virus's own list of
the hosts it had infected during the previous twelve hours. It was nothing
to worry about.
There also appeared to be a piece of code in the virus designed to send
a little bit of information—a signal at regular intervals—to Ernie
Co VAX, a computer in Cory Hall that computer science graduate stu
dents used for sending and receiving mail. It appeared that this part of
the program was supposed to act as a foil to throw pursuers off the scent
by making it seem that the program was coming from Berkeley, but there
was an error in the routine that was supposed to send data to Ernie, so
nothing was ever sent. The Berkeley team came upon other errors in the
virus's code as well. They appeared to be careless mistakes. For example,
whoever wrote the program forgot, at one point, to assign a value to a
variable; the author also misdirected a message to another program. The
most mystifying thing to Dave Pare was the inconsistent quality of the
code. Parts of it were extremely well written while other parts were so
sloppily executed they appeared to be the work of someone else entirely.
In Cambridge, the MIT group found a more significant flaw: the
dialogue between a newly arrived virus and one that was already estab-
310 a CYBERPUNK
lished would necessarily end in disaster because the listening program
would not always listen long enough to the new infection to acknowl
edge its arrival. Therefore, because each program thought it was alone
on the computer, the "electronic coin toss," which in most cases was
supposed to result in the self-destruction of one of the copies, would
never take place. This was a major error. As it was, the author had
guaranteed that the virus would clog the network because one in seven
times neither the listening program nor the new arrival would destroy
itself; this newly discovered flaw meant that a logjam would have resulted
even if the author had chosen a frequency of one in a hundred thousand.
By 4:00 a.m. the next day the main structure of the program had been
reconstructed. By now, it was clear the virus was basically harmless. So
early Friday morning, Bostic sent out his fourth and final virus posting
to the network. It was a list of fixes to the virus itself. This final posting
was a bit of a joke because the Berkeley team was wagging a finger at the
author of this clever but in some ways careless program. After that,
Bostic went home to sleep soundly for the first time in two days. As soon
as they were finished with the disassembly, the Berkeley team sent a
copy to the anxious officials at the Defense Department.
But no sooner was the program decompiled than a controversy erupted
over whether decompiled versions should be posted on the network.
Bostic and others at Berkeley were against it, arguing that they didn't
want some high school student to take it and try it out. Bostic's detrac
tors argued against adopting this patronizing, "father-knows-best" atti
tude. Bostic stood his ground. As far as he was concerned, sending out
the source code would be "the electronic equivalent of scattering guns
through the network." At the same time, he said, Berkeley wasn't trying
to hold back anything about what the program did. Moreover, although
the Defense Department made no specific request of Berkeley, officials
there told Bostic they were pleased that he wouldn't be sending out the
disassembled code.
A T A
Robert didn't return to Upson Hall on Thursday morning. He stayed
home for much of the day, trying to concentrate on schoolwork. He
went to choir practice that evening and on his way back from the chapel
he stopped by Upson to log in and read his mail. When he logged in, he
saw that most of the computers were working fine. In his mailbox were
notices from the Cornell staff that said there was a virus loose but that
Cornell had it under control. There were also some bulletin board no-
RTM t 311
tices from Berkeley about patching the holes the virus had used to get
in. And there was a message from Paul asking Robert to call him.
Andy and Paul had dinner that night with David Hendler, who had
just returned from his long trip.
"Well, have you heard?" Paul asked David.
"Heard what?" David asked.
"The virus that's been going around the Internet!" Paul could hardly
contain himself. "Andy was up all night! It was out of control."
"Oh." David smiled. "Did Robert do it?"
Silence.
The trio went back to work at Aiken, and when David walked into
Paul's office shortly after 11:00 p.m. , Paul was on the phone with Robert,
telling him what a huge media event the virus had become. Robert didn't
have a television and he was shocked to hear that it was one of the top
stories on all the networks. Paul was also trying to cheer him up by
reading aloud from The Oxford Book of Light Verse. Robert asked to speak
with David. David had expected an effusive welcome after his absence,
but Robert was monosyllabic. "This thing is mine," Robert mumbled.
The tone in Robert's voice was not only that of a programmer who was
upset to have erred, but of someone who was aghast at himself for having
erred so visibly.
David wasn't surprised, but was still of a mind to joke about it. "Do
you want to meet in Montreal?" It was, after all, the city closest to
Ithaca that was outside the U.S. When Robert didn't laugh, David knew
his friend was extremely upset. So he got practical. "What are you going
to do?"
"I don't have any idea," Robert replied.
Ten minutes later Robert called back. He had called his father and
was going to leave Ithaca the next day. He didn't say where he was
going.
A T A
Bob and Anne went out to dinner Thursday night. They discussed the
computer virus that had been going around the Internet. Cliff Stoll had
called Bob that morning and told him about it, but Bob had been too
busy with other things to spend too much time thinking about its origins.
At 11:30 p.m., the phone rang. Bob was already in bed. Anne an
swered. She was surprised to hear Robert's voice. Ben frequently called
this late, but not Robert.
"Can I talk to Dad?" he asked.
312 a CYBERPUNK
"He's asleep," Anne told him. "Is it important?" From the tone in
Robert's voice, she already knew that it was.
"Well, I'd really like to speak to him," came the reply. He was as
insistent as she had ever heard him.
She called Bob to the phone.
It was a short conversation between father and son. When he heard
what Robert had done, Bob was perturbed but not angry. Robert told his
father he already had a plane ticket to Philadelphia for the following
day; he had been planning to spend the weekend with his friend Janet.
Bob told him to use the ticket, not to talk to anyone and not to tell
anyone where he was going. It was likely he would need legal advice.
When Anne went to work the following day, the staff were milling in
the coffee room, talking about the computer virus. They barely knew
what Anne's husband did for a living, much less her children. Tables
were strewn with newspapers, all with news of the virus prominently
displayed. Queasy and unable to concentrate, Anne left work early. By
late that afternoon, The New York Times had figured out that Robert was
the author of the virus and was planning to run the story in the paper
the following morning. Anne and Bob spent the afternoon looking for
an attorney. By the end of the day, they had several names. If Paul
hadn't kept talking to The New York Times, there would have been more
time for the family to figure out what to do. But Paul's careless slip about
Robert's login had accelerated the pace of events.
"AUTHOR OF COMPUTER 'VIRUS' IS SON OF NSA EXPERT ON DATA SECU
RITY" was Saturday's front-page headline in The New York Times. The
paper hadn't been able to get a photograph of Robert in time, but the
following day, photographs of both father and son appeared. Bob looked
the very picture of an eccentric scientist. His long, untrimmed, graying
beard complemented his eyebrows, whose arch resembled birds in flight.
Hair all but covered his craggy face.
Even with the presidential election coming up the following Tuesday,
the media had an insatiable appetite for the story of the young computer
whiz, son of a computer security expert, who loosed a rogue program on
a nationwide network and brought it to its knees. By Sunday morning,
a crowd of television and newspaper reporters had settled at the end of
the Morris driveway, where they would remain on and off through the
weekend and into the following week. The telephone inside rang cease
lessly with calls from the press. Bob's sense of humor stayed sharp. When
a friend called and opened the conversation with "This is not a press
call," Bob responded, "Oh, then you must have the wrong number."
RTM t 313
It seemed wise for Robert to remain in Philadelphia and steer clear of
his parents' house and the pack of journalists, so on Sunday, Bob and
Anne drove to Philadelphia to retrieve him. On their way back, they
pulled* off the highway for gas and Bob got out of the car. Just then, a
red sports car pulled up alongside the gas pumps and the driver glanced
at Bob. A wide grin spread across his face as he took a longer look.
"Hey!" he called out. "You a computer scientist?"
The nation's press corps fastened onto the story first as an incident
that had disrupted a network of military computers, then, as the identity
of the culprit emerged, as the story of a remarkable family, and of intel
lectual pranksterism gone awry. For several days in a row, it was front
page news in the nation's newspapers and one of the top stories in
television newscasts. By Monday, every newspaper in the country, it
seemed, was already writing editorials. Mike Royko, the acerbic Chicago
Tribune columnist, called for a stiff prison sentence. Journalists tapped
every computer security expert and computer industry executive they
could find. "The MacNeil/Lehrer NewsHour" interviewed Ken Olsen,
president of Digital Equipment Corporation. Even though Digital's com
puters had been a target not just of this incident but of hackers with
more felonious intent, Olsen urged the computer science community not
to respond by placing increased security on computer networks. "The
worst thing that could happen," Olsen said, "is that we clamp down on
the free flow of academic information, because that should be preserved
at all costs."
When Robert's name first came out, some of those who knew him
well weren't terribly surprised. Bob's old Bell Labs friend Doug Mcllroy
got up early Saturday morning and read the news. The slumbering Mc
llroy family was awakened by a booming "Guess who did it!" There was
already a story circulating among computer scientists that as the virus
was knocking on the door at Bell Labs, some of the old UNIX hands
were chuckling among themselves, saying, "Must be Morris's kid."
But others who knew Robert, even those who had been on the receiv
ing end of some of his Harvard pranks, were incredulous, or at least
willing to give him the benefit of the doubt. One Harvard faculty mem
ber who knew Robert well was hoping that he had released the virus on
a small local area network at first, had gone home and had returned the
next morning to find that it had somehow spread out over the Internet.
Another faculty member, whose courses Robert had taken, shook his
head in disbelief and asked, "Why didn't he simulate it first?"
Andy, Paul and David Hendler, in the meantime, sat in Andy's office
314 a CYBERPUNK
at Aiken discussing ways to protect their friend. Cooking up a bit of a
propaganda campaign, the group wanted to see the press describe Robert
in the best possible light. Paul was enjoying his role as spin doctor on
the story. He told the others that he had repeatedly described Robert to
the Times reporter as brilliant, and the reporter had used that description
in his story. As they were sitting there, Robert called. He didn't tell
them where he was. He said he just wanted to check in.
"What are you doing?" David asked when he got on the line.
"Baking cookies to send to friends," Robert replied.
A T A
FBI special agent Joe O'Brien had moved to Ithaca from New York City
in 1984 with specific orders to lie low for a while. He had been involved
in an organized-crime case; he was the principal agent responsible for
placing highly sophisticated electronic surveillance equipment in the
home of the late Mafia boss Paul Castellano, which eluded detection
even by the experts Castellano hired to root out bugging devices.
O'Brien's work had led to a series of trials and convictions of organizedcrime figures, and the bureau suggested to O'Brien that he move to a
nice