============== Page 1/1 ============== ! 4. a . SandHACKE PUTERFRO Kae lHAFNERandJohnIVI ti 4 f / r 7evirrr $22.95 Cyberpunk is a fascinating and revealing journey through the computer underground, a world of high-tech rebels and outlaws. For the young cyberpunk hackers this is a world bounded only by the power of their computers and the vastness of the computer networks they cruise—a universe of cyberspace, populated with electronic demons. Katie Hafner and John Markoff teil the stories of three hackers. Kevin Mitnick is the archetypal "dark-side" hacker, the e x "phone phreak" who wreaked havoc with computer networks everywhere and managed to penetrate the top-secret research group of one of the country's leading computer manufacturers. Pengo, a young West Berliner, acted out his outlaw fantasy by offering his hacking services and those of his friends to the Soviet government. Robert Morris achieved notoriety as the brilliant student who wrote a flawed program that brought down an important nationwide computer network, and made us aware of the existence of computer "viruses." Through their compelling psychological portraits, Hafner and Markoff take us inside the minds of these outlaw hackers, making it possible for us to understand what motivates them. They lead us on a tour through a dramatically new computer culture. At the same time, through these stories, Hafner and Markoff show us how dependent we have become on computer networks. Nearly every business, from banks to telephone companies, now relies on computer networks, as does every branch of government. But above all, Cyberpunk is an insightful adventure story set in a brash new world. K AT I E HAFNER AND JOHN MARKOFF SIMON & SCHUSTER ♦ NEWYORK♦ LONDON MEZMINI< • TORONTO • SYDNEY • TOKYO V SINGAPORE • SIMON & SCHUSTER Simon & Schuster Building Rockefeller Center 1230 Avenue of the Americas New York, New York 10020 Copyright © 1991 by Katherine Hafner and John Markoff All rights reserved including the right of reproduction in whole or in part in any form. SIMON & SCHUSTER and colophon are registered trademarks of Simon & Schuster Inc. Designed by Caroline Cunningham Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 Library of Congress Cataloging-in-Publication Data Hafner, Katie. Cyberpunk: outlaws and hackers an the computer frontier/Katie Hafner and John Markoff. p. c m . Includes bibliographical references and Index. 1. Computer security. 2 . Computer crimes. I . Markoff, John. I I . Title QA76.9.A25H34 1991 364.1'68—dc20 9 1 1 1 5 9 8 CIP ISBN 0-671-68322-5 TO O U R PA R E N T S CONTENTS • • • • • • • • INTRODUCTION PART ONE: Kev4.: T4 Neli-Sje 1-frele4. PART TWO: Pte m‚d Neje.4 EiwIzr. PART THREE: UH EPILOGUE NOTES ON SOURCES ACKNOWLEDGMENTS INDEX 9 13 139 251 342 347 353 355 fievelohtazoie% W s e t out to investigate a computer underground that is the real-life version of cyberpunk, science fiction that blends high technology with outlaw culture. In cyberpunk novels high-tech rebels live in a dystopian future, a world dominated by technology and beset by urban decay and overpopulation. It's a world defined by infinitely powerful computers and vast computer networks that create alternative universes filled with electronic demons. Interlopers travel through these computergenerated landscapes. Some of them make their living buying, selling and stealing information, the currency of a computerized future. The television character Max Headroom, who lived in a network of mass media, popping up in computers and television sets everywhere, was considered pure cyberpunk. So was the 1982 movie Blade Runner, which portrays a slick, dark and dangerous world in which technology has triumphed and life is grim. The Inspiration for this book came when we began to see a change in the way computers were being used. We found harbingers of cyberpunk, young people for whom computers and computer networks are an obsession, and who have carried their obsession beyond what computer professionals consider ethical and lawmakers consider acceptable. They were called hackers. As the public viewed them, these computer hackers 10 • 144404e,izes posed a sinister, if also somewhat vague, threat. This is our attempt to explain who they are and what drives them. This book teils three stories. Kevin Mitnick fit the public's perception of an archetypal "dark-side" computer hacker. He was thought to be able to manipulate credit ratings, tap telephones and take complete control of distant computers. He saw himself as a brilliant computer renegade, and he proved to be a formidable adversary for one of the world's leading computer makers. In the end he was trapped by his own arrogance and compulsion. The computer culture of the 1980s was as global as the youth culture of the 1960s. A young West Berliner who called himself Pengo discovered computers in his early teens. Because his parents had no understanding of the electronic world he had entered, no one knew that he was doing anything wrong when he spent hours at a time in front of a computer screen. To play out his outlaw fantasies, Pengo joined a group that sold the fruits of its wanderings through international computer networks to the Soviets. Eventually Pengo and his gang were torn apart in a series of betrayals. Kevin and Pengo represent something close to the cyberpunk idea of the computer "cowboy" who lives outside the law. Robert Tappan Morris was different. The young Cornell University graduate student became notorious when he wrote a program that brought down a nationwide computer network. The son of a leading computer security researcher, he grew up as the ultimate insider, a member of an insular and elfte community of computer scientists. Shy and thoughtful, Robert was hardly a rebel. By releasing a program that crippled several thousand computers in a matter of hours, he permanently altered the course of his life and confirmed everyone's worst fears about what hackers could do. The event marked a turning point: the private world of computer networks was suddenly of concem to the general public. More than stories about computers or technology, this book is about the social consequences of computer networks and the communities that have grown up around them. As the world's computer networks became more closely linked in the 1980s, it was suddenly possible for anyone to travel the electronic corridors that were once the preserve of a small group of researchers. All three young men were seduced by the thrill of exploring these international computer networks, but they all went too far. Each drew national attention and contributed to a growing sense of public unease about the risks that arise from society's increasing dependence an computer networks. 14404evel- • 11 In the 1960s and 1970s, to be a computer hacker was to wear a badge of honor. l t singled one out as an intellectually restless soul compelled to stay awake for forty hours at a stretch in order to refine a program until it could be refined no more. It signified a dedication to computers that was construed as fanatical by outsiders but was a matter of course to the hackers themselves. The hackers from the Massachusetts Institute of Technology in particular adhered to what has been called the Hacker Ethic, which Steven Levy described in his 1984 book Hackers as a code of conduct that championed the free sharing of information and demanded that hackers never harm the data they found. Hacking also meant anything either particularly clever or particularly wacky, with or without a computer, as long as the manipulation of a complex system was involved. Some hacks are legendary. There was the computer program that determined the minimum amount of time it took to cover the entire New York City subway system. After the program was written, a bunch of MIT hackers actually went to New York and tried it out. And there was the legendary hoax during the 1961 Rose Bowl game between Washington and Minnesota, when Cal Tech students made substitutions for the letters an the cards to be held up by the Washington Huskies fans at halftime. Instead of Washington, the cards spelled out Cal Tech. A palindromic music composition was considered a good hack (thus making Haydn, with his Palindrome Symphony, an honorary hacker). So was anything done to establish not merely a new record but a new category altogether in the Guinness Book of World Records. In the 1980s, a new generation appropriated the word "hacker" and, with help from the press, used it to define itself as password pirates and electronic burglars. W i t h that, the public's perception o f hackers changed. Hackers were no longer seen as benign explorers but malicious intruders. These hackers are significant because of what our fear of them says about our unease with new technologies. Arthur C. Clarke once said, "Any sufficiently advanced technology is indistinguishable from magic." For many in this country, hackers have become the new magicians: they have mastered the machines that control modern life. This is a time of transition, a time when young people are comfortable with a new technology that intimidates their elders. It's not surprising that parent-s, federal investigators, prosecutors and judges often panic when confronted with something they believe is too complicated to understand. The fallout from this fear is already apparent. As we were finishing the book, something of a hacker hysteria was sweeping the nation. After 12 • le-144,4eVes• a two-year combined federal and state investigation, in the spring and summer of 1990 more than thirty raids an young computer users took place across the country, followed by a second wave of searches and arrests a few months later. In an attempt to root out the high-tech tools being used by this new breed of "criminal," law-enforcement agents confiscated computers, modems, answering machines, telephones, fax machines and even stereo equipment. Federal agents have gone after computer hackers in 1990 as if they are the next scourge after Communism. Do young people who illegally enter computers really represent such a menace? We hope that from reading the following stories readers will leam that the answer isn't a simple one. All three of the young men we write about were caught up in what society views as criminal activities, yet none saw himself as a criminal. Each felt he was an explorer in a remarkable electronic world where the rules aren't clear. And each paid a price for his actions. lt is possible that once computer networks become as commonplace as our national highway system, we will learn to treat them in much the same .way. Rules of the road will emerge and people will learn to respect them for their own safety and for the common good. We hope that the stories of Kevin Mitnick, Pengo and Robert Morris illustrate not just the risks of computer networks but also their allure. PA R T O N E Kevz.s.%: T4Dite4-Sje 1144€4 Tee geizte C i a o t was partnership, if not exactly friendship, that kept the group together. Each member possessed a special strength considered essential for what needed to be done. Roscoe was the best computer programmer and a natural leader. Susan Thunder prided herself an her knowledge of military Computers and a remarkable ability to manipulate people, especially men. Steven Rhoades was especially good with telephone equipment. And aside from his sheer persistence, Kevin Mitnick had an extraordinary talent for talking his way into anything. For a while, during its early days in 1980, the group was untouchable. Susan was infatuated with Roscoe, but she never cared much for his constant companion, Kevin Mitnick. For his part, Kevin barely gave Susan the time of day. They learned to tolerate one another because of Roscoe. But for all their mutual hostility, Susan and Kevin shared a fascination with telephones and the telephone network; it was a fascination that came to dominate their lives. Susan, Kevin, Roscoe and Steven were "phone phreaks." By their own definition, phreaks were telephone hobbyists more expert at understanding the workings of the Bell System than most Bell employees. The illegality of exploring the nooks and crannies of the phone system added a sense of adventure to phreaking. But the mechanical compo15 16 ♦ C8EVUNK nents of telephone networks were rapidly being replaced by computers that switched calls electronically, opening a new and far more captivating world for the telephone underground. By 1980, the members of this high-tech Los Angeles gang weren't just phone phreaks who talked to each other on party lines and made free telephone calls. Kevin and Roscoe, in particular, were taking phone phreaking into the growing realm of computers. By the time they had leamed how to manipulate the very computers that controlled the phone system, they were calling themselves computer hackers. Kevin was the only one of the original group to go even deeper, to take an adolescent diversion to the point of obsession. Susan, Roscoe and Steve liked the control and the thrill, and they enjoyed seeing their pranks replayed for them in the newspapers. But almost a decade later it would be Kevin, the one who hid from publicity, who would come to personify the public's nightmare vision of the malevolent computer hacker. V • Born in Altona, Illinois, in 1959, Susan was still an infant when her parents, struggling with an unhappy marriage, moved to Tujunga, California, northeast of the San Fernando Valley. Even after the move to paradise, with the implicit promise of a chance to start afresh, Susan's family continued to unravel. Susan was a gawky, buck-toothed little girl. Rejected and abused, at age eight she found solace in the telephone, a place where perfect strangers seemed happy to offer a kind word or two. She made friends with operators, and began calling random numbers in the telephone book, striking up a conversation with whomever she happened to catch. Sometimes she called radio disc jockeys. After her parents divorced, Susan dropped out of the eighth grade, ran away to the streets of Hollywood and adopted the narre Susy Thunder. Susan didn't make many friends, but she did know how to feed herself. Before long, she was walking Sunset Boulevard, looking for men in cars who would pay her for sex. She cut a conspicuous figure next to some of the more diminutive women on the street. Barely out of puberty, Susan was already approaching six feet. When she wasn't walking the streets, she was living in a hazy, drugfiltered world as a hanger-on in the L.A. music scene, a rock-star groupie. Susan was a bruised child developing into a bruised adult. Quaalude was her medium of choice for spiriting her away from reality, and when Quaalude was scarce, she switched to alcohol and heroin. Her mother Ktv4.: T4 Dmii-Sje ffreide4 • 1 7 finally put her into a nine-month rehabilitation program; she was abruptly thrown out midcourse. Conflicting stories of Susan's ouster were in keeping with the blurry line between fact and myth that described her life. As Susan was to teil it, the adulation of power she developed as a groupie compelled her to single out the most powerful male stall member at the treatment center and seduce him. Another story, circulated by Susan's detractors in the phone phreaking gang, is that she was discovered in the men's bathroom on her knees, servicing another patient. Susan found an apartment in Van Nuys and retreated once again to the telephone, taking comfort in knowing that with the telephone she could gain access to a world of her own conjuring and shut it out whenever she chose. She began calling the telephone conference lines that were springing up all over Los Angeles in the late 1970s. By dialing a conference-line number, Susan could connect herself to what sounded like cross talk, except that she was heard by the others and could join in the conversation. Some conference-line callers were teenagers who dialed up after school; others were housewives who stayed on all day, tuning in and out between household chores but never actually hanging up the phone. By nightfall, many of the conference lines turned into telephonic sex parlors, the talk switching from undirected chitchat to explicit propositions. One day in early 1980 Susan discovered HOBO-UFO, one of the first "legitimate" conference lines in Los Angeles in that its owners used their own conferencing equipment instead of piggybacking on the phone company's facilities. Drawing hundreds of people every day, HOBO-UFO was run from the Hollywood apartment of a young college student who called himself Roscoe. A friend of Roscoe's named Barney financed the setup, putting up the money for the multiple phone lines and other equipment while Roscoe provided the technical wherewithal. Susan decided she couldn't rest until she had met Roscoe, the power behind it all. But to achieve that goal, Susan knew she would have to abandon her disembodied telephone persona. She liked describing herself to men over the telephone. She knew from experience that all she had to do was mention that she was a six-foot-two blond and she wouldn't have to wait long for a knock at the door. She was right. No sooner did she deliver the description than Roscoe came calling. The woman who greeted Roscoe was exactly as she had described herself. Susan had dressed up and made her face up carefully for the big date. But she could not conceal certain physical oddities. Her long face displayed a set of teeth so protrusive as to produce a slight speech imped- 18 • CYKEZPUNIC iment. And there was something incongruous about her large frame: her upper torso was narrow and delicate, but it descended to a disproportionate outcropping of hips and heavy thighs. Roscoe, for his part, was thin and pale. His brown-framed glasses met Susan's chin. But if either Susan or Roscoe was disappointed in the other's looks, neither showed it. They went to dinner, and when Roscoe asked Susan about her line of work she told him she did psychological counseling and quickly changed the subject. A business student at the University of Southern California, Roscoe was one of the best-known phone phreaks around Los Angeles. When a reporter from a local newspaper began researching a story about conference lines, he told a few HOBO-UFO regulars that he wanted to meet Roscoe. The next day a caller greeted him by reeling off the billing name an his unlisted phone number, his home address, the year and make of his car, and his driver's license number. Then the caller announced himself: "This is Roscoe." When Susan and Roscoe met in 1980, phone phreaking was by no means a new phenomenon. Phone phreaks had been cheating the American Telephone and Telegraph Company for years. They started out with "blue boxes" as their primary tool. Named for the color of the original device, blue boxes were rectangular gadgets that came in a variety of sizes. Sometimes they were built by electronic hobbyists, at other times by underground entrepreneurs. Occasionally they were even used by the Mafia. One of Silicon Valley's legendary companies even has its roots in blue box manufacturing. Stephen Wozniak and Steven Jobs, who co-founded Apple Computer in 1976, got their start in the consumer electronics business several years earlier, peddling blue boxes in college dormitories. A blue box was universally useful because it could exploit a quirk in the design of the nation's long-distance telephone system. The device emitted a high-pitched squeal, the 2600-hertz tone that, in the heyday of the blue boxers, controlled the AT&T long-distance switching system. When phone company equipment detected the tone, i t readied itself for a new call. A series of special tones from the box allowed the blue box user to dial anywhere in the world. Using these clever devices, phone phreaks navigated through the Bell System from the palms of their hands. Tales abounded of blue boxers who routed calls to nearby pay phones through the long-distance lines of as many as fifteen countries, just for the satisfaction of hearing the Jong series of clicks and kerchunks made by numerous phone companies releasing their circuits. Ke44.: TA Nek-S:k How-4bl • 1 9 Blue boxes were soon joined by succeeding generations of boxes in all colors, each serving a separate function, but all designed to skirt the computerized record-keeping and switching equipment that the phone company uses for billing calls. The phone phreaking movement reached its zenith in the early 1970s. One folk hero among phreaks was John Draper, whose alias, "Captain Crunch," derived from a happy coincidence: he discovered that the toy whistle buried in the Cap'n Crunch cereal box matched the phone company's 2600-hertz tone perfectly. Tending to be as socially maladroit as they were technically proficient, phone phreaks were a bizarre group, driven by a compulsive need to Team all they could about the object of their obsession. One famous blind phreak named Joe Engressia discovered the telephone as a small child; at age eight he could whistle in perfect pitch, easily imitating the 2600-hertz AT&T signal. Joe's lips were his blue box. After graduating from college, in tireless pursuit of knowledge about the phone company, Joe crisscrossed the country by bus, visiting local phone company offices for guided tours. As he was escorted around, he would touch the equipment and learn new aspects of the phone system. Joe's ambition was not to steal revenue from the telephone company but to get a job there. But he had made a name for himself as a phreak, and despite his vast store of knowledge, the phone company could not be moved to hire him. Eventually, Mountain Bell in Denver did give him a job as a troubleshooter in its network service center and his whistling stopped. All that he had wanted was to be part of the system. The Beil System needed people like Joe on its side. By the mid-1970s, AT&T estimated it was losing $30 million a year to telephone fraud. A good percentage of the illegal calls, it tumed out, were being placed by professional white-collar criminals, and even by small businesses trying to cut their long-distance phone bills. But unable to redesign its entire signaling scheme ovemight, AT & T decided to ferret out the bandits. Using monitoring equipment in various fraud "hot spots" throughout the telephone network, AT & T spent years scanning tens of millions of toll calls. By the early 1980s automated scanning had become routine and Bell Laboratories, AT&T's research arm, had devised computer programs that could detect and locate blue box calls. Relying on increasingly sophisticated scanning equipment, detection programs embedded in its electronic switches and a growing network of informants, AT&T caught hundreds of blue boxers. In 1971, phone phreaking ventured briefly into the sphere of politics. 20 Ä CCERPUNK The activist Abbie Hoffman, joined by a phone phreak who called himself Al Bell, started a newsletter called Youth International Party Line—or YIPL for short. With its office at the Yippie headquarters on Bleecker Street in New York City's Greenwich Village, YIPL was meant to be the technical offshoot of the Yippies. Hoffman's theory was that communications were the nerve center of any revolution; liberating communications would be the most important phase of a mass revolt. But Al Bell's outlook was at odds with Hoffman's; Al saw no place for politics in what was essentially a technical journal. In 1973, A l abandoned YIPL and Hoffman and moved uptown to set up shop as TAP, the Technological Assistance Program. Much of the information contained in TAP was culled from AT&T's various in-house technical journals. l t was information that AT & T would rather have kept to itself. And that was the point. Whereas the original phreaks like Captain Crunch got their kicks making free phone calls, TAP's Leaders, while steering clear of a hard political line, believed that the newsletter's mission was to disseminate as much information about Ma Bell as it could. By 1975, more than thirteen hundred people around the world subscribed to the four-page leaflet. For the most part, they were loners by their own admission, steeped in private technical worlds. TAP was their ultimate handbook. Written in relentlessly technical language, TAP contained tips on such topics as lock picking, the manipulation of vending machines, do-it-yourself pay phone slugs and free electricity. TAP routinely published obscure telephone numbers; those of the White House and Buckingham Palace were especially popular. And in 1979, during the Kostage crisis in Iran, TAP published the phone number of the American embassy in Tehran. Every Friday evening, a dozen or so TAP people held a meeting at a Manhattan restaurant, many still cloaked in the Lies and jackets that betrayed daytime lives spent toiling away at white-collar jobs. After work, and inside the pages of TAP, they adopted such names as The Professor, The Wizard and Dr. Atomic. In the late 1970s, a phone phreak who called himself Tom Edison took over TAP, bringing in another telephone network enthusiast, Cheshire Catalyst, a seif-styled "techie-loner-weirdo science fiction fanatic," as one of TAP's primary contributors. Tall and dark with the concave, hollow-cheeked look of someone rarely exposed to sunlight, Cheshire had been phreaking since the sixties. He discovered the telephone at age twelve, and learned to clip the speaker leads of the family Keezl-: 74 D. -5..i 1-ke4e4 • 2 1 stereo onto a telephone plug so that he could put the handset to his ear and listen to the radio while doing his homework. If his mother entered the room, he just had to hang up the receiver. By the time he was nineteen, Cheshire had become a telex mauen, having programmed his home computer to simulate a telex machine. Before long he was sending telex pen-pal messages around the world. In his twenties, already a veteran TAP reader, Cheshire moved to Manhattan, got a job at a bank in computer support and joined the TAP inner circle. TAP wasn't exactly a movement. It was an attitude, perhaps best described as playful contempt for the Bell System. One elderly woman from the Midwest sent her subscription check along with a Letter to Tom Edison saying that although she would never do any of the things described in TAP, she wanted to support those people who were getting back at the phone company. As one responsible for keeping TAP unassailable, Cheshire didn't sully his hands with blue boxes, and he paid his telephone bills scrupulously. Out of corporate garb, he and his friends stayed busy irking Ma Bell through their constant wanderings inside the phone system. As Cheshire and his friends would explain to outsiders, they loved the telephone network—it was the bureaucracy behind it they hated. People like Cheshire iived not so much to defraud corporate behemothsas to home in an their most vulnerable flaws and take full playful advantage of them. Beating the system was a way of life. Flying from New York to St. Louis, for instance, was not a simple matter of seeking an inexpensive fare; it meant hours of research to find the cheapest route, even if it meant taking advantage of a special promotional flight from New York to Los Angeles and disembarking when the flight made astop in St. Louis. And getting the best of AT&T, the most blindly bureaucratic monopoly of all, embodied a strike against everything worth detesting in a large corporation. As private computer networks proliferated in the Tate 1970s, there came a generation of increasingly computer literate young phreaks like Roscoe and Kevin Mitnick. If the global telephone network could hold aphone phreak entranced, imagine the fascination presented by the proliferating networks that began to link the computers of the largest corporations. Using a modern, a device that converts a computer's digital data into audible tones that can be transmitted over phone lines, any clever interloper could hook into a computer network. The first requirement was a valid user identification—the narre of an authorized user of 22 • CYKEZPUNK the network. The next step was to produce a corresponding password. And in the early days, anyone could root out one valid password or another. The rising computer consciousness of the phone phreaks was inevitable as technology advanced. Electromechanical telephone switches were rapidly giving way to computerized equivalents all over the world, suddenly transforming the ground rules for riding the telephone networks. The arrival of computerized telephone switches dramatically increased the risks and the sense of danger, as well as the potential payoff. The phone company's automatic surveillance powers grew by orders of magnitude, served by silent digital sentinels that sensed the telltale signals of the electronic phone phreaks' microelectronic armory. As the peril grew, so did the sense of adventure. Whenever an outsider gained control of a central office switch or its associated billing and maintenance computers, by evading often inadequate security barriers, the control was absolute. Thus the new generation of phone phreaks could go far beyond placing free telephone calls. Anything was possible: eavesdropping, altering telephone Uh, turning off an unsuspecting victim's phone service, or even changing the dass of service. In one legendary hack a phone phreak had the computer reclassify someone's home phone as a pay phone. When the victim picked up the telephone, he was startled to hear a computerized voice asking him to deposit ten cents. For phone phreaks, the temptation to step up from the simpler technology of the telephone to the more complicated and powerful technology of computers was irresistible. In 1983, just as TAP was coming to symbolize the unification of computers and telephones, the journal came to an untimely end. Tom Edison's two-story condominium in suburban New Jersey went up in flames, the object of simultaneous burglary and arson. The burglary was professional: Tom's computer and disks—all the tools for publishing TAP—were taken. But the arson job was downright amateurish. Gasoline was poured haphazardly and the arsonist failed to open the windows to feed the fire. For years, Tom and Cheshire speculated that the phone company had engineered the fire, but proving it was another matter. Tom had a real-world name, a respectable job and a reputation to maintain. Cheshire rented a truck and hauled what remained of the operation —including hundreds of back issues of TAP, all of which escaped unsinged—over to his place in Manhattan. But in the end, TAP didn't survive the blow. A few months after the fire, Cheshire printed its final issue. Ke4,44:T4 D-Sje. ElAcke4 • 2 3 Meanwhile, the Southern California phreaks had been holding their equivalent of TAP meetings. Once a month or so, a group of phreaks, including Roscoe and occasionally Kevin, would get together informally at a Shakey's Pizza Parlor in Hollywood to talk and exchange information. But the L.A. phreaks weren't a particularly sociable bunch to begin with, and their meetings were far less organized than those on the East Coast, with fewer political overtones. Though an avid TAP reader, Roscoe shunned blue boxes and most of the other electronic crutches of phone phreaking. They were just too easy to trace, he thought. Roscoe preferred to exploit flukes, or holes, that he and his friends found in the newly computerized telephone System. Modesty was not one of Roscoe's virtues. He claimed that he had acquired as much knowledge about the telephone system and the computers that controlled it as anyone else in the country. He kept notebooks filled with the numbers of private lines to corporations like Exxon and Ralston Purina, along with access codes to scores of computers operated by everything from the California Department of Motor Vehicles to major airlines. He boasted that he could order prepaid airline tickets, search car registrations and even get access to the Department of Motor of Vehicles' computer system to enter or delete police warrants. Whereas most pure phreaks viewed their art as a clever means of bypassing the phone company, Roscoe saw it as a potential weapon. With access to phone company computers, he could change numbers, disconnect phones or send someone a bill for thousands of dollars. Most of the numbers in his extensive log came from hours of patient exploration on acomputer terminal at school. And many of the special tricks he learned from Kevin Mitnick. Roscoe met Kevin in 1978, over the amateur radio network. When Roscoe was tuned in one day, he was startled to hear a nasty fight in progress between two hams. The control operator of the machine was accusing a fellow ham named Kevin Mitnick of making illegal longdistance telephone calls over the radio using stolen MCI codes. At the time, Roscoe knew nothing of telephones or computers. But given the vituperative tone of the angry ham, either Kevin Mitnick had done something truly terrible or he was being unjustly accused. Suspecting the latter, Roscoe switched on his tape recorder and recorded the invectives as they flew through the air. Then he got on the radio to teil Kevin that he had a tape recording of the accusations if Kevin wanted it. Sensing a potential ally, Kevin gave Roscoe a telephone number to call so that they could speak privately. As Roscoe was to find out later, Kevin had 24 • MEZPUNK given him the number of a telephone company loop line, a number hidden in the electronic crevices of the telephone network and reserved for maintenance workers in the field who are testing circuits. Roscoe was immediately taken with this teenager, a good three years his junior, who evidently knew so much about telephones. He drove out to the San Femando Valley to meet Kevin, gave him the tape and cemented a new friendship. Sometimes Kevin called Roscoe directly at his home in Hollywood, a toll call from the San Femando Valley, and they talked for hours. When Roscoe asked him how a high schooler could afford it, Kevin just laughecl. ♦♦ When Susan met Roscoe in 1980, he had been phreaking for about a year. She feil in love with him almost at once. He was the first man she had met who displayed some intelligence and whose life didn't revolve around drugs and the drug scene. She found Roscoe's interest in computers charming, even fascinating. Roscoe was taking phone phreaking to a new level, combining his knowledge of the phone system with his growing knowledge of computers. Susan saw this as a brilliant next step for someone with a phone obsession. What was more, they were both talented at employing their voices to desired ends. They shared a faith in how much could be accomplished with a simple phone call. As a teenager, Susan had employed the technique she called psychological subversion, otherwise known as social engineering, to talk her way into backstage passes at dozens of concerts. Posing as a secretary in the office of the head of the concert production company, she could get her name added to any guest list. Susan prided herself on those skills. If she and Roscoe had anything in common, both lacked the mechanism that compels most people to teil the truth. Roscoe and Susan started to date each other. Roscoe was attending the University of Southern California and his schedule there, he told her, let him see her only on certain nights. But that was fine with Susan, asshe was holding down two jobs. One was as a switchboard operator at a telephone answering service. The more lucrative job was something she knew how to make a lot of money at: she worked for a small bordello in Van Nuys. Her counselor story didn't last long. Roscoe made it his business to learn all he could about people, and Susan was no exception. When the truth emerged about Susan's profession, Roscoe found it more amusing than scandalous. Ketbzw T4 D444-Sje. Hi.duzi. • 2 5 In her head, Susan was living out a romance of her own quirky invention. I n fact, the relationship between Susan and Roscoe was oddly businesslike, hardly distracted by passion. Often their dates consisted of an excursion to the USC computer center, where Roscoe would set Susan up with a computer terminal and keep her occupied with computer games while he "worked." Susan soon realized that he was using accounts at the university's computer center to log on to different computers around the country. Susan lost interest in the games and turned her attention to what Roscoe was doing. -Before long, she became his proteg6e. Susan developed her own talent for finessing her way into forbidden computer systems. She began to specialize in military computer systems. The information that resides in the nation's military computers isn't just any data. It represents the nation's premier power base—the Pentagon. And in digging for military data, as Susan saw it, she, a high school dropout and teevage runaway, was just a silo away from the sort of control that truly mattered. Still, she was a beginner, far short of mastering the Defense Department's complex of computers and communications networks. What she couldn't supply in technical knowledge she compensated for with other skills. One of her methods was to go out to a military base and bang around in the officers' club, or, if she was asked to leave, in bars near the base. She would get friendly with a highranking officer, then go to bed with him. While he was sleeping, she would search through his personal effects for computer passwords and access codes. Roscoe could never have had such access, and Susan derived some measure of satisfaction from knowing this fact. She would report each new success to Roscoe, who praised her profusely while making careful note of the specifics. From her job at the bordello, Susan was taking home about $1,200 a week, and all of it came in handy. She invested every spare cent in computer and phone equipment. She installed a phone line for data transmission, and an "opinion line" she named "instant relay." Whoever dialed the "instant relay" number got Susan's commentary on topics of her own choosing. A t the same time, she taught herself to use RSTS, Resource Sharing Time Sharing, the standard operating system for Digital Equipment Corporation's PDP-11 minicomputers. (Operating systems are programs that control a computer's tasks the way an orchestra conductor controls musicians. Operating systems start and stop programs and find and store files.) For computer intruders the fascination with a 26 • CYgEZPLINK computer's operating system is obvious: it is not only the master controller but also the computer's gatekeeper, regulating access and limiting the capabilities of users. Roscoe often employed Susan's Van Nuys apartment as a base of operations. He was usually accompanied by his younger cohort, the plump and bespectacled Kevin Mitnick. Kevin was the kind of kid who would be picked last for a school team. His oversize plaid shirts were seldom tucked in, and his pear-shaped body was so irregular that any blue jeans would be an imperfect fit. His seventeen years hadn't been easy. When Kevin was three, his parents separated. His mother, Shelly, got a job as a waitress at a local delicatessen and embarked on a series of new relationships. Every time Kevin started to get close to a new father, the man disappeared. Kevin's real father was seldom in touch; he remarried and had another son, athletic and good-looking. During Kevin's junior high school years, just as he was getting settled into a new school, the family moved. I t wasn't surprising that Kevin looked to the telephone for solace. Susan and Kevin didn't get along from the start. Kevin had no use for Susan, and Susan saw him as a hulking menace with none of Roscoe's charm. What was more, he seemed to have a malicious streak that she didn't see in Roscoe. This curiously oafish friend of Roscoe's always seemed to be busy carrying out revenge of one sort or another, cutting off someone's phone service or harassing people over the amateur radio. At the same time, Kevin was a master of the soothing voice who aimed at inspiring trust, then cooperation. Kevin used his silken entreaties to win over even the most skeptical keepers of passwords. And he seemed to know even more about the phone system than Roscoe. Kevin's most striking talent was his photographic memory. Presented with a long list of computer passwords for a minute or two, an hour later Kevin could recite the list verbatim. Roscoe and Kevin prided themselves on their social engineering skills; they assumed respect would come if they sounded knowledgeable and authoritative, even in subject areas they knew nothing about. Roscoe or Kevin would call the telecommunications department of a company and pose as an angry superior, demanding brusquely to know why a number for dialing out wasn't working properly. Sufficiently cowed, the recipient of the call would be more than glad to explain how to use the number in question. While Kevin's approach was more improvisational, Roscoe made something of a science out of his talent for talking to people. He kept a Ke464.:T2 Die4,-Sje H • 27 separate notebook in which he listed the names and workplaces of various telephone operators and their supervisors. He noted whether they were new or experienced, well informed or ignorant, friendly and cooperative or slow and unhelpful. He kept an exhaustive list of personal information obtained from hours of chatting: their hobbies, their children's names, their ages and favorite sports and where they had just vacationed. Roscoe and Kevin didn't phreak or break into computers for money. Secret information, anything at all that was hidden, was what they prized most highly. They seldom if ever tried to seil the information they obtained. Yet some of what they had was eminently marketable. Roscoe's notebooks, filled with computer logins and passwords, would have fetched a tidy sum from any industrial spy. But phreaking to them was a form of high art that money would only cheapen. Roscoe especially thrived on the sense of power he derived from his phreaking. Presenting a stranger with a litany of personal facts and watching him or her come unhinged gave Roscoe his greatest pleasure. Another frequent visitor to Susan's apartment was Steve Rhoades, a puckish fifteen-year-old from Pasadena with straight brown hair that cascaded down to the middle of his back. His timid intelligence and easy manner had a way of catching people off guard. He was an expert phreak who had earned a grudging respect from the Pacific Bell security f o r c e — the very people he loved to taunt. So adept was he at manipulating his telephone service from the terminal box on the telephone pole outside his house that the phone company removed the footholds. Like Kevin and Roscoe, Steve was an amateur radio buff. Two-way radios, in fact, often figured in their phreaking. When foraging through phone company trash for manuals, discarded papers containing passwords and whatever else might help them in their phreaking endeavors—a method they called trashing—they communicated by two-way radio. Whatever the personality differences in the L.A. gang, their various talents brought results. Working together, they were able to get the numbers of lost or stolen telephone credit cards using highly imaginative methods: for instance, they would divert cardholders' toll-free calls to report lost cards to a pay phone of their choosing and answer with, "Pacific Bell, may I help you?" Their vast store of knowledge came from months of diligent research: they obtained manuals however they could get them and joined as many company tours as they could, mostly to familiarize themselves with building layouts. The group routinely got credit information from the computer at TRW's credit bureau. Some- 28 • MRPUNK times it was a matter of talking an unsuspecting employee out of a password; sometimes a job required "physical research," such as a latenight excavation of TRW's Dumpsters. By brainstorming together, the group would be inspired to ever more audacious stunts. On one occasion, Steve Rhoades figured out a way to override directory assistance for Providence, Rhode Island, so that when people dialed for information, they got one of the gang instead. "Is that person white or black, sir?" was a favorite line. "You see, we have separate directories." Or: "Yes, that number is eight-seven-five-zero and a half. Do you know how to dial the half, ma'am?" A few months into her infatuation with Roscoe, Susan noticed unhappily that he was spending less time with her. Then someone let her in on the reason: she had been deceived. Roscoe, it turned out, was all but engaged to someone else, a law student as prim and straight in her ways as Susan was errant in hers. The other girlfriend apparently provided Roscoe's tie to respectable society. Susan despaired. He had been displaying affection for Susan when what he really wanted to do was exploit her eagerness to hack. When she confronted him, he just laughed. So she tried a veiled threat: she told him it was quite likely that FBI agents would come knocking on her door, and she would have to talk to them. Roscoe feigried puzzlement. Susan refused to believe that he wasn't at least torn between the two women. Seizing upon that possibility, she suggested that they go to Las Vegas and get married at once. He just smiled and said she had been misled. What Roscoe had failed to take into account was that the person he had just crushed was a woman who had been bruised once too often. By rejecting her so heartlessly, Roscoe was inviting trouble. He had yet to experience Susan's dark side. • ♦ • Eddie Rivera, a free-lance writer in Los Angeles, wasn't sure what he had stumbled into. As he was getting out of his car one day on Sunset Boulevard in late April of 1980, he saw a flyer that simply read: "UFO CONFERENCECALL NOW." His curiosity stirred, the young reporter dialed HOBO-UFO and heard three people chatting idly, engaged in what seemed to be an interminable telephone conversation. A television murmured in the background. After listening to five more minutes of prattle, Eddie sensed the possibility of a story far different from what he usually produced as a rock-and-roll critic. Like Susan Thunder before him, Eddie focused on meeting the person running the conference. "Excuse me," he Kevz..: T4 D444-Szief4elie4 • 2 9 interrupted. y o u guys on this line know who runs it, have him call me." The line went silent; he feit as if he had switched on the kitchen light late at night and seen dozens of cockroaches running for cover. But it worked. Within a day of putting the word out that he wanted to meet Roscoe, Eddie received his first call. Eddie got a story assignment from the L. A. Weekly, an alternative newspaper, and went to work. Their first meeting took place at an electronics store on Santa Monica Boulevard owned by Barney, Roscoe's pudgy, disheveled benefactor. When not in school or overseeing the HOBO-UFO line from his home, Roscoe was often at Barney's place. With not a customer in sight, the store was littered with old televisions in various stages of disrepair. For his part, Barney derived no small amount of pleasure from the venture he was financing; he used the conference line to meet adolescent girls. Eddie hadn't known quite what to expect. Roscoe's appearance was surprisingly neat, but there was something amiss: his pale blue polyester pants with a slight flare at the bottom, and his dark polyester print shirt with an oversize collar, were already at least five years out of date. The twenty-year-old Roscoe seemed more to resemble an electrical engineering student than a telephone outlaw. For the first interview, Barney put a "closed" sign in the Shop window and, in what would become a routine preamble to the interviews, the three went out for doughnuts. Roscoe lived on junk food, as did, i t seemed, all his fellow phreaks. A patina of doughnut glaze frequently rested on Roscoe's lips. In the afternoons, Roscoe moved on to Doritos and cheeseburgers. And Barney's store was strewn with Winchell's Donuts coffee cups whose contents suggested that Barney might be using them as petri dishes. Roscoe made it clear from the start that he would be in complete control of the nature and quantity of information he imparted to Eddie. He enjoyed telling Eddie just how muck he knew about telephones—far beyond the Body of information known to the average telephone company employee. There was something oddly mechanized about Roscoe's language. Eddie was struck by the young man's formal, almost bureaucratic way of speaking. In response to a question, Roscoe usually answered as indirectly as possible. He had a curious affection for the passive construction. Roscoe didn't simply make phone calls. Instead, telephone conversations were initiated. Perhaps, Eddie thought, Roscoe's tangled locution resulted from reading too many of those phone company manuals he kept talking about. In any case, his manner of speech distanced him from 30 • CCERPUNK whatever he was talking about. Perhaps it made him feel more important. Roscoe told Eddie that he had a friend at the phone company who could get him into the switching room that housed the powerful computer controlling all the telephones in Hollywood. During one recent late-night visit there, Roscoe told Eddie, he had walked over to a wall that was blanketed with telephone company switching equipment and watched as his friend flicked a switch. A t the sound of a female voice, the friend announced proudly, "That's Farrah Fawcett." Bored telephone company employees, Roscoe's friend claimed, monitored people's calls all the time. Roscoe told the story in such precise detail that Eddie had no doubt about its truth. In the early reporting stages of Eddie's article, Roscoe was highly secretive about his whereabouts, guarding his daily comings and goings like a fugitive. If Eddie wanted to speak with him, he would have to wait for him to call. After a few weeks, Roscoe gave him a number where he could leave a message. lt was a month before Roscoe invited the reporter to his home, one of ten units in a plain two-story white stucco building located in a shabby neighborhood an the southern edge of Hollywood that was cluttered with similar apartment buildings. Roscoe lived with his mother in a ground-floor two-bedroom apartment. Adult bookstores dominated the neighborhood. There seemed to be little in Roscoe's life besides school and telephones. Eddie heard that Roscoe had a girlfriend, but he never saw any sign of her. Roscoe had once introduced Eddie to someone named Susan, a bizarre and cranky young woman, eccentrically tall and with unusually wide hips, but she and Roscoe appeared to be just friends. His world was the telephone, and from his small bedroom in the back he operated his HOBO-UFO conference. His phone rang constantly as people called the line. Roscoe continuously monitored the conference through a speakerphone, which created a constant low level of conversation in the room, and he could pick up his telephone any time and interrupt. Another line attached to an answering machine rang frequently as well. Many of those calls came from giggling teenage girls to whom Roscoe had given his private number. There was something about the way Roscoe reacted to telephone tones that made Eddie suspect he had a musical ear. He could recite a phone number just by hearing it dialed. Spying an upright piano and a large stereo in the modest quarters, Eddie decided he was right. Scholastic awards from Belmont High School lined Roscoe's bedroom wall; now Ktvz4.: T4 Dmiz-S$&H444(4. • 3 1 he was attending USC an a scholarship. And from what Eddie could see of Roscoe's interaction with his mother, an immigrant from Argentina who appeared to speak no English, Roscoe was a model son. Eddie was taken aback to hear Roscoe's perfect Spanish, spoken with the unselfconscious ease of a native. Roscoe's complexion was so pale and his English so flatly American that Eddie would have put his roots far north of Argentina, possibly in Iowa. If Roscoe had a side that was less restrained and formal, he displayed it to Eddie just once. On a drive through Hollywood, down a section of Western Avenue elevated above the freeway, Eddie and Roscoe were stopped at a red light a few doors away from a storefront church, where asmall congregation of Hispanics lingered outside. "Slow down!" Roscoe blurted out suddenly from the passenger's seat. "I'm going to freak these people out!" He rolled down his window and leaned his torso out the window. "Ay Dios Info!" he screamed in perfect Spanish, in the evangelical wail of a recent convert. As they accelerated away from the horrified worshipers, Roscoe was beside himself with laughter. "That gets 'em every time!" he cried. For the most part, the people who called Roscoe's conference lived for their telephonic encounters. Many were blind, Roscoe told'Eddie, or otherwise handicapped. Others were housewives or single mothers. The majority were overweight. Their names—Rick the Trip, Regina Watts Towers, Dan Dual-Phase, Mike Montage—suggested to Eddie a group of shy folk making sad attempts to add mystery and intrigue to their lives. Eddie's suspicions were confirmed when, several weeks into his reporting, he attended a phreak party at Dan Dual-Phase's house. For many members of the group, it couldn't be a simple drop-in affair. So few of the conference line callers could drive that the transportation logistics alone had lent an unusual air to the party. A t the event itself, the conference line callers sat in scattered clutches of embarrassed silence, too shy to speak to one another in person. As part of the education process, Roscoe presented Eddie with literature. He gave the reporter several back issues of TAP, referring to it as if its circulation matched that of Newsweek. After a mystifying perusal of TAP's pages, with its proclamations that no code can be completely secure, Eddie could only conclude that it carried the voice of true outlaws. Roscoe also showed him a legendary Esquire magazine story about phone phreaks. One of the featured phone phreaks in the story was Captain Crunch. Roscoe angrily denounced Crunch as an idiot whose blue box was a crutch. Phone phreaks should be like Houdinis, able to 32 Ä enEeUNK cruise the telephone network as if by magic, without the visible aid of tools. Roscoe did have one hardware crutch—a Touch-Tone dialer, a square, gray plastic box small enough to fit in one's palm. On the front was a dialing pad with ten numbers; batteries were taped to the back. The dialer was elegantly simple yet indispensable. Its function was to send Touch-Tones into the mouthpiece of a rotary-dial phone. These were precisely the tones that he needed to get access to corporate phone networks for his free telephone calls. Once he reached a company's private telephone system, a friendly digitized voice asked for a code. After receiving a correct code punched into the dialer, the phone system stood open for dialing anywhere at all. One day during Eddie's reporting assignment, Roscoe had with him a slightly younger friend named Kevin. Eddie had already heard about Kevin from Roscoe. I f Eddie found Roscoe's knowledge of telephones impressive, Roscoe had told him in a reverential tone, he should meet Kevin. Kevin lived about forty-five minutes away from Roscoe in the San Fernando Valley, and until Kevin got his driver's license, Roscoe regularly retrieved him and then took him home. Kevin was overweight and exceedingly shy. Roscoe, in fact, was downright garrulous compared with his laconic friend, who assiduously avoided eye contact. Where Eddie had seen glimpses of normalcy in Roscoe, in Kevin he saw nothing but a life steeped in telephones and computers. When he joined Roscoe and Kevin for an afternoon of phreaking, Eddie noticed that Roscoe frequently deferred to Kevin, whose encyclopedic knowledge of the telephone company's computerized control switches was well beyond his own. And where Roscoe was clearly taken with the idea of a reporter trailing after him for weeks on end, Kevin was altogether uninterested in Eddie. In fact, Roscoe too seemed temporarily to lose interest in the reporter when Kevin was around, so deep was his concentration on the business of phreaking with Kevin. Eddie was struck by the patience and perseverance the two youths displayed when seated before a computer screen. Eddie had seen Roscoe spend an hour at a time simply scanning for dialing codes, but the display of endurance when Roscoe and Kevin joined forces was in another league. For five hours on one occasion, they sat in front of a computer terminal that was connected to a phone company computer, watching a series of numbers scroll by. Roscoe and Kevin grew increasingly excited over the hieroglyphics on the screen, but their excitement passed right over Eddie. If the reporter asked them to explain what they were seeing, Kev+1•: T4 Divi4-Sje fisdzel • 3 3 he received a sidelong glance of amused condescension. I f these two phreaks were breaking the law, Eddie couldn't teil. Before Jong he stopped trying to understand what they were doing and found himself struggling to stay awake. Eddie had an inkling that Kevin might be even more important than Roscoe for his story. Not only did Kevin seem to know more than Roscoe about telephones, but Eddie got the impression that Kevin had taught Roscoe much of what he knew. Eddie figured he should probably take the kid out for a cheeseburger, but he decided he wanted nothing to do with him. As he feit himself pulled further into this strange world, he realized that the phreaks were beginning to make him nervous. In reality, Roscoe's life wasn't much richer than the lives of the ionely souls who hung on his conference line. Yet Roscoe regarded the others with a mixture of delight and disdain: delight at their obvious respect for him, and disdain for the emptiness in their lives. But they just depressed Eddie. Between the desperate conference-line callers and the sinkhole of technical language, clouded further by Roscoe's impossibly stilted speech, Eddie was beginning to regret that he had tackled such a difficult story. He began to yearn for an easy, more familiar assignment, perhaps abackstage interview with Joey and the Pizzas. At the least, his stint as an honorary member of the gang had come to an end. l t was time to write his story. Eddie's cover story in the L.A. Weekly in the summer of 1980 left a lasting impression on those who saw it. Mostly it was a profile of Roscoe, aphone phreak who could do anything with a telephone. Shortly after the story appeared, Eddie was at a party and overheard a conversation about it. When he mentioned that he had written it, people said they wanted to meet this Roscoe and learn a few of his tricks. Meanwhile, Susan was obsessed by her desire to get something on Roscoe, something she could hold over him and something other people would believe. lt wouldn't be difficult, she figured, since his forays often led him into dubious territory. And she wouldn't mind getting Kevin as well. Kevin and Roscoe had a Jong-standing agreement to share information with each other, usually to the exclusion of Susan. No, she wouldn't mind one bit if Kevin got pulled into the undertow. The first opportunity for revenge came with the U.S. Leasing breakin. With a little programming flourish, Roscoe had given himself system privileges on a computer at U.S. Leasing, a San Francisco company with 34 • enEgPUNK subsidiaries specializing in leasing electronic equipment, railcars and computers. In most large multiuser computers there is a hierarchy of privilege meted out to users. The system manager has the highest level of privilege, acting as de facto God in the computer system, while ordinary users have their capabilities more stringently curtailed. Such a pecking order works only if the lesser users cannot find ways to masquerade as the system manager. Because its network address circulated widely throughout the phreak community in 1980, U.S. Leasing had one of the most popular computers for phreaks to play on. Both Roscoe and Susan, in fact, enjoyed posting the computer's network address on electronic bulletin boards, offering guided tours of the system to phreaking neophytes. U.S. Leasing used nothing but Digital Equipment PDP-11 computers. All the computers ran RSTS, a notoriously insecure operating system. RSTS had been designed in the 1970s as the ultimate in user-friendliness. Ask the system for a password and it would assign you one automatically. Ask for asystem status report and you were provided with the narre of every user on the system. More often than not, people chose their names as their passwords. To make things easier for its customers, Digital even supplied sample passwords, such as field and test for field technicians. And the field technicians often had highly privileged accounts. Getting to computers such as the one at U.S. Leasing was deliciously easy. The first step was to dial into the Telenet network. Telenet was the first commercial network designed solely to link together computers. Computer networks differ from telephone networks in that instead of each conversation getting its own circuit, many computer-to-computer conversations on a single network can share a single circuit. Because the information being transmitted is digitized, strings of ones and zeros, it can be broken up into small packets. Each packet contains an address that tells the network where it's going. This is known as packet-switching. Telenet was structured in such a way that you could choose to communicate with any computer within the network simply by typing a sequence of numbers, whereupon you were automatically connected to the computer you chose. The computers, each with an assigned number sequence, formed a mesh. Any system connected to Telenet, be it a computer at Bank of America or one at General Foods, could be reached with one local phone call. Gathering some physical evidence was Susan's first task. She knew KeeZ+.:T4 Dmii-SjeHxdieds • 3 5 how difficult it was to track down people who broke into computers: the only fingerprints they left were electronic, and those were nearly impossible to attach beyond a reasonable doubt to an individual. Reams of printouts logging an intruder's electronic joyride through a computer or a network of computers were worthless unless there was stronger evidence linking the specific person to the incident. Susan's first step was to get something in Roscoe's handwriting. When he jotted the number of the U.S. Leasing computer and several company passwords on a sheet of paper, Susan watched as he folded it and put it in his back pocket. ♦♦ ♦ The computer staff at U.S. Leasing were baffled when, one day in December 1980, the computers that ran their business began acting strangely. The company's computers were behaving in an unusually sluggish manner. So it was a relief to the computer operator on duty late one afternoon when someone called to say that he was a software troubleshooter working for Digital Equipment Corporation. The slowdown problem, he told the operator, was affecting all of Digital's sites. The situation was so widespread, he said, he wouldn't be able to come in person to fix it; he would have to walk someone through the procedure over the phone. The cheerful technician asked for a phone number for the computers, a login and a password. He said he would then insert a "fix" into the system. The computer operator at U.S. Leasing was only too happy to oblige—it was a procedure he had Bone through before with Digital. He thanked the Digital technician, who assured him that everything would be back to normal in the morning. But the next morning, the computers were as phlegmatic as ever. If anything, the problem was worse. The computer operator called John Whipple, U.S. Leasing's vice-president for data processing, who called the local Digital office in San Francisco and asked for the helpful technician who had called the previous day. There was no employee by that name in San Francisco. So Whipple called Digital headquarters in Massachusetts. Not only was there no such employee on record, but Digital had no plans to make a universal repair. Whipple went straight to the computer room to find the operator. "Someone has been in," he told him. Whipple's only choice, he decided, was to find and destroy any unauthorized accounts, to call everyone who used the U.S. Leasing computers and have them change their passwords. Later in the day, the 36 • CYgEZPUNK computer operator had a second call from the "technician." He was as friendly as ever, explaining that the fix hadn't taken. "I can't seem to get into your machine," he said in a concerned voice. This time, the operator played dumb. "Give me your number and I'll call you back." "I'm not really reachable," came the response. "Let me call you back." When Whipple got to work the next morning, the computer operator was beside himself. The printer connected to one of the computers had been disgorging printouts all night. The floor was papered with them. And every page of every printout was densely covered with type. Covering each printout, repeated hundreds of times was a spiteful message: "THE PHANTOM, THE SYSTEM CRACKER, STRIKES AGAIN. SOON I WILL CRASH YOUR DISKS AND BACKUPS ON SYSTEM A. I HAVE ALREADY CRASHED YOUR SYSTEM B. HAVE FUN TRYING TO RESTORE IT, YOU ASSHOLE." Another read: "REVENGE IS OURS!" And finally, in neat rows of type, marching across the page: "FUCK YOU! FUCK YOU! FUCK YOU!" Interspersed among the vulgarities were names. Roscoe was one. Mitnick was another. Mitnick? MlTnick? Could that mean that MIT students had done it? People who were attracted to the computer profession in the 1960s and 1970s could hardly be considered flamboyant. By and large, they were technical loners. Those who entered the field before the computer industry mushroomed, beckoning thousands of ambitious seif-starters with the promise of fortunes to be made, were mostly men like John Whipple. They went to schools like MIT and the Califomia Institute of Technology, and they latched onto computers as an extension of an adolescent compulsion to sit in their rooms and pull radios apart. Others had a simple fascination with math, and computers were just the logical next step. Whipple had been in the computer industry for twenty years, long enough to have witnessed many a harmless prank. MIT students were famous for harmless pranks. But this was no practical joke. These electronic vandals might as well have broken into the room itself, sprayed graffiti all over the walls and taken a hatchet to the computers. Not only had they plastered printer paper with their malicious messages, they had gone into the files in system B themselves, deleted every scrap of information an inventory and customers and billing notices and replaced everything with their invective. They had, that is, destroyed the com- 144/4.: T4 Dmii-S:44 f i 1 • 37 puter's entire data base. Whipple ordered both of U.S. Leasing's computers to be cut off from any telephone lines and sealed from outsider access. His chief worry wasn't so much over the lost data, because he also had the information on backup tapes. His main fear was that somehow the intruders had devised a program that would let them back into U.S. Leasing even after all the passwords had been changed, a software contrivance called a trapdoor. That day, the company's computer operations remained shut down while the computer stall loaded the backups, reconstructed the data and restored it on the machines. The entire restoration process took twenty-four hours. After a day, the computers went back on line. Although all the passwords had been changed, and the system seemed assecure as it was going to get, Whipple decided he wasn't going to rest until arrests had been made. His first call was to Digital headquarters. All he wanted was some idea of how the intruders might have broken in at all, and some assurance that it wouldn't happen again. Anyone at Digital, he figured, would sympathize immediately with what Whipple was going through. A t the least he expected a sympathetic ear, and he wouldn't have been surprised i f the company dispatched some eager young security expert to San Francisco to take care of everything. But the response he got was tepid if not cool. Within a few minutes, he was mired in a bureaucratic procedure. In order to have Digital even consider the matter, Whipple would have to fill out a purchase order, then have his supervisor authorize the expense. A purchase order? Some invisible creeps were erasing his data, writing "FUCK YOU" all over the place, threatening his other computer, and Digital wanted him to fill out a purchase order? This wasn't the reaction Whipple had expected from Digital, of all companies. Digital was founded in 1957 by Ken Olsen, an individualistic and outspoken MIT engineer. Just as the International Business Machines Corporation was passing the Billion-dollar mark in sales of machines that sat behind glass enclosures and processed information in huge batches, Olsen set out with $70,000 in venture capital to build a smaller computer that interacted directly with the user. The idea of an interactive computer had come from a pioneering generation of computer researchers at MIT, and one of their early machines became the model for Digital's first computer, the PDP-1. When Digital delivered one of its first computers to MIT, it was installed in a room one floor above an IBM machine. The IBM computer was locked behind two layers of glass; problems were submitted on batches of IBM cards and results didn't come 38 • MEZPUNK until the next morning. The Digital computer was accessible to students any time of the day or night; commands were typed on the keyboard and the computer responded in a few seconds. A love affair began. Students gathered around and worked on the new computer until 3:00, 4:00 and 5:00 in the morning. The MIT administration even considered removing the Digital computer because people were so obsessed with i t they stopped washing, eating and studying for their classes. And from the beginning, Digital designed its computers to be used in networks. Digital found its first large customer base at universities and other research institutions. For the same reasons of accessibility and Speed, it didn't take long for Digital computers to gain acceptance among commercial customers, too. The complexity that came with buying an IBM mainframe was often overwhelming for people outside of university computer science departments. Digital computers provided a package that wasas professional as IBM's, but not nearly as complex. Whipple had believed Digital to be a company driven by its customers' requirements. He was surprised and dismayed by the company's response to his request for help. Evidently, the bureaucratic tangle served to mask the true situation: the people at Digital headquarters in Massachusetts wanted nothing to do with the event. So Whipple called the FBI. Three agents arrived at his office the next day. They showed far more concern than anyone at Digital had. But their questions were geared toward trying to figure out whether this was a federal case. There was no doubt that a crime had been committed. There were no federal laws governing computer crime at the time, but if this case fell under federal jurisdiction, i t could be prosecuted under federal wire fraud statutes. At the same time, the state of California had a year-old law on the books prohibiting unauthorized access to computer systems. After some deliberation, the FBI decided that, since the breakin didn't appear to have involved interstate telephone calls, it should be handled by local authorities. Whipple's next call was to the telephone company. He asked Pacific Bell to place traps on the lines. The phone company agreed to do the traces. But that presumed that whoever had committed this act would call again. Whipple had the feeling, even the hope, that these intruders would be arrogant enough to do so. And they were. The call came in the afternoon. This time, the computer operator's object was to keep the "technician" on the line while a trace was completed. "I don't know what's going on here," he moaned into the phone, "but everyone is upset." The operator kept a dialogue going for as long as he could. He i4v4.: T4 Die4-5je.ffre.41 3 9 cursed U.S. Leasing, saying it had taken away his password, so he couldn't log on to the computers even if he wanted to. Oddly, the friendly technician seemed in no hurry to hang up. With an eerily professional knowledge of the system, he told the operator exactly what to do to bring the computers back on line. Whipple and a phone company employee were listening on another line, and when the operator put the hacker on hold, Whipple could hear two people talking in the background. "I think they're on to us," one said to the other. The trace went only as far back as an outbound Sprint port in San Francisco—the electronic doorway of GTE Sprint, then a fledgling longdistance telecommunications company. Using several different long-distance accounts to cover their tracks was one of the phone phreaks' favorite tricks. Someone wishing to break into a computer could make himself more difficult to trace by first dialing through the equipment of one or even several long-distance carriers before finally calling his target. In every case false credit card numbers were used. Such a ruse made the phone company's task of completing a trace considerably more difficult. Crossing company boundaries made it easy for phreaks to hide behind layers of bureaucracy that slowed law-enforcement officials. It took Whipple several phone calls before he finally reached Sprint's security department, such as it was. The security people gave him a number he could call around the clock. If the intruder called again, they told him, he should call the number at once so that they could start their own trace. A few hours later, the intruder did call. Again the unhappy operator kept him chatting, and again the phone company traced the call to the same Sprint telephone number. With the glee of an angler whose hook is securely lodged in the mouth of a prizewinning marlin, Whipple called the number the Sprint security officials had given him. There was no answer. Whipple had never been much of a candidate for confrontation. He was easygoing and low-key. But now he was on the warpath. To arrive at work one morning and see his printer spewing out obscenities and all of the information on one of his computers obliterated was something Whipple had never imagined. He wanted to find out if other Digital customers in the San Francisco area had been hit. Or did these miscreants have a particular reason for wanting to attack U.S. Leasing? That afternoon, he began calling other large Digital installations. A t least a half-dozen others told him they too had had troublemakers in their systems. One large hospital that had just bought its Digital system didn't even have it fully installed, yet had already been getting repeated 40 • MEZPUNK phone calls from a "Digital technician" demanding the computer dialup number and passwords. When the hospital computer manager explained to the caller that the computer wasn't even up and running, the indignant caller demanded to speak with the hospital's chief administrator. Whipple asked the hospital administrator if he would be willing to join him in pressing charges. No, came the answer. After all, the hospital had been spared any damage, and the negative publicity, he told Whipple, would far outweigh the satisfaction of seeing justice done. Whipple realized that if anyone was going to take up a crusade against these electronic foes, it would have to be U.S. Leasing alone. He took the systems down for another day to change everyone's password a second time. He set up the computers to monitor all unsuccessful log-in attempts. The following day, the computers were back on line. By four o'clock that afternoon the intruders were back, too, trying without success to break in again. Like insects smacking themselves senseless against ascreen at night to get to the light inside, they kept flying at the system, trying password after password. Once again, U.S. Leasing immediately shut down all its outside lines. By this time, the company was buzzing with talk of the intrusions. Whipple was stunned when he met a senior executive in the hallway who chuckled and said, "Maybe we should hire this kid." Whoever was doing this certainly seemed to have more than a passing familiarity with the computer's operating system. In fact, from the commands he was typing, he seemed to know more about exploring its nooks and crannies than Whipple and his staff. But hire such a meanspirited person? That would be like giving the Boston Strangler a maintenance job in a nursing-school dormitory. Whipple's reply to the executive was curt: "How many people will we have to hire to watch him?" As incredulous as he was disappointed, Whipple began to resign himself to writing this off as a colossal, embarrassing waste of energy and time. There wasn't much left to do but count up the losses and try to forget about it. In the end, he figured, the break-in had cost the company a quarter of a million dollars in lost time and business. The chances of ever catching the creeps who had caused all the Keadaches were slim at best. A few weeks later, Whipple dropped the matter entirely. Years later, Roscoe and Kevin would claim they had been framed by Susan Thunder, that she had plastered their names all over the U.S. Leasing computer in order to pin the break-in on them, while Susan would hold firm to her claim that Kevin and Roscoe had done it. Keezi-: T4 Nek-5;kF-14€4(4 v 4 1 • V • Continuing her quest for revenge, Susan decided on a frontal assault. She started out slowly, even harmlessly. She began compiling a fact book on Kevin, Roscoe and Steve Rhoades. She talked her way into the telephone billing office, got copies of their phone bills and devised complex frequency charts on the numbers they called. She was also able to get a customer name and address report on each number called. By keeping close tabs on the phone bill of Jo Marie, Roscoe's fianc6e, she could track him closely. lt didn't take Roscoe long to figure out that Susan had tumed on him. She called him at strange hours and left spiteful messages on his answering machine. One day she called Ernst & Whinney, where he worked in the data processing department, to inform the personnel office that one of the staff members was using the company's computer terminals after hours. As a result of Susan's call, Roscoe was fired. To elude her, he began changing more than just his phone number; he also changed his "cable and pair," a specific set of wires assigned to his apartment by the phone company switching office that ordinarily would have stayed the same when his number changed. But Susan's solution to that was simply to get Jo Marie's bill. There were other ways of getting phone numbers. When Kevin Mitnick changed his number, as he often did, Susan would drive out to his apartment in Panorama City, clip a test set to the phone line and call a standard number the maintenance people used to find out which number belonged to which cable and pair. lt wasn't long before she realized that Kevin was someone to reckon with. He was even more familiar with the ins and outs of the phone company than Roscoe was. I n fact, Kevin had outsmarted Susan by logging in to a phone company computer and disabling the automatic number identification test function for his telephone. If she stood outside his house and entered the code used to read back his number, all she got was a failure. By then Kevin had begun listening to Susan's private telephone conversations, by attaching a hand-held ham radio and clipping it to Susan's phone lines in a phone terminal box under a carport a few yards from her apartment. Anyone else who wanted to listen just needed to tune in to a little-used frequency on an FM radio. Kevin and Roscoe began taping her calls, most of which were long late-night dialogues with 42 • CYMPUNK another phone phreak she had started to date. Kevin and Roscoe tittered in the Background as a languorous Susan described the tricks of the prostitute trade to her boyfriend in full detail. And they taped her own taped greeting from the Leather Castle, the bordello where she plied her trade. "Jeanine," unmistakably Susan but uncharacteristically sweet, gave out the current rates for each service: $45 for a half hour "if you're dominant," $40 "if you're submissive" and $60 "if you'd like to wrestle." For a while, Kevin and Roscoe followed her around in separate cars, communicating with each other over their radios like two cops an a trail. When she discovered them, Susan escalated the war by bringing it into the public domain. • V • Bernard Klatt was one of the tens of thousands of technical workers in Silicon Valley, 350 miles north of Los Angeles. These intense engineers, predominantly men, populated the twenty square miles south of Stanford University in increasing numbers after World War II. They created a technological paradise that spawned first the semiconductor, then the microprocessor and finally the personal computer. An electrical engineer, Klatt worked as a technician at Digital Equipment Santa Clara, servicing and troubleshooting the company's computers. For Klatt, a tall, dark-complexioned Canadian who was aloof and formal with strangers, as for many others in Silicon Valley, computing was part vocation and part passion. He lived with his wife in a two-story apartment building in Santa Clara, several blocks off El Camino Real, Silicon Valley's main commercial thoroughfare. The building was one of thousands built as Silicon Valley exploded with new industry in the 1960s: a contemporary prefab structure with thin walls and a kitchen separated from the living room by a belly-high divider that served simultaneously as wall, counter and breakfast table. Like many in Silicon Valley, Klatt had given over his spare bedroom to his computers. But while others tinkered with inexpensive personal computers, Klatt was busying himself with a surplus Digital Equipment minicomputer. One of the company's most successful computers in the 1960s, the machine, known as a PDP-8, was awkward to program by today's standards, but it was one of the first computers that didn't require an industrial-strength life-support system. Klatt was able to power it by simply plugging it into his apartment's wall outlet, an unusual feature for large computers of its time. \Lui*: 1U M-$Ut H*cU+ t 43 Klatt decided to make his computer useful to a wider audience. Work ing with a friend, he wrote a program in the version of the BASIC computer language used on the PDP-8 that would allow a caller with a modem to dial in and transmit and receive messages. The PDP-8 stored the messages and then waited to display them for the next caller. This turned it into a bulletin board system, or BBS for short. Bulletin boards like Klatt's grew in popularity in the early 1980s, spreading around the United States as part of the personal computer explosion. They were a little like neighborhood bulletin boards found in laundromats or community centers, offering lawn cutting services and free kittens, but with more vitality. Since messages could be appended to other messages and categories could be organized to be scanned quickly by computer, the systems subdivided into special-interest cate gories. Most of the discussions were about computers, but subjects ran the gamut from science fiction to odd sexual practices. Private messages could be left for a particular user, while public messages were accessible to anyone who logged in. Callers could check in every day to see what had been added and to append their own comments. A kind of electronic stream of consciousness emerged as BBSs became the digital substitute for a neighborhood chat on the front stoop. By 1980 there were well over a thousand BBSs around the country. Today there are at least ten times as many. They covered a remarkable variety of features. Some permitted callers to store and retrieve software. This in turn gave rise to the world of free software and "shareware." Some programmers made substantial sums of money by giving their software away on approval, requesting that the users send a payment only if they found it valuable. Inevitably, by the early 1980s, pirate BBSs had emerged as well. Legendary boards like Pirate's Cove in Boston permitted callers to down load (using modems to transfer it to their own computers) commercial software without paying for it, and shared advice on how to break soft ware copy-protection schemes. Some of the pirate boards were well known, their telephone numbers posted widely. Other boards were more secretive, accessible only to a limited membership. Klatt's bulletin board, called 8BBS, was one of the nation's first bul letin boards for phone phreaks. Bernard Klatt had a fanatical commit ment to freedom of speech. After putting his system on line in March of 1980 and publishing its number on several other systems, he insisted that his board be a free haven for its users. The ground rules, which were set out for new callers in an introductory computer message, were simple: 44 a cmzpum Not ice:Uncontrolled message content. Proceed at your own risk. 8 B B S m a n a g e m e n t s p e c i fi c a l l y d i s c l a i m s a n y responsibility or liability for the of any message on this system. No contents representations are made concerning accuracy or appropriateness of message content. No responsibility is assumed in conjunction with message 'privacy'. 8BBS acts in the capacity of a 'common' carrier and cannot and does not control the content of messages entered. As a result, within months after 8BBS first began operation, a ragtag collection of phone phreaks and computer aficionados had discovered it and established it as one of the nation's premier clandestine electronic meeting places. Anyone dialing in was immediately struck by the dedi cation that the community of several hundred regular callers had to the subculture of phone phreaking. They were attracted by the notion that they were participating in some kind of high-technology avant-garde. Others called just to browse or "lurk," reading posted comments without making their presence known. 8BBS was frequently busy around the clock. Soon the board had national scope. Callers dialed in from as far away as Philadelphia. Some would place their calls using purloined telephone credit card numbers to avoid long-distance charges. Others would ex change illegal information. Credit card numbers, computer passwords and technical information on telephone networks and computers were all stored and read on 8BBS. It was impossible to tell whether the person sitting at the other end of a message was a skilled professional systems programmer or a teenager in the family den perched in front of a Com modore 64. It was in December of 1980 that both Roscoe and Susan, already locked in a bitter war, found their way to 8BBS. For several months they became regular callers, leaving general tips and trading information, while at the same time, as many phreaks are prone to do, flaunting their particular skills. Even their first messages were revealing. Susan was ever the seducer: fcW- 1U b*+k-$U*. HmIua, ▼ 45 Message number 4375 is 14 lines from Susan Thunder To A L L a t 0 4 : 3 8 : 0 2 o n 0 4 - D e c - 8 0 Subject: COMPUTER PHREAKING I am new in computer phreaking and don't know that much about systems and access. I h a v e h o w e v e r, b e e n a p h o n e p h r e a k f o r q u i t e awhile and know alot about the subject of t e l e p h o n e s . . . ( I t h i n k ) . . . a n y w a y, I would very much like to chat with anyone interested in sharing information, e s p e c i a l l y a b o u t c o m p u t e r s . B y t h e w a y, I a m a 6 ft. 2 inch blonde female with hazel eyes, weight 140, and I enjoy travelling alot. If anyone can suggest any neat places to go on weekends, let me know . . . Roscoe was the cocky self-styled techno-wizard, breathless in his first private message to Bernard Klatt: Message number 4480 is 20 lines from ROSCOE [RP] to SYSOP at 18:38:27 on 06-Dec-80. Subject: ROSCOE MUST CONSERVE SPACE. I AM ROSCOE, FAMOUS IN L.A., CA AND IN THE PAPERS OF L.A. FOR MY PHONE-COMPTR PHREAKING, FREE ACCESS TO ALL, AIRLINE TICKTS, ETC. VER IMPRSED WITH YR SYSTM. NOT HAD CHANCE TO REVIEN ALL MSGS YET. I WILL BE LEAVING YOU MORE DETAIL MSG WITHIN 7 DAYS BECAUSE I CAN BE OF GREAT ASSIST TO YOU AND ALL USRS. BASICALLY: TELL ME WHAT INFO TO WHAT YOU NEED, I CAN GET . . . ANYTHING. FREE AIRLINE. FREE HOTEL, FREE CALLS . . . BEST PHONE PHREAK IN L.A.! (I HAVE REPUTATION) AND ANM KNOWN BY MANY, WAS ON THAT'S INCREDIBLE, T.V. SHOW IN L.A., AND AM MOST POWERFUL IN LA.A. HAVE DEC SYSTEM 1,2 PASWR & DIAL-UPS IN ALL 48 46 a CYg&pUMC STATES, HAVE MANY PRIVED ACCTS, CAN CRASH SYSTEMS WITHIN 20 DAYS OF REQUEST TO DO SO, CAN GET ANY PHONE NO TO ANYTHING!!! (MORE THAN JUST NON-PUB ... CAN RUN DMV VIA TERMINAL . . . CAN RUN INTERPOL VIA TERMINAL . . . CAN RUN AIRLINE TICKET VIA TERMINAL ... CAN RUN PHONE COMPANY VIA TERMINAL . . . FREE PHONE SERVICE, FRE CUSTOM CALLING, ETC. CAN DO MUCH MORE ... I HAVE SO MUCH TO SAY THAT CAN'T FIGURE OUT WHAT TO SAY FIRST . . . EXUSE POOR REAIBILITY OF THIS LETTER . . . PLEASE CALL ME AT (213)469-. . . . VOICE AND LEAVE MSG ON HOW TO CALL YOU, OF IF YOU DON'T MIND, I WILL GET YOUR NUMBER, BUT ONLY IF YOU DON'T MIND. I ALSO WIT WANT TO KNOW ON HOW TO GET THAT PHONE-PHUN BOOK? THANK YOU FOR THE XCLNT SYSTEM ROSCOE. With the arrival of the Southern California phone phreaks on 8BBS in late 1980, the board took a disturbing twist. The anonymity that once was a source of comfort now led to rising paranoia. Susan and Roscoe's war spilled out in bitter public messages, and the ominous possibility that not only the computer underground but law-enforcement agencies were reading 8BBS became a concern. Susan, who was growing more and more computer literate, was often antagonistic and haughty in her public postings. In February 1981, she claimed that Roscoe was collaborating with the enemy: Message number 6706 is 16 lines from Susan Thunder To * * > A L L < « * a t 0 0 : 4 4 : 1 8 o n 2 7 - F e b - 8 1 Subject: GOING ON VACATION . . . I AM GOING ON A CRUISE OF THE CARIBBEAN AND BAHAMAS AND WILL BE BACK IN ABOUT A WEEK OR SO . . . DON'T EXPECT ANY REPLIES FROM ME DURING THAT TIME. THERE IS A VERY GOOD CHANCE THAT ROSCOE IS COLLABORATING WITH THE FBI TO TRAP PHREAKS: KevU*: 1U M-$Ut Wick*. ▼ 47 GIVEN THE TROUBLE HE HAS RECENTLY HAD, I KNOW THAT SOMETHING'S AMISS WHEN HE STARTS LEAVING PUBLIC MESSAGES, ESPECIALLY TO ANTON,* SEEING AS HOW HE AND ANTON TALK ON THE PHONE FOR SEVERAL HOURS EACH DAY . . . WHY WOULD HE LEAVE THE MESSAGES IN A PUBLIC SYSTEM ANYHOW? DON'T CALL THE SYSTEMS HE LEAVES: IT'S EITHER A TRAP, OR HE WANTS YOU ALL TO DO HIS REVENGE WORK FOR HIM!! HAVE FUN! THUNDR@MIT-DM,MIT-AI Outside of his spat with Susan, Roscoe was a good citizen on the BBS. Out of concern for the well-being of the board, he told other callers he believed the phone company had installed a line monitor on 8BBS. If telephone numbers were being recorded then everyone was potentially in trouble, regardless of their aliases. The news cast a pall over the BBS. The rising paranoia also affected Roscoe. He began to contemplate get ting out of the underground. WELL IT SEEMS THAT I, ROSCOE, AM GETTING TOO OLD TO KEEP UP WITH SO MUCH PHREAKING. MY INFORMATION GATHERING IS TAKING UP ABOUT 4 TO 5 HOURS OF MY TIME EVERY DAY, AND THAT'S TOO MUCH CONSIDERING THE FACT THAT I WORK FULL TIME AND ATTEND SCHOOL FULL TIME. SOON TO RETIRE . . . ROSCOE. Then, as if to help Roscoe out the door, Susan attacked him more viciously than ever, adding statutory rape to the list of crimes she wanted the others to believe Roscoe had committed: YOU ARE GOING TO JAIL FOR A LONG TIME FOR CRASHING AND ZEROING THE U.S. LEASING RSTS/ E. THEY WILL GET A CONVICTION. DID YOUR CHILD-MOLESTING CASE EVER GET RESOLVED? 16 COMPLAINTS FROM AS MANY DIFFERENT 11-15 YEAR OLD GIRLS IS PRETTY SICK. THEY SHOULD HAVE PUT YOU AWAY A LONG TIME AGO. ["Anton Chernoff," an early computer programmer, was Kevin's nickname of choice on 8BBS.1 48 a cmmiNic In mid-1981 the private war that Susan had taken public began to wane—at least on 8BBS. After Roscoe and Susan were gone, 8BBS continued to operate for almost another year. The board had lost some of its computer underground edge and shifted back in the direction of less controversial computer hobbyist concerns. But its phone phreak roots brought 8BBS crashing down. In early 1982 Bernard Klatt received a faster modem in the mail, a gift from some Philadelphia phone phreaks wishing to improve the speed of 8BBS. He didn't know that it was stolen, purchased by mail using a false credit card. In April of 1982, while he was on vacation in Canada, a team of law-enforcement officials from the Santa Clara County sheriffs office and telephone company security agents came to his apartment with a search warrant. A fire ax shattered his front door and the agents confis cated all of the 8BBS disks and backup tapes. When he returned, Bernard Klatt wasn't prosecuted, as he hadn't known that the gift modem was stolen property. But when his employer found out about the search of his home and the nature of the computer hobby, he lost his job. The 8BBS era had ended. A T A Perhaps, Susan said years later, if Roscoe hadn't filed a civil harassment complaint against her, dragging her into the ugly legal arena first, she wouldn't have used the evidence. It was early 1981 and the warring had been going on for several months when Susan was summoned to the Los Angeles city attorney's office for a hearing regarding Roscoe's complaint that she was disrupting his life with obscene and threatening telephone calls to him and to his mother. Susan nodded when the hearing officer admonished her to cease this behavior. Her opportunity for decisive revenge finally came later that year, after the COSMOS incident. It was at the Shakey's Pizza Parlor during Memorial Day weekend in 1981 that Kevin and Roscoe decided to break into Pacific Bell's COSMOS center in downtown L.A. Understanding COSMOS was es sential for efficient phreaking. COSMOS (the acronym stands for "Com puter System for Mainframe Operations") is a large data-base program used by local telephone companies throughout the nation for everything from maintaining telephone cables to keeping records and carrying out service orders. In 1981, most of the hundreds of COSMOS systems installed around the country were running on Digital Equipment com puters. In order to manipulate COSMOS, it was necessary to know a dozen or so routine commands, all of which were outlined in telephone company manuals. A thirty-minute foraging session in the trash bins behind the COSMOS center could yield considerable booty: discarded printouts, notes passed between employees and scraps of paper containing passwords. Though most trashing was done late at night, even those who pre ferred to trash at midday were seldom spotted. If they were, they usually had a plausible enough reason for being found knee-deep in the garbage. Susan's favorite trick was to dress in shabby clothes and rummage in Dumpsters while muttering to herself like a deranged homeless woman. Roscoe claimed he was hunting for recyclable material. Roscoe, Kevin and Mark Ross, a friend and occasional phreak, set out from Shakey's late one night in a caravan of three cars. When they arrived at the phone company parking lot, it was a short walk through an open chain-link fence—why, after all, should the phone company bother locking up its trash?—into an area containing several Dumpsters. They clambered in and started wading through old coffee grounds, dis carded Styrofoam cups and other garbage in search of the occasional gem. Kevin and Roscoe already knew quite a bit about COSMOS, but they wanted to get a firm grip on the password setup. Certain passwords were needed for certain levels of privilege in the COSMOS system. The password to the most privileged account of all, called the root account, still eluded them. The root account was the master key to all the other accounts on the computer system; its password would give them the power to do anything in COSMOS. The trash cans' offerings were paltry that night. Perhaps another phreak had been there earlier in the evening. Kevin found a handbook to a computer called the "frame" that would probably be useful, but otherwise the pickings were thin. After taking what they had found in the trash to their respective cars, the three phreaks huddled briefly to discuss whether to go into the COSMOS center itself. Kevin wanted to find room 108, the office that he knew contained the COSMOS com puter itself, a guaranteed lode of information. At first, Roscoe wanted Kevin to approach the guard by himself. Kevin would impersonate a Pacific Bell employee, tell the guard that two friends would be arriving in a few minutes for a tour of the facility and, if the guard bought it, Kevin would use his hand-held walkie-talkie to transmit a Touch-Tone signal to Roscoe's walkie-talkie telling him that the plan had worked. But Kevin was nervous; he didn't want to go in by himself. They 50 a CV&WINtC would all go together or not at all, he said. The three argued about the matter for several minutes until finally the other two agreed to accom pany Kevin to the back entrance, where a guard sat at a reception desk. They piled into Kevin's car and backed out of the trash area. In order to be conspicuous in arriving this time, Kevin drove around to the main parking lot in the back of the building and parked with his headlights beaming in through the glass door. If the guard thought there was anything peculiar about a Pacific Bell employee arriving at 1:00 a.m. on a Sunday to give a guided tour to two friends, he didn't show it. Kevin appeared far older than his seventeen years, and he talked a convincing line. As Roscoe and Mark stood by, Kevin chatted up the guard. First came idle chitchat: Kevin had a report due on Monday, he said, and was upset that he had to come in to work on Memorial Day weekend. Apparently welcoming the distraction from his nighttime vigil, the guard didn't ask to see Kevin's company ID, nor did he ask which department the pudgy young man worked for. In a friendly and inquisitive manner, Kevin strolled over to a television mon itor that wasn't working and asked the guard about it. They both shrugged. "Just on the blink, I guess," Kevin suggested. Then, as if he had done it a thousand times, he signed the name Fred Weiner in the logbook, and Sam Holliday for Roscoe. His imagination apparently spent, he entered M. Ross for Mark Ross. Once inside, after a false start that led them into the mail room, the visitors dispersed through the halls. It didn't take long for them to find the COSMOS computer center in room 108. A metal basket attached to the wall held a list of dial-up numbers for calling the COSMOS computer from outside. Kevin removed the list and put it in his pocket. And in a paper tray on a desk they found a list of codes to the digital door locks at nine telephone central offices. In the Rolodex files on several desks, the three young men planted cards printed with the names John Draper (the real name of the infamous Captain Crunch) and John Harris. Next to John Harris's name was the telephone number of the Prestige Coffee Shop in Van Nuys—a number that phreaks routinely intercepted and rerouted to a loop line; next to Draper's name was the number of a nearby pay phone. The idea was to create instant credibility: if one of them called claiming to be John Draper, a Pacific Bell employee, and if as a security measure the recipient of the phone call consulted his Rolodex file to verify the name and number, he would find the information. Next to room 108 was the COSMOS manager's office. The walls were \U**:lkM-$^y*dt* ▼ 51 lined with shelves holding six large manuals. A quick look through the books was all they needed to see that this was perhaps the most impor tant thing they would find that night; they were the COSMOS manuals, which contained information on everything that could be done with the COSMOS computer. The group perused the shelves and set aside the books they wanted to take. Once they had gathered what they thought they could use, they piled it all on one desk and sorted it so as to reduce the bulk and appear less suspicious to the guard. Roscoe spotted a brief case next to a desk; he picked it up and put the manuals inside. Then, each carrying as much as he could, they walked back out to the guard station, where Kevin signed out and exchanged hearty farewells with the guard. Just as casual as he was about letting them in, the guard seemed thoroughly unconcerned that these three young men had arrived emptyhanded and were leaving laden with a briefcase and armloads of books. Kevin drove the others to their cars and the three drove in single file to the nearest Winchell's Donuts to divide their plunder. It had all taken less than two hours. Unfortunately, they had been too greedy. When the COSMOS man ager arrived on Monday morning, he couldn't help but notice that his shelves were nearly bare. He notified security immediately, and ques tioned the guard who had been there over the weekend. The guard mentioned the threesome from Sunday morning, and said he was sure he could recognize them again. Then the manager found two cards in his Rolodex with unfamiliar handwriting, which belonged to no one in the office. It was time to call corporate security. A T A Meanwhile, Susan was sitting on the evidence she had been gathering for nearly a year. She had intimations that the L.A. district attorney was preparing to indict her on a dozen or so felony charges, including unlawful entry into Pacific Bell headquarters and conspiring to commit computer fraud. So she decided it was time to visit Bob Ewen, an inves tigator in the district attorney's office, to blow the whistle on her erst while buddies. She told Ewen that she had come to him because she was concerned for her nation's security: Kevin knew she had some extremely sensitive information, and Susan was certain that he wanted to get his hands on it. By way of example, Susan told Ewen that she had once spent several days locked in her apartment, and that when she emerged she told Roscoe and Kevin that she had been downloading and printing out 52 a CVEEZPUM missile firing parameters and maintenance schedules for intercontinental ballistic missiles. She boasted that she knew the schedules of the men who worked in the hole (the men authorized to turn the keys), and that she knew when the maintenance was done and what the backup systems were. Susan claimed that, given the right information, one pimply ado lescent scrunched into a phone booth with a terminal and a modem and certainly Kevin Mitnick—could set off the necessary chain of com mands to release hundreds of missiles from their silos and send them hurtling across the globe. She hadn't tested her theory, of course, but she claimed to have developed a method for fooling the computer, lead ing it to believe that the necessary sequence of actions preceding a first or retaliatory strike had already occurred. The real vulnerability, Susan believed, lay in the nation's communications system. The Pentagon's heavy dependence on the Bell System made it a sitting duck for the likes of Kevin Mitnick. Susan asked for immunity from prosecution in ex change for doing her civic duty and testifying against Kevin and Roscoe. Ewen knew enough to be leery of many of the "theories" that issued forth from this rara avis. For one thing, he recognized her as the same tall, buck-toothed blond whose face was familiar to guards at Pacific Bell offices throughout the county. She had been spotted in Pasadena with Mitnick and Rhoades, and in the San Fernando Valley with the one who called himself Roscoe. But Ewen wanted to see Roscoe and Mitnick convicted. He sent her to see the district attorney. As it happened, the district attorney felt exactly the same way. He offered to give her im munity in exchange for her full cooperation. Susan, of course, was fully prepared to take the witness stand and tell her version of everything. When Bob Ewen came onto the COSMOS case in 1981, he had already been dealing with phone phreaks for some time. For years, he kept a collection of confiscated blue boxes and other electronic fraud gear in a box under his desk. Usually there wasn't much to fear from phone phreaks, but when he went out to serve a warrant on Mitnick, Ewen wasn't sure what he was dealing with. As Susan Thunder had described the suspect, he was potentially dangerous. Ewen went first to Mitnick's residence to carry out a search. Mitnick wasn't home, but his mother was. Reed-thin and wearing a skirt that struck Ewen as too short for a woman approaching forty, Shelly Jaffe, who bore some resemblance to Popeye's girl, Olive Oyl, seemed confused and flustered. As Ewen picked his way through her son's room, Shelly stood at the doorway and popped her gum nervously. She reminded him of a teenager who hadn't Ke*U+: 1U DmJMUl \\acX*a ▼ 53 outgrown the habit of reading movie magazines and still harbored a dream of becoming a Hollywood discovery. The search wasn't easy. Mitnick appeared to be something of a pack rat. He had apparently saved every scrap of paper and every printout he had ever obtained, and Ewen had to scrutinize all of it. He unearthed printouts filled with telephone company information, computer pass words and material from one of the computer centers at the University of California at Los Angeles. Shelly became increasingly flustered. She did not, she said, know anything of her son's illegal doings. She assured Ewen that Kevin could not be responsible for the things the police suspected. Kevin, she insisted, was an angelic son. "Then what's this?" Ewen asked, holding up a printout of telephone company information. "I've never seen that before," she responded. "When is the last time you were in your son's room?" "I don't remember." Ewen got the impression that Shelly, who displayed no hint of malice herself, might be intimidated by her son. It was evident that she tried to maintain a decent home. Aside from Kevin's cluttered room, which was actually tidy compared with some Ewen had seen, Shelly kept a neat household. But she appeared to have no control over the boy she had raised or the situation at hand. She seldom saw Kevin. Her early hours as a deli waitress rarely coincided with her son's more nocturnal sched ule. Clearly, she knew nothing about computers and had no desire to try to learn anything about them. It was Ewen's hunch that even telephones might overwhelm her. Among all the evidence Ewen gathered in Kevin's bedroom, he found nothing linking the suspect to the COSMOS break-in. There were no manuals, directories or other signs that Kevin had been there. Still, on the strength of the guard's identification of Mitnick, Ewen had obtained an arrest warrant. Although the Mitnick family hadn't been particularly observant Jews, Kevin often went after school to the Stephen Wise Temple in the private community of Bel Air, where he worked parttime. Ewen drove to the synagogue with three other officers; the four men divided into two cars and waited in the parking lot for Mitnick to show up. When Mitnick began to pull into the lot, he apparently saw the men sitting in their unmarked cars, because he hesitated, then drove by. As soon as he took off, the police peeled after him, sirens ablare. Mitnick's car accelerated. Just as Mitnick pulled onto the 405 freeway 54 a cmmm headed north, his pursuers overtook him and forced him onto the shoul der. At first, Ewen wasn't sure what he was up against. The suspect was very large, at least two hundred pounds, and possibly armed. Ewen feared Kevin and his buddies might have modified the COSMOS computers and planted a "logic bomb"—a hidden computer program designed to destroy data at a given time. This made Ewen worry that he might even have a terrorist on his hands. So they handled him as roughly as they would a murder suspect: guns drawn, they pushed him onto the hood of his car and handcuffed his hands behind his back. It wasn't until the officers felt not muscle under his shirt but soft and pliable flab that they realized this young man was no physical threat and loosened their grip. Mitnick complained that he had to go to the bathroom immediately. Then he began to cry. "You scared me. I thought I was going to die." "Why did you think you were going to die?" Ewen asked. "I thought they were after me." "Who?" asked Ewen, bewildered. "You know, there are a lot of people that don't like me." Kevin didn't mention it to Ewen, but a few months earlier he had been hunted down by an irate ham operator who was fed up with Kevin's high jinks. Ewen told Kevin he was sorry to hear that people didn't like him. He was just doing his job, he said, and would have to take the teenager to jail in handcuffs. In the car, Kevin began to talk. He admitted to knowing Roscoe and Susan and Steve Rhoades. Then, as if he suddenly realized he was talking to an officer, he stopped talking. When Ewen asked him if he had put a logic bomb in the phone company computers, Kevin looked as if he might start to cry again. No, he insisted, he would never do anything to hurt a computer. Recovering the COSMOS manuals proved more difficult than finding the suspects. Once Kevin had been taken into custody and his mother and grandmother had hired a lawyer for him, Ewen began to press the lawyer for the missing manuals. Ewen was particularly worried that the manuals would be copied and distributed throughout the phreaking com munity. He shuddered at the possibility. With passwords and dial-up numbers, phreaks could shut down much of the phone service in the greater Los Angeles area. Kevin's attorney insisted that Kevin didn't have them, but that he might know where to find them. A few days later, the lawyer delivered all of the stolen manuals. The prosecutor decided to fold the cases against Kevin and Roscoe together. Both were charged with burglary and grand theft, and with KW; 1U M-SUt fM*> t 55 conspiring to commit computer fraud—felonies under California law. The charges would be for the U.S. Leasing incident, already more than a year old, and the COSMOS break-in. U.S. Leasing's John Whipple, who had long since dismissed the entire incident as a bad dream, was surprised to hear that the vandals who had crippled and defiled his company's computer had been apprehended and charged with having "maliciously accessed, altered, deleted, damaged and destroyed the U.S. Leasing system." Mark Ross was charged with burglary and conspiring to commit computer fraud in connection with the COSMOS break-in. After Roscoe was arrested, his mother gave him a choice. He could either use her money to hire her lawyer, an old friend from Argentina who knew nothing about computers or computer crime, or draw on his own meager resources and hire whomever he pleased. Although he had found a good criminal lawyer who had experience in cases such as his and would charge less than his mother's friend, Roscoe could do nothing to persuade her to pay. He ended up with the computer-illiterate Argen tine. While the defendants were out on bail and the prosecution was pre paring its case, Ewen decided it might be a good idea to eavesdrop on one of the Shakey's meetings. So one night before the trial, Ewen, the juvenile prosecutor, and Pacific Bell and GTE investigators dressed in the most casual clothing their closets could produce and convened at the Hollywood Shakey's. They seated themselves at a table about thirty feet away from the group. Neither Roscoe nor Mitnick was in attendance. Rhoades was also absent. Instead, seated at the phreaks' table, the center of attention, was Susan. The group of law enforcers sat in disbelief as their star witness took over the meeting, trading phone information with the others, oblivious to the presence of the men she was working for. When she and another phreak got up to leave, Ewen followed her to the parking lot and watched as she retrieved a printout from the other phreak's car. "Susan," Ewen called to her as she was returning to the restaurant, "what do you think you're doing?" It took Susan a few sec onds to focus on Ewen; indulging her vanity, she seldom wore her glasses. When she recognized Ewen, she grew defensive. "Hey, I thought I could get some stuff you guys could use." Ewen looked at her sternly. "Okay," she conceded, "so I still like to do this stuff." A T A 56 a CYZEZPUNIC Shortly before the hearing, Kevin Mitnick pled guilty to one count of computer fraud and one burglary count. In exchange for the dismissal of two additional charges and in the hope of being sentenced to probation instead of a term in the California Youth Authority prison system, Kevin agreed to testify for the prosecution, even if it meant betraying Roscoe. On December 16, 1981, a pretrial hearing was held. The prosecution's first witness was Susan, who cut an imposing figure as she strode to the witness stand and swore to truthfulness. Susan had been given immu nity. Under assistant district attorney Clifton Garrott's gentle question ing, she recounted Roscoe's trespass into the U.S. Leasing system. He had arrived one evening the previous December to take her out on a date, and as she was getting ready he sat down at her computer terminal and dialed into U.S. Leasing. When she asked him what he was doing, Susan told the court, he said he was using a program called god to get into a privileged account, in order to run a program called MONEY to print out the passwords on the system. Susan went on to explain in detail how the MONEY program could only be called up using a certain account. Unable to follow the exchange between Garrott and his witness, the judge interrupted. "Slow down a minute," he demanded. "This is a whole new education for me over here." The proceeding digressed for a few minutes while Susan presented an introductory course in computer terminology for the uninitiated in the room. She explained passwords, logins and account numbers. When Roscoe got the MONEY program to run, she continued, she saw him start to write down passwords and account numbers. And when she looked at the screen a few minutes later, she recalled, the words delete and zeroed had appeared. At that point, Garrott produced a ragged eight-and-a-half-by-eleveninch sheet torn from a three-ring binder and held it up for the judge to see. Roscoe was stunned. When he had arrived home that night after this so-called date with Susan, he had reached into his back pocket and realized the piece of paper was gone. Little had he suspected that she would pick his pocket! Garrott continued his questioning. He asked Susan if she had asked Roscoe what he was doing at her terminal. "Yes," she answered. He said he was "taking care of business . . . getting even." Then, she said, he began, "laughing hysterically, crazylike." At the prosecutor's gentle prodding, she said she was upset by Roscoe's behavior that night. "The KW; 1U l)Mk-$Ut H**U+ ▼ 57 vibes weren't right. There was a lot of tension between us," she told the court. "I said, 'Why did you do that? You know it was destructive.' " "What did he say?" asked Garrott. "I got no response." Jose Mariano Castillo, Roscoe's attorney, did his best to discredit Susan as a witness. "When in December of 1980 did this incident take place?" he asked her. "I believe it was the twelfth or thirteenth." "What day of the week was that?" "Thursday or Friday." "Were you employed?" "Yes." "Where were you employed?" "The Leather Castle." "What was your occupation at the Leather Castle?" Garrott leapt to his feet to object. The question was irrelevant and immaterial. "What is the relevance of the type of work that she was doing there?" the judge asked Castillo. "Well, it goes to credibility, Your Honor." "How?" "Well, let me ask her specifically," and he turned back to Susan. "Were you a prostitute?" "No," Susan replied hotly, expressing indignation at the very sugges tion. Garrott objected to the question and the judge sustained his objec tion. Castillo continued. "Have you ever been prosecuted for prostitution?" This time, Garrott objected before Susan could answer. Try as he might, Castillo could pursue no line of questioning that might help to impugn her testimony. Each time Castillo asked a question of Susan, Garrott objected to it as irrelevant. The judge sustained all but a few of the objections. When the prosecutor didn't object, Susan was coy with Castillo, often craning forward and asking him to repeat the question, as if she were hard of hearing, or confused. Castillo asked her if she had been in love with Roscoe. "Infatuated, perhaps," Susan responded. "In love? No." Castillo asked if Roscoe had been rejecting her advances. "Yes" was Susan's reply. 58 a CVZEZPUNIC "And you felt upset because of the rejection?" "No. He wasn't the only man I was going out with." "How many people were you going out with, dating, at that time?" This time, the judge overruled Garrott's objection and instructed Susan to answer the question. "Three or four." When Castillo began to ask her about her drug problems, Garrott was quick to object again. Castillo persisted. Susan's drug problems, he claimed, had some effect on her emotional state. Moreover, he said, she had sexual problems. The judge rebuffed him and sustained Garrott's objection. The hearing dragged on this way into the afternoon. Every time Castillo tried to impute vengeful motives to Susan, to sully her credibil ity or to introduce other names—Kevin Mitnick, Steven Rhoades—as possible suspects, Garrott leapt to his feet and the judge ruled in his favor. All told, Roscoe's prospects were beginning to look bleak. If this pretrial hearing was the legal equivalent of a movie's rough cut, Roscoe could easily imagine how the finished film would turn out. At the end of the afternoon Kevin was called to testify. He began by explaining the term phone phreak to the court. While refraining from placing himself in any category in particular, Kevin described different "types" of phreaks. "One type is a person that likes to manipulate tele phone lines and computers," he lectured. "Another one is the type that just likes talking with other people on conference lines. And stuff like that." Kevin recounted the visit to the COSMOS center in precise detail. The Shakey's meeting. The trashing. The unsuspecting guard. The for aging through room 108. The stealing of the manuals. Garrott showed particular interest in what transpired later at Winchell's Donuts. Kevin told the prosecutor that the manuals were left in the cars but the door code list was brought inside, and that he later made a copy of the door codes for himself. Afterward, Kevin said, he and Roscoe divided up the manuals from behind Kevin's car. Despite his best efforts, Roscoe's attorney wasn't making much head way in building up a convincing case for his client's innocence. Rather than take chances with a trial and risk fumbling the defense in court, Roscoe's attorney decided to work out a plea bargain with the prosecutor. On April 2, 1982, a day before his twenty-second birthday, Roscoe pled no contest to the conspiracy charge and to the charge of computer fraud against U.S. Leasing. Two months later, he was sentenced to 150 days RW; 1U D*Ul-$Ul \\*cbtA t 59 in jail. Ross got thirty days. Kevin had considerably more luck than his confederates: after a ninety-day diagnostic study mandated by the juve nile court system, he got a year's probation. A T A While Roscoe served out his sentence, Susan dropped her alias and refined her new entrepreneurial persona. She became a security consul tant. In April of 1982 she appeared on the television news show "20/20." Susan wore a purple blouse beneath a wide brown jumper. The outfit was set off by a pair of oversize star-shaped earrings that swung conspicuously amid limp, straight blond hair. Why, asked an inquisitive Geraldo Rivera, had she and her friends wrought such havoc with the phone company? "I was getting off on the power trip," she replied. "It was neat to think that I could screw up the Bell System." Hassling someone—disconnecting his phone or canceling his car insurance—was all standard practice. "Is there any system that can't be gotten into?" she queried herself. Then she answered her own question. "God, I live by an old saying: if there's a will, there's a way. There is always a way." In the next two years, Susan became a peripatetic Cassandra, travel ing around Los Angeles, painting doomsday scenarios for her clients. She developed a standard set of these grisly prognoses and trotted them out for reporters and lawmakers. A year after her "20/20" appearance, under the auspices of an FBI agent, she flew to Washington to expound her theories before the U.S. Senate. During her testimony, Susan ex plained about phreaking and trashing, or "garbology," as she put it. She recalled with some nostalgia the talents and feats of the L.A. gang. She talked about posing as repair personnel and altering credit ratings. She described the practice of using the U.S. Leasing computers. William Cohen, the chairman of the Senate subcommittee holding the hearings, then asked, "There was no indication they felt there was anything wrong about going in and using U.S. Leasing's program? In other words, if you walked into somebody else's house and decided you wanted to watch television for a couple of weeks or a year and just walk in and turn on somebody's set, there would be nothing wrong with that?" "I guess if people were stupid enough to leave their door unlocked," Susan replied. "Hey, if people are stupid enough to leave the system passwords around that way—that's how the group felt." Upon learning that Susan's formal education had stopped at the eighth grade, the incredulous senator remarked, "It seems it would be so 60 a CVZEZPUNIC easy for one of our major adversaries to secure the services of people like yourself who have no advanced degree or training." "I agree," Susan responded. "It poses a very serious national concern, a very serious threat to national security. I wanted to find out how everything worked. I have got to admit to a certain interest in something that was supposedly classified as top secret." "Journalists have the same fascination with classified information," Cohen remarked. "I studied to be a journalist when I was in junior high school." "I was afraid you were going to say that." A T A While in Washington, Susan got a chance to demonstrate her "social engineering" skills. As Susan later told the story, a team of military brass —colonels and generals from three service branches—sat at a long con ference table with a computer terminal, a modem and a telephone. When Susan entered the room, they handed her a sealed envelope containing the name of a computer system and told her to use any abilities or resources that she had to get into that system. Without missing a beat, she logged on to an easily accessible military computer directory to find out where the computer system was. Once she found the system in the directory, she could see what operating system it ran and the name of the officer in charge of that machine. Next, she called the base and put her knowledge of military terminology to work to find out who the commanding officer was at the SCIF, a secret compart mentalized information facility. Oh, yes, Major Hastings. She was chatty, even kittenish. Casually, she told the person she was talking to that she couldn't think of Major Hastings's secretary's name. "Oh," came the reply. "You mean Specialist Buchanan." With that, she called the data center and, switching from nonchalant to authoritative, said, "This is Specialist Buchanan calling on behalf of Major Hastings. He's been trying to access his account on this system and hasn't been able to get through and he'd like to know why." When the data center operator balked and started reciting from the procedures manual, her temper flared and her voice dropped in pitch. "Okay, look, I'm not going to screw around here. What is your name, rank and serial number?" Within twenty minutes she had what she later claimed was classified data up on the screen of the computer on the table. A colonel rose from his seat, said, "That will be enough, thank you very much," and pulled the plug. Computer security experts had been suspecting for years what Susan KW; 1U Dm^-SUc WacIha, ▼ 61 was proving time and again: the weakest link in any system is the human one. Susan liked to illustrate her belief with the following scenario: Take a computer and put it in a bank vault with ten-foot-thick walls. Power it up with an independent source, with a second independent source for backup. Install a combination lock on the door, along with an electronic beam security system. Give one person access to the vault. Then give one more person access to that system and security is cut in half. With a second person in the picture, Susan said, she could play the two against each other. She could call posing as the secretary of one person, or as a technician in for repair at the request of the other. She could conjure dozens of ruses for using one set of human foibles against another. And the more people with access the better. In the military, hundreds of people have access. At corporations, thousands do. "I don't care how many millions of dollars you spend on hardware," Susan would say. "If you don't have the people trained properly I'm going to get in if I want to get in." fCd/lf* 6w» l&hi«i4> T> he list of cohorts with whom Kevin was ordered not to associate was comprehensive. It included Roscoe, Susan, Steven Rhoades and Mark Ross. Kevin also had strict orders to stay away from all phone phreaks in general. In effect, his circle of acquaintances was pared con siderably. But there was always Lenny. Lenny DiCicco had never been attracted to phone phreaking, or trashing, or even social engineering. His was a fascination with buttons. As a little boy in Oak Park, outside of Chicago, Lenny wouldn't bother with a toy unless it had a knob to turn or a lever to push. Even as a toddler, he had a knack for finding the switch to stop an elevator be tween floors, or the button that would halt an escalator. When he was five, he managed to activate the fire alarm of one of Chicago's largest hospitals, sending nurses and physicians scurrying through the halls. But to his parents, Lenny's compulsion to play with gadgets was an enigma. Gilbert DiCicco (pronounced "duh-SEE-ko") was an illustrator at the Chicago Tribune; Vera DiCicco was an artist, too. Their only child es chewed crayons in favor of toys with moving parts and motors. When Gil DiCicco took an illustrating job with a San Fernando Valley newspaper in 1977, the family moved to Los Angeles. In his very first minutes in Los Angeles, twelve-year-old Lenny exhibited surprising 62 KW; 1U l)Mk-$JU H*di+ ▼ 63 enterprise. As Gil and Lenny waited for Gil's brother to pick them up at the airport, Lenny discovered that a quarter was refunded for each rental cart returned to the automated dispatcher. For half an hour, Lenny ran furiously around inside the terminal, rounding up stray carts and collect ing the refunds. An auspicious omen, thought Gil, for starting their new life. Lenny enrolled at Sepulveda Junior High School in Mission Hills. His formal introduction to computers came at Monroe High School, in John Christ's introductory computer class. Lenny demonstrated an intuitive understanding of the labyrinthine integrated circuits around which com puters were built and an aptitude for programming. It was the start of the personal computer era and he developed a passion for computing. And like many his age, the gangly teenager also displayed a special interest in communicating with remote systems over telephone lines. When Lenny managed to log on one day to the school district's central computer, Christ could only chuckle. Two years earlier, a student of Christ's had demonstrated the same talent by using the simple classroom terminal to access the school district's Digital Equipment computer sys tem. His name was Kevin Mitnick. He had dropped out of high school and taken an equivalency test for his diploma. "Oh, no," Christ groaned and smiled at Lenny, "not another Kevin!" Nothing could have pleased Lenny more. Lenny knew of Kevin Mitnick, who was something of a legend in Los Angeles high school computing circles. As a student at Monroe, Mitnick had absorbed information like no student before him. His telephone company exploits had been described at length in the Los Angeles Times. By Mitnick's own account to the FBI, the paper reported, he and his friends had gained unauthorized access to computers all over the United States—systems supposedly impenetrable toall but selected people who know the passwords. Mitnick also told the FBI that he had obtained sensitive data from "the Ark," one of the main systems in Digital's software development group. In suburban Southern California, where high school heroes traditionally emerged on the gridiron, Kevin had been the perfect antihero: a nerd who used technical wizardry to befuddle the authorities. There seemed to be no end to his clever tricks. While at Monroe, Kevin had reconfigured a modem line so that he could use it to dial out of the school's main computer and into others. The modifi cation gave him a perfect cover for his activities. Anybody who at tempted to trace the phone calls would inevitably run into a cold trail at the computer center. 64 a CYBERPUNK Lenny first met Mitnick in 1980 when a mutual friend introduced them. Lenny and his friend were on their way to a conference of an organization for Digital Equipment customers called DECUS. They had stopped by Kevin's house to invite him to come along. He declined, but asked them to keep their eyes out for interesting literature. National DECUS meetings usually attract as many as twenty thousand Digital users from around the country. For high school students to be intrigued by Digital computers was unusual enough, but for them to go out of their way to attend a DECUS convention was a sign of extreme dedication. Mingling with the attendees, they could be as anonymous as they pleased. The convention hall was a sea of terminals clustered within exhibition booths that demonstrated the latest in Digital computers, software and product literature. The day after his trip to the DECUS meeting, Lenny got a call from Kevin, who asked if he could get copies of the manuals Lenny had picked up. Lenny had finally met someone whose unusual passion matched his own. Like Lenny, Kevin Mitnick displayed little respect for his elders and even less for the institutions over which they presided. Someone had told Lenny that when Kevin was an adolescent, his mother had so much trouble controlling him she sent him to a disciplinary camp for incorrigible children. On top of the much-publicized COSMOS inci dent, Mitnick had gained notoriety for breaking into computers at col lege campuses around Los Angeles. Lenny knew he was dealing with a veteran, and although Lenny was learning his way around the computer underground quickly, he knew he still had a long way to go. Lessons from Kevin were far more interesting than anything Monroe High School had to offer. Lenny had always found school a useless bore. His attendance record at school was already spotty, and once he met Kevin it got worse. Kevin had a lot of time on his hands. He was working as a delivery boy at Fromin's, a delicatessen in the heart of the San Fernando Valley owned by Arnold Fromin, who was living with Kevin's mother in Panorama City. Hungry for a terminal to use, the pair discov ered the San Fernando Valley's Radio Shack stores. Each store had a demonstration model of a personal computer called the TRS-80. Because the computers were also used to send inventory updates each evening to Radio Shack's Fort Worth headquarters, they were equipped with mo dems as well. Lenny and Kevin merely had to supply a communications software program to transform one of these computers into a full-fledged terminal. Using stolen MCI codes, they could dial long-distance into any computer they could find. Kevin's initial method was to talk some- KW; 1U btok-$Ut HacIu* t 65 one out of a password. Once he was in, he no longer needed to employ his verbal skills. What were supposed to be five-minute demonstrations became mara thon six-hour reconnaissance sessions. Kevin sometimes pushed his luck, imploring a manager to keep his store open well past closing time. They could last for about a month at each store. When a manager got irked enough by their constant presence to ask them to take their hobby elsewhere, they simply combed the Yellow Pages for new possibilities. They became techno-nomads. The two teenagers turned their attention to the University of South ern California. Kevin had already been caught fiddling with computers on the USC campus a couple of years earlier, but, as usually happened on the college campuses where he was caught, he was "counseled and released." When he returned with Lenny at his side in 1982, no one recognized him. Kevin already knew the locations of campus terminal rooms that stayed open twenty-four hours a day, available to anyone who could pass as a student. Both Lenny and Kevin were largely self-taught and they were still learning. Most of what they picked up about computers came not from time spent in classrooms or computer labs but from hours spent with whatever system they could steal some time on. Most of the time, the computers were Digital systems, the most popular computers on college campuses. So it wasn't surprising that the computers they came to know best were Digital. By the early 1980s, Digital had augmented its PDP series of minicom puters with the VAX line (VAX stands for "Virtual Address Extension," which refers to a way to expand memory that speeds a computer's perfor mance). These computers were designed in such a way that all models could use the same software and share data over computer networks. With the VAX, Digital strengthened its position in the commercial market and started competing successfully in the banking, insurance and accounting markets, traditional IBM strongholds. But Digital still had its roots in the technical and university community. And as its loyal customers at universities such as USC migrated to the VAX, so did Kevin and Lenny. Phreaking as an end in itself had never done much for Lenny. His affinity for the telephone began and ended with his frequent lengthy conversations with friends. He felt uneasy about misrepresenting himself in order to get information or coerce a password out of someone. And Lenny didn't have Kevin's appetite for electronic revenge. Kevin used 66 a CVZERPUM phone company computers to wage his private wars against whoever he thought had crossed him. Lenny watched one evening as Kevin attached a local hospital's $30,000 telephone bill to the home phone of a fellow ham radio buff whom Kevin disliked. But there was something that drew him to Kevin. His own reluctance notwithstanding, Lenny was intrigued by Kevin's ability to feign and cajole his way around almost any phone company office, or even a police department. Kevin could call someone at a switching office, for example, and convince him to drive fifteen miles just to turn a computer on. The secret lay in convincing the person on the other end of the line that he was the supervisor of that person's supervisor. He would gain that person's trust by speaking the same lan guage. It was often remarkably simple. Kevin's use of telephone company vernacular snowed most customer service operators, whose full coopera tion he needed to, say, pull a victim's toll records. And some of Kevin's phreaking tools came in handy for Lenny. The telephone company's loop lines—the special numbers it used for testing customer service—were ideal for certain tasks. For example, when Lenny and Kevin applied for jobs and needed to supply a reference, they could give out a test line number, sit on the line waiting for the call, and give the reference themselves. And they made frequent use of phone company test numbers that provided a constant busy signal, or simply rang and rang. To them, it seemed more like harmless hoodwinking than fraud. Free long-distance calls using credit card numbers were per haps the best part of Kevin's phreak repertoire. But when Lenny tried to show his father how to cash in on the free service, he got a stiff repri mand. Computers were Lenny's abiding passion. At fifteen, he was still too young for his driver's license, so on weekends and school holidays his father drove him to the nearby Northridge campus of California State University to use the school's computers. Lenny usually asked to be picked up six or seven hours later. The senior DiCicco understood noth ing of Lenny's fascination with computers and things technical. Occa sionally Lenny tried to explain things to him, but his words sailed over his father's head. Gil DiCicco had grown up in the 1940s and 1950s, when relatives would shout into the telephone to make themselves heard on long-distance calls. Gil didn't see much to celebrate in this so-called computer revolution of the 1980s. If anything, he lamented the loss of communities as he understood them, where people met in person and not electronically, and where teenagers did more than sit in front of computer screens. He was sad to see that young computer enthusiasts KW: 1U D**lc-$Ut \c\Ack* T 67 felt more comfortable interacting with machines than with people. He was a humanist who prided himself on having nothing to do with these machines. Still, he knew enough to guess that Lenny's computer fixation would land him a well-paying job some day, so he was glad for the time Lenny spent inside the Northridge computer center. Lenny had told him that he had made many friends there, and although he spent a large portion of the day playing computer games, it was keeping him off the streets. But when Gil got a call from the campus security office one Sunday afternoon, saying he should come retrieve his son, who had just been caught illegally logging on to the highly restricted administrative com puter used by the school, among other things, for recording grades, he was sure Kevin Mitnick had something to do with it. Kevin Mitnick was in fact Gil DiCicco's worst nightmare. Lenny had never shown much interest in school, but he usually managed to bring home fair grades. But when Lenny started hanging around with Kevin, his grades took a dramatic plunge. Gil had only met him once, but there was something unsettling about the overweight teenager. He was always whispering things to Lenny in front of others. This guy wasn't just a bad influence. He was hurting Lenny's chances of ever making good on the future Gil was trying to give his son. First, Gil admonished Lenny, trying to impress on him how lucky he was that Cal State-Northridge hadn't pressed charges. Furthermore, he told him, he didn't want to see him spending time with Mitnick. The senior DiCicco then decided to take a rash step to see to it that his son's unwholesome friendship with Kevin Mitnick ended: he went to Fromin's and confronted Kevin. "Look," he said, "just stay away from Lenny. It's doing both of you no good." Gil didn't want to see Kevin's face around the DiCicco house again, he told him flatly. From the dull expression on Kevin's face, Gil figured he might as well have delivered his speech to the nearby bowl of half-sour pickles. Kevin shrugged and smiled, avoid ing eye contact with Gil. "Uh, okay, I've gotta get back to work now," he replied, and turned away. Gil had no illusions that this little chat had made any impression. Now that Northridge was off limits, Kevin and Lenny spent weeks at USC, building up their own small empire of purloined accounts. They had managed to get accounts on all the university's computers. When they arrived one evening as usual, they saw that of their six accounts, all but one had been disabled. It was obvious that someone in the computer lab was on to them. Lenny was worried, and he warned Kevin 68 a CYBERPUNK that it was probably a setup. He wanted to leave, but Kevin wouldn't budge, insisting that they restore their lost accounts and that they stay on campus to use the university's own high-speed links. In the end, Lenny shared Kevin's delusion that what they were doing was undercover work worthy of a Hollywood spy thriller. Brazenly walking onto the campus was the kind of thing Robert Redford would do as the hunted CIA researcher in the movie Three Days of the Condor. Kevin's favorite movie, it told the story of a former English literature graduate student hired by the CIA to extract plots from novels, who stumbles onto a conspiracy within the agency. In one dramatic scene Redford masquer ades as a telephone lineman and throws the agency's high-tech surveil lance gear off the track by crossing some wires. And Lenny's own code name was Falcon, after Christopher Boyce, the young TRW employee and protagonist of the book The Falcon and the Snowman who in the midseventies fed the Soviets secret military technical data that traveled over TRW's satellite communications system. A T A For all Mark Brown knew, it could have been a faculty member who was monkeying around with the system. He wouldn't have been surprised if it turned out to be a student looking for a way to make trouble. Four years earlier, in 1978, two USC students, unhappy with their grades and financial aid, had made news when they were arrested for trying to tap into the university's computer to improve their standing. Those two failed, but years later, in 1985, a year-long investigation would uncover a ring of some thirty USC students in league with someone in the school's records and registration office, who routinely changed grades and created fraudulent degrees. They charged handsomely for the ser vice, selling doctoral degrees for as much as $25,000. Brown, a young assistant in the computer lab, hadn't encountered any malicious computer attacks. In 1982, USC's attitude toward com puting was typical of most universities': it wanted to keep its computers open and accessible to its users. In the late 1970s and early 1980s, security had yet to become a serious issue on college campuses. Setting up a reliable password system was just about the only security barrier at places like USC. Because so many of Digital's customers had told the company that they were more interested in convenience than in secu rity, the operating system software was shipped with many of the builtin security features disabled. While customers could, by reading the KW: 1U b**lc-$Ut H*cU* t 69 instruction manuals, activate those security features, most customers chose not to, since increased security meant increased inconvenience. In 1982, computers and computer terminals were proliferating on college campuses so quickly that it was almost impossible for computer managers with their limited resources to pay much attention to security. Besides, placing undue restrictions on computer usage would have been like sectioning off the university library for selective access. Librarians weren't there to keep people from the books, but to lead them as easily as possible to the books they were seeking. So it was with computers as well. Still, a modest hierarchy had to be imposed on the USC computer systems; the people who watched over the system needed a master key to everyone's account, just in case they needed to retrieve a lost file or fix a student's account. Like any other computing center, USC had system managers with full access to everyone's account, and Mark Brown was one of them. Part of his job was to monitor the system's activity, to make sure that the machines were running correctly and to provide assistance where needed. One day, he noticed that some strange things were happening. Someone was logging in to privileged accounts nor mally used only by system managers. So, taking the role of detective, he started trying to track the trespasser down. His first step was to place some secret traps in the operating system to catch anomalous behavior. Next, he wrote a program that watched for unusual activity on the accounts the trespasser used most frequently. Finally, he began printing out the records of the break-in attempts. After a few days, it was clear that the USC interloper was exploiting a loophole in the campus computers' operating systems to get access to the most privileged accounts on the system and then create his own account names and passwords. Alternatively, he used the accounts of others to break into privileged accounts. The printouts showed that he was coming in over off-campus phone lines. Brown's first move was to call the phone company and have the line traced back. To do that, he learned, he would need to notify the police and obtain a court order. So he decided to take it on himself. Rather than shut the intruder out of the system entirely and give up the chance to track him down, Brown limited his access and minimized the amount of damage he could do. Judging from the intruder's actions, his motives seemed relatively benign—that is, until the day one of the log scripts showed him downloading university accounting files. These are files that keep 70 a CVZEZPUNIC records of the establishment and deletion of accounts, and they often include password entries. Not only did the intruder have the accounting files, he also had managed to use a privileged account to steal personal mail files from systems people like Brown, presumably in order to glean further information about the computer system. That was stepping over the line. Gentlemen do not read other people's mail. Brown began taking countermeasures. Brown considered himself a hacker in the hallowed, traditional sense of the word. To him, hacking was the honorable pursuit of perfection in computer programming. It did not mean breaking into someone else's system. Brown decided it would take someone who thought like an intruder to catch one. He called for help from a couple of his fellow programmers, including Jon Solomon, a former phone phreak, and started the chase. After a week of intensive monitoring, they realized that on certain days the phantom visitor was entering the school's computers at much higher speeds than usual. He could do that, they reasoned, only from a specific terminal room, where the only high-speed links could be found. Brown had been around the computer community long enough to see a lot of cockiness, but this was incredible! They knew that the next time the high-speed connection came, it would take a bit of maneuvering to isolate where the intruder was in the computer lab, but it could be done. To make things more efficient, they decided to risk scaring him off with their obvious tampering: they limited his access to one machine. One night when Brown went out to dinner, he left Solomon to watch for the trespasser. No sooner had he left than the intruder was on line— and his connection was coming from inside the campus. It took Solomon only a few minutes to trace the terminal. It was spooky: the interloper was at work in the very lab where Solomon was sitting. Solomon walked across the room and stood a few feet behind an overweight young man with a familiar face who was sifting through a stack of papers he seemed to be using as a reference. He was oblivious to anything else in the room. Solomon stepped a couple of feet closer to look over the intruder's shoulder. The papers were copies of the stolen accounting files. Next to the intruder sat another man who seemed much younger than the first. They appeared to be together. Suddenly Solomon placed the familiar face: he had met the chunky hacker weeks earlier at a DECUS confer ence. The hacker had struck Solomon as pretty cocky, boasting about his exploits. Solomon knew that his name was Mitnick, and that he had KW; T& DmM^ fM** ▼ 71 been arrested in the past for breaking into computers. Neither Mitnick nor his friend was enrolled at USC. Hurriedly, Solomon stepped away and called the campus police. In the few minutes it took for the police to arrive, Solomon watched as the pair kept typing, logging in and trying out different passwords. Solomon was beginning to get the feeling that he could have watched them for an hour without their noticing him, so engrossed were they in the task at hand. When the two officers appeared in the doorway, Brown's assistant pointed to the older of the two strangers and they flanked his chair. When the plump young man looked up, his face expressed none of the guilt or remorse that Solomon expected to see. Here was a known computer criminal who wasn't merely breaking into the computers of a private university with which he had no legitimate connection—he strolled onto campus to do it. Solomon expected to see some sign of self-rebuke—at least some surprise—that he had been caught in the act. Instead, when the police questioned him, Mitnick took offense. "I'm not doing anything wrong," he said. The papers he was working with, he claimed, belonged to him. His friend sat nearby, discernibly more nervous. When the officers asked Mitnick to step out side, he picked up his thick stack of computer printouts, tucked the sheaf under his arm and obliged. The officers took both of them to the campus police station. At the security office, the police took their names: Kevin David Mit nick and Leonard Mitchell DiCicco. When Brown and Solomon ques tioned Mitnick, his attitude was supercilious, as if under other circumstances he wouldn't deign to answer. He taunted Brown for what he claimed were unsophisticated sleuthing tactics. They never would have caught him, he claimed, if he hadn't made himself such an easy target by coming onto campus. In a records search, the campus police discovered that Mitnick was on juvenile probation for breaking into other computers and that Di Cicco, barely seventeen, had been caught six months earlier doing the same thing at Cal State-Northridge. They handcuffed Mitnick and DiCicco to a bench and called the L.A. police to come fetch them. In spite of Kevin's cool reaction to Brown, his fear of getting caught was so profound that it gave him heart palpitations so severe that he would soon have to depend on heart medication usually taken by people three times his age. Nonetheless, he seemed to realize the inevitability of arrest. He had once told Lenny that he knew he would be caught again after the COSMOS stunt. He had been lucky that time, getting probation instead 72 a CVZERPUNIC of jail. Nevertheless, his compulsive side had won out over his fear of the consequences, and now here he sat, handcuffed to a bench. It was a conflict that would play itself out for years to come as Kevin's obsession intensified. And, at his side, not so much because he sought it but rather because he couldn't avoid it, would be Lenny, a faithful but not always willing companion. The bench was in a narrow hall next to the door, twenty feet away from a security officer working at a desk. By now Lenny was familiar with the deep fear that came with getting busted, but as a juvenile he knew he was better off than Kevin. When he had been caught at Cal State Northridge, he had been detained and released after a few hours. His parents hadn't even punished him. Kevin, on the other hand, was now nineteen and could get this put on his adult record. Lenny prodded Kevin. "Hey, Kev," he said, reaching into his back pocket for his wallet. He grinned as he produced a handcuff key. Lenny unlocked his own handcuffs, then Kevin's. The two sat speechless for a moment. Lenny broke the silence. "You go ahead. You've got a lot more to risk. Take off." Both looked over at the officer, who appeared to be paying no attention to his wards. The door next to the bench was unlocked; Kev in's car was in a parking lot just a few yards away. Lenny's mind was perhaps too full of comic strips and spy thrillers. He had a madcap side to him that tended to surface just as a situation was spinning out of control. His escape plan for Kevin came straight from fiction. Lenny's plan would have brought Kevin closer to being a true criminal than Kevin could have imagined for himself. Kevin rejected Lenny's plan not out of reason but out of fear. He was too scared to try to flee by himself. Kevin would try it only if Lenny came too. Lenny sighed and snapped his own cuffs back into place. He dropped the key onto the floor and pushed it under the bench with his foot. When Kevin tried to lock his own cuffs again, he couldn't. The noise Kevin was making in his efforts to engage the hardware caught the attention of their guard. He got up from his seat and checked Lenny's cuffs, then turned to Kevin. As he pulled on Kevin's arm, it swung free. "So we've got a Houdini over here," the officer remarked. He searched both of them thoroughly and shackled Kevin back to the bench. "Do this again and I'm going to handcuff you to the toilet," he warned. When Solomon and Brown returned to the computer room to exam ine the terminals where Mitnick and DiCicco had been seated, they saw that Mitnick's terminal had just logged out of a computer called Elex- Wash. Solomon recognized it as a Defense Department computer, but he couldn't tell what Mitnick had been doing with the account. Brown looked over the stack of printouts that had been confiscated from Mit nick, and he saw that it had a list of passwords to all the local accounts that had been created in the last two months. The stack also contained account names and passwords of companies Brown knew to be affiliated with the Defense Department, and what appeared to be secret informa tion about genetic research by a company called Intelligenetics. All of the computers were connected to the Arpanet, the computer network funded by the military that connected nonclassified military installa tions, military contractors, universities and research centers around the world. At first, Lenny thought he was going to get out of this one without a scratch. For some reason, USC decided to drop the charges, and as punishment at home, his parents grounded him for a week. Then, in a puzzling reversal, six months later USC refiled the charges and Lenny was summoned to appear in court. He pled guilty to a felony as a juvenile and got a year's probation. Dominick Domino, the detective in charge of the Los Angeles Police Department's young computer crime unit, wanted to see Kevin somehow rehabilitated. In his police report, Domino wrote a brief summary of the case, ending it with an ominous observation: "This defendant is expert at computers and apparently enjoys the challenge of breaking computer codes. He will undoubtedly continue to be a police problem in this area unless maturity rechannels his energy and ambition." So Kevin went to jail: six months at the California Youth Authority's Karl Holton Training School, a juvenile prison in Stockton, California, with about 450 inmates. Karl Holton was one of the more secure prisons in the state; violence-prone teenagers who were difficult to control were sent there for crimes ranging from armed robbery to murder. Kevin was doubtless the only inmate convicted of breaking into computer systems. Living conditions at Holton were harsh: the prison was overcrowded, there was minimal personal privacy and there was a great deal of vio lence. But Kevin tried to make productive use of his time there. He became something of a jailhouse lawyer, and he developed a computer program for tracking fellow wards of the court. He also worked with the Los Angeles police to put together an instructional videotape on com puter security. He was released in late 1983. A T A 74 a memm Richard Cooper wanted to know why Kevin Mitnick was using the computer so much. Why was he helping himself to Cooper's phone line all the time? And how was it that he could magically reconnect lines that had been disconnected? When Cooper presented himself at the L. A. district attorney's major fraud section in October 1984 for a talk with investigator Bob Ewen, he described himself as a sales consultant at Video Therapy, a curiously named enterprise on Ventura Boulevard in Sherman Oaks. Cooper said he was a partner with Donald Wilson, the owner of National GSC, a merchandising company with a mystifying product line consisting of gourmet desserts and "solar barbeque" franchises. Donald Wilson, a friend of the Mitnick family, had agreed to hire Kevin soon after his release by the California Youth Authority to work for Great American Merchandising, one of several National GSC subsidiaries. These grandly named subsidiaries, it seemed, sprang full grown from Wilson's head and usually fizzled into bankruptcy shortly thereafter. Cooper ran one of the ventures, called Video Therapy, but he had had about enough of Wil son's bizarre businesses and was unnerved by the presence of the young man Wilson hired to handle clerical duties and work with the computer. Before Mitnick arrived, the only person who touched the office com puter was a secretary, who used it for three to four hours a day to write letters. Mitnick was now working on the computer all day. When Cooper came at 9:00 each morning, he usually saw Mitnick's black Nissan, conspicuous for its vanity plate that read "X HACKER" and its mobile radio antenna, already in the lot. And Mitnick often stayed at least until Cooper left at 6:00 each night. When Cooper asked Wilson why Mitnick was glued to the computer so assiduously, Wilson replied that he was working on a number of special projects. But the answer didn't satisfy Cooper. Every time he passed Mitnick's desk and looked at the screen, he saw that Mitnick was in the middle of patching in to the computer of TRW's credit bureau to inquire into credit standings. Cooper knew that neither Great American Merchan dising nor its parent company would be making such inquiries. And there was no reason to run credit checks through TRW, as Wilson's franchisees generally did not apply for credit. Then the telephone nonsense started. In early October, Cooper told Ewen, he moved his office into the "client relations" room, where Mit nick and the computer sat. Every time Cooper saw the phone line for his Video Therapy light up, Mitnick was using it. All day long, Cooper told Ewen, he heard Mitnick on the telephone. He appeared to be talking with Pacific Bell employees, because he heard Mitnick refer to such things as COSMOS, satellite operators and work orders. He introduced himself variously as Gillie, Paul, Peter and Steve to whomever he called. And there was one apparently Scottish person Mitnick often made passing reference to during these telephone calls: R. C. Mac. Ewen had to smile at that. Cooper had no idea that RC MAC was the Recent Change Machine Administration Center, an internal telephone company department that processed orders and changes in service via computer. Coincidentally, Bob Ewen had already opened an investigation two weeks before Cooper's visit, on an allegation that Steve Rhoades and Kevin Mitnick were illegally getting into telephone repair and billing computers, and fraudulently using an access code from Satellite Business Systems, a long-distance company, to make toll calls. Mitnick and Rhoades also appeared to be harassing people on MIT computers, where they had guest accounts. And six months earlier, a rash of complaints had come from the ham radio community, claiming that Mitnick had been provoking hams over the air once again. To avoid getting sent back to prison, Mitnick had surrendered his ham radio license to his parole officer. Based on what Cooper was now telling him, Ewen decided there was enough cause to issue a search warrant for the offices of National GSC and an arrest warrant for Mitnick. Ewen took with him three other investigators and Terry Atchley, a Pacific Bell security official. From the Erector-set feel of the tiny office, Ewen got the impression that this was a fly-by-night operation at best. Donald Wilson told the group that the reason he had hired Kevin Mit nick was that he felt sorry for him and he wanted to give him a break. Wilson said he wasn't aware of any calls made to TRW, but when Ewen questioned the secretary, she said she had received two calls for Mitnick from a woman saying she was from TRW. When Ewen asked where Kevin might be found, Wilson said he didn't know. Kevin had left for lunch just fifteen minutes earlier. He added as an afterthought that he had once overheard Kevin say he would flee to Israel before going back to jail. When Ewen showed up at Shelly Jaffe's Panorama City condominium an hour later, Shelly seemed calmer but even less cooperative than the first time Ewen had paid her a visit three years earlier. It was as if Kevin had coached her on what to say in case the police arrived at the door, or so it seemed to Ewen. Kevin was living with her, she told the investiga tor, but she hadn't seen him for a few days and refused even to venture 76 a Qf&WNK a guess as to his whereabouts. So Ewen checked out some of Kevin's usual haunts including Warner-Elektra-Atlantic Records in Burbank, where Lenny DiCicco was working as a computer operator. Did Lenny have any idea where Mitnick might be? Israel, perhaps? No, Lenny told Ewen, he had heard that Mitnick might be in Las Vegas. Ewen's next call was to TRW Information Services. The company's security auditor checked the credit bureau's records and confirmed that dozens of inquiries on Mitnick and Rhoades had been made in recent months. They had come from William Pitt Jewelers and Security Pacific Bank. The inquiries appeared to be something of a prank. The jewelry store alone had made 350 of them into such alleged credit applicants as Steven Rhoades, Steve's grandmother Juanita, Kevin Mitnick, Lenny DiCicco and Gretchen Dog—the name of Juanita Rhoades's Doberman pinscher. Mitnick and Rhoades were merely playing around with a pur loined TRW account number. It wasn't surprising that Mitnick and Rhoades hadn't altered any of the credit ratings, as that would have been far more difficult to do. During the search at Donald Wilson's office, Ewen and his men seized a Xerox personal computer, a printer, a disk drive, a modem, a monitor and various floppy disks. But he missed Kevin. Somehow, Kevin must have found out he was in trouble. He was well-known for running fre quent warrant searches on himself. That might explain the strange phone call that came in to the warrant section of the Los Angeles Police Department on October 24, the day before Ewen served the search warrant. At 6:00 that evening, a man who identified himself as Detective Jim Schaffer from the LAPD's West Valley office asked if there was a probation violation warrant out on one Kevin Mitnick. The computer operator who took the call said yes, there was a fresh warrant in the computer. The detective thanked him and gave him a number where he could be reached. About an hour later, a second call came from a male with a different voice who also identified himself as Detective Schaffer. He said he had Mitnick in custody and wanted to confirm a parole warrant. Suddenly suspicious, the operator put the second caller on hold and dialed the number he had been given by the first caller. "West Valley detectives," came the salutation from a woman, or at least a female-sounding voice, who confirmed Detective Schaffer's existence. When the operator came back to the caller, there was no one on the line. When he called the L.A. number again, an answering machine picked up the line. "Hello, you have reached RotoRooter. We're closed ..." KW; 1U b«Uc-$Ut W^JIua t 77 Kevin may have fancied himself an aspiring Condor, but when things got rough, the bravado shattered. It turned out that while walking to his car at lunchtime, Kevin saw Bob Ewen, the security investigator for Pacific Bell and three other men headed for the elevator of his building. Kevin called Lenny from a pay phone across the street from his office. He was in a panic. He told Lenny he knew there was a warrant out for him, and he was going to leave Los Angeles. Lenny was sure Kevin would be in touch at least once a day, as always. But he didn't hear from his friend after he went into hiding. Instead, once a week or so, Kevin put in a call to Roscoe. Without disclosing his whereabouts, he asked for gossip about the amateur radio scene. Roscoe had long since given up his HOBO-UFO conference line. He was now married to Jo Marie, the woman whose presence in Roscoe's life had crushed Susan's pride four years earlier. Jo Marie had completed law school and Roscoe had gone relatively straight. He had dropped out of USC after only a year, opting instead for a quick diploma from a local vocational school called the Computer Learning Center of Los Angeles. Rather than parlay his weeks of fame from the cover of the L. A. Weekly into a security consulting job, as he had hoped, he settled for a position as data processing manager at an auto parts importer north of Long Beach. It wasn't exactly rarefied work, but it suited Roscoe's orderly style. Now that he had settled down, Roscoe was beginning to think about using his wife's legal expertise to have his 1982 conviction set aside by the court, thus putting the whole unpleasant mess behind him. A weekly check-in call from a fugitive was the last thing he needed. Kevin wouldn't tell Roscoe where he was, and with each telephone call, Kevin seemed more paranoid. Fleeing the warrant and probation was, perhaps, Kevin's own point of no return; he knew that what he was doing was wrong as defined by the law. This was by no means the first time he had been in a legal scrape, but it is unlikely that he had ever previously imagined himself a criminal. Once, Kevin called Roscoe and told him he needed legal advice from Jo Marie. He had been attending a small two-year college in Northern California, and the credits were under an assumed name. He wanted to change his name back to Kevin Mitnick so that he could get the credits transferred to an L.A. school. During his year-long absence, Kevin did leave a hint or two that he was still in business. One day in early 1985, Roscoe came across the phone number of Ronnie Schnell, an old bulletin board buddy from his 8BBS days, and decided to call. When Roscoe reminded him of who he 78 a cyzezpum was, Ronnie sounded surprised. "Oh, I have Kevin Mitnick on the other line. He wants me to get him an Arpanet account." Roscoe was amused, and he counted the seconds before his phone rang. "How did you know I was calling Ronnie?" Kevin demanded when he called Roscoe ten seconds later. It was a mite odd that four years had passed since either Kevin or Roscoe had talked to Ronnie, Kevin was on the lam, deter mined to keep his whereabouts secret, and suddenly Roscoe happened to be on the line at the same time. However much Roscoe tried to tell him it was a coincidence, Kevin remained unconvinced. In another strange incident that seemed to suggest Kevin was still playing around with phones, Steve Rhoades was fooling around one day with the toll-free number for lost telephone calling cards, and when he called the number, the person who answered with "Pacific Bell, may I help you?" was unmistakably Mitnick. Rhoades was so amused he re corded the greeting and used it as the outgoing message on his answering machine. A T A In the summer of 1985, Kevin resurfaced, nearly a year after his disap pearance and just a few weeks after his arrest warrant expired. Bob Ewen was shocked to learn that the juvenile probation department had dropped the warrant from its books with no explanation. If Ewen had known that the warrant was going to dissolve, he would have insisted on an extension. The investigator knew that if he had been working the case steadily instead of spottily, he would have found Kevin no matter where he had gone. Lenny didn't find out Kevin was back in L. A. until he got a call one day at work. When he picked up the receiver, all he heard was someone pushing Touch-Tone keys. The caller was spelling out his own name using a private code that Lenny immediately recognized—the kid who had escaped the law was back in town, possibly up to his old tricks. Kevin finally spoke up and the second chapter of the DiCicco-Mitnick partnership began. Kevin said very little to Lenny about his time spent underground. From what he did say, Lenny figured that Kevin had cobbled together a false ID or two, gathered his bar mitzvah money, and caught the first plane out of L.A. But even when Lenny tried to goad him years later into telling him where he had been, Kevin wouldn't say. When Kevin returned, Lenny was working on the four-to-midnight shift as a computer operator for Hughes Aircraft's Radar Systems Group RW: 1U D^lc'SUc kj*dt* ▼ 79 in El Segundo. It was his fifth job in two years. Well-spoken and relaxed during interviews, Lenny was a master at talking himself into any posi tion. His habit of abusing his employee privileges, however, would sur face soon enough, and what his family referred to as "Lenny's computer shenanigans" usually drove his supervisors to fire him after only a few months. Whenever Lenny got a new job, Kevin wanted to know what com puters were there. A Digital computer was a good start; a dial-up line that allowed access to the computer from the outside was even better. And if Lenny was working a job with night hours, and could get Kevin in when everyone else had left for the day, then Lenny heard from him just about every day. Kevin had a new project in mind: establishing accounts on the score of minicomputers that Pacific Bell operated in Los Angeles for order entry. Looking back several years later, Lenny decided that when they were dabbling in the "minis," as telephone company personnel referred to them, they gathered more power than they had ever had or would ever see again. Someone with access to these computers, which connect to switches controlling all Los Angeles telephone service, could enter commands and see them take effect immediately. The switches accessi ble through the minis did everything from discontinuing service on a line to initiating a trace. It was Lenny's job to put computer equipment at Kevin's disposal. Without a badge, Kevin couldn't come onto the premises at Hughes. Once, however, in April of 1986, he managed to talk the guard into letting him in. During this, Kevin's first and last visit to Hughes, he logged on to Dockmaster, a computer run by the National Computer Security Center, a division of the National Security Agency, the nation's highly secretive intelligence agency. Despite its obvious appeal to the adventuresome pair, Dockmaster didn't harbor any deep national security secrets. It was simply NSA's public bridge to the outside world. To get onto Dockmaster, Kevin had found the name of someone outside of the NSA with a guest account. Posing as a technician at an NSA computer center, Kevin had telephoned the legitimate user and said he was issuing new passwords and needed some information: name, telephone and current password. It was an old trick that Kevin and Roscoe had refined together, and it usually worked like a charm. But Dockmaster was incidental, a diversion from the Pacific Bell "minis" project. Since he couldn't come to Hughes, Kevin telephoned his instructions to Lenny. He called constantly. "It's the wife," Lenny's 80 a CV3EZPUNIC partner in the computer room would joke when he handed Lenny the phone. And when they needed to devote twenty-four hours at a stretch to their work, they checked in to one of the dozens of cut-rate motels along Sepulveda Boulevard in the heart of the San Fernando Valley. It was pure cyberpunk: the mile-long strip of seedy shelters was a magnet for local prostitution and drug rings, but neither Kevin nor Lenny cared, as long as the motel room had a telephone line that could be transformed into a data communications center. Once that criterion was met, Lenny preferred motels with pools in case he got the urge for exercise, and both were partial to places next to a 7-Eleven or other suitable convenience store for frequent junk-food runs. Kevin usually plunked down the $19.95 for the night onto the registration desk in coins filched from Shelly's tip money from waitressing. Once inside the room, they went straight to work: Kevin unpacked the terminal while Lenny popped open his tool set to rig the telephone jack so that it would accommodate their modem. They worked through the night, taking little note of some of the seamier activity around them. They often pushed the checkout time to the limit, until the manager came around to throw them out, making them personae non gratae at that establishment. It took six months for them to get fully privileged accounts on every phone company mini in the Los Angeles area. And with each computer they conquered, their potential power increased. It would not have been difficult for Kevin and Lenny to take down the phone service for the entire metropolitan area; but neither of them was interested in that. The idea of power was more seductive than actually wielding it. When Hughes got word from the NSA that someone from the El Segundo facility had been into the Dockmaster computer, Hughes man agement went on a witch-hunt. The night of the penetration was linked to Kevin's visit, Mitnick was linked to Lenny and Lenny was summarily dismissed. The company's corporate security department spent the days after Lenny's departure behind closed doors, conducting intensive inter views with anyone Lenny had associated with. After Lenny was fired from Hughes, he got a job as a delivery man for a flower shop. The only vital credential was a perfect driving record. Though only twenty, Lenny already had a formidable record of outstand ing traffic warrants. But that was Leonard Mitchell DiCicco's problem; the florist hired Robert Andrew Bollinger, a model motorist. As Lenny would later tell the story, with Kevin's help he had created a new iden tity for himself. He even went so far as to rent an apartment in the San Fernando Valley as Mr. Bollinger. (fc^T&D^^W^ ▼ 81 But a florist doesn't have much need for a VAX minicomputer, the mainstay of Digital's product lines and Kevin's target of choice. Now Lenny hardly heard from Kevin at all. The intensity of this friendship, Lenny realized, waxed and waned depending on his job. The degree of Kevin's loyalty was a function of the kind of equipment Lenny could provide. Bollinger quit the flower delivery business after one month. Lenny DiCicco resurfaced as computer operator for a shipping company. For the time being Kevin kept a low profile. He seemed to have become more paranoid since his return. Kevin had always been secretive about disclosing personal data—it wasn't until months after Lenny met him that he was even willing to give Lenny his home telephone number— but now he was acting strangely. He was taken with the idea that people should be able to contact him at any time, but without his having to reveal his whereabouts, so he started carrying a pocket pager everywhere he went. And both Lenny and Roscoe noticed that the more paranoid Kevin became, the more he ate. Perhaps in an effort to follow Roscoe's path into the world of conven tional computing, in September of 1985 Kevin enrolled at the Computer Learning Center of Los Angeles. Roscoe had graduated a few years earlier and spoke well of it. Kevin's previous experience in higher education had been dismal. In 1982 he was expelled from Pierce College, a twoyear community college in the heart of the San Fernando Valley, for tampering with the school's computers. Maybe this time he could keep his mind on the coursework. The Computer Learning Center was started in the 1960s by a group of computer executives who, astutely enough, predicted that the nascent computer industry would see explosive growth in years to come and would need tens of thousands of people qualified to fill the jobs that were emerging. By the late 1970s the computer industry was a major source of white-collar employment, not unlike the consumer electronics industry when it mushroomed in the 1950s and 1960s. And just like any other technical school advertised on matchbook covers and city buses, the Computer Learning Center wanted to attract a student body hungry for work. To gain admission to CLC, a prospective student needed a high school diploma or equivalency degree. The applicant then took a basic aptitude test designed to measure ability in symbolic logic and mathematical reasoning, the foundations of computer science. The $3,000 tuition for the nine-month program was paid in advance and the student was on 82 a CV&RPUNIC the way to a fresh career. CLC graduates, many of whom were retooled English majors or auto mechanics, joined the data processing ranks in side Security Pacific Bank and the dozens of giant aerospace corporations that dotted the Los Angeles basin. Polaroid snapshots of these successful graduates were enshrined in a glass display case upstairs at CLC. And next to the first-floor admissions office, letters of glowing commendation from such satisfied employers as First Interstate Bank, Continental Air lines and Agfa-Gevaert lined the walls. Although the school failed to offer its graduates a formal degree, as a technical school it could certify would-be technicians and programmers as proficient in using the center's computers. For the most part corporate America didn't need computer science Ph.D.'s fresh out of UCLA, Stan ford or Cal Tech as much as it needed young men and women willing to work a lobster shift, changing tapes to back up the day's business for a starting salary of $20,000. The Computer Learning Center was a steady source of entry-level programmers, technicians, computer operators and data-entry clerks for the region. If not exactly the glamour posts of the computer industry, these jobs at least paid better than other clerical positions that required less training. The Computer Learning Center was a resolutely straight, no-nonsense place. Its dress code forbade all but the most businesslike attire. Like so many scrub-faced Mormon missionaries, the men were required to wear jackets and ties, the women skirts or dress pants. Larry Gehr, who taught an introductory class at CLC in the COBOL computer language, was vaguely aware of Kevin Mitnick's past problems, but he tried to treat him like any other student. Kevin was inquisitive, and his mind always seemed to be working at least a lecture's worth ahead of the class. Kevin had an unusual mix of computer expertise: there were some fundamentals he didn't know, but in other areas he was well ahead of his fellow students. He displayed so much ability, in fact, that Gehr was concerned that an entry-level job wouldn't challenge him. Gehr adopted the role of teacher-counselor to this erratic student. He tried to encour age Kevin, telling him that if he could get a good entry-level job and show what he could do, he would rise swiftly. A T A Even in the days when Susan was around, dating her way through the phreaks, Kevin had seemed entirely oblivious to women. So it was a bit KW; 1U DmA-SU* H*Ju* t 83 of a surprise to friends when, in the summer of 1987, Kevin casually mentioned that he had just gotten married. Everyone developed his own theory about Kevin's nuptials. That the bride in question worked at GTE, one of the two telephone companies servicing the L.A. area, seemed no coincidence. At first, word went out that she was a program mer there. For someone like Kevin, his friends agreed, there was nothing more tantalizing than the promise of an inside source. And by the time Susan Thunder, now in the Downey area in south Los Angeles training for a career in professional poker, found out about it, Mrs. Mitnick was being described as a senior executive at the telephone company. Bonnie Vitello was slight and dark, her round face and brown eyes framed by a thick mass of long chestnut hair. Bonnie's expression in repose approached a frown, but the suggestion of a sour temper would suddenly disappear with an unexpected explosion of glistening white teeth that cast a disarming spell over strangers. Bonnie's smile was her built-in edge. Born in New Jersey, Bonnie was six when her parents moved to Monrovia, about twenty miles northeast of downtown Los Angeles. When the Vitello family moved there in the mid-1960s, the predomi nantly white, mostly conservative city was on the verge of change: gang fights between the recently arrived Hispanics and the entrenched whites were starting to plague the community. Nine years after their arrival, unhappy with the growing racial tension, the Vitello family of six moved south to Rowland Heights, a quiet, arid strip of a town on the eastern fringes of Los Angeles County. Twenty minutes north of Disneyland, Rowland Heights is a community of new condominium subdivisions interrupted occasionally by clusters of single-family homes—an ideal place to start over. A listless student back in Monrovia, Bonnie suddenly became interested in school in Rowland Heights. At her new high school, the teachers weren't busy breaking up gang fights and she no longer had to guard her back. She graduated early and enrolled at a small junior college not far from home. Then interruptions set in, not the least of which was her first marriage, at age eighteen, which lasted just six months. Bonnie's impulsive jump into marriage exacted its price. She dropped out of college and put her academic pursuits on hold indefinitely. At twenty-one she was doing temporary office work when she got an offer to work full-time as a secretary for GTE at its Monrovia headquarters. Reluctantly, she went back to the place she had left so gladly. When the 84 a CYBERPUNK phone company moved its headquarters from Santa Monica to Thousand Oaks, a suburb on the northwestern edge of the Los Angeles area, Bon nie transferred there. Bonnie hated the monotony of clerical work. After several years of filing and typing, with no real prospects for advancement, she put her mind to learning about computers. It was an easy transition for her. Personal computers had made their way onto desks throughout the com pany. When Bonnie was given an IBM Personal Computer, it was with the expectation that she would use it for nothing more than word pro cessing. But the little machine captivated her. She pored over the man ual and learned the machine's every feature. Word of Bonnie's computer prowess spread and she became the department's PC troubleshooter. With GTE paying the way, Bonnie enrolled as an evening student at Computer Learning Center. One night, Bonnie was at the main console learning how to con trol one of the central training computers. The student operators sat at computer consoles, simulating the activity of a large corporate data processing operation: computer jobs were running, the system was monitored and data files were regularly backed up. Suddenly Bonnie saw messages flashing on her screen from someone sitting across the room in a spot reserved for people with full privileges on the system. "Don't flush my file!" came the message, then, "Let my job go first!" "Who is that guy?" Bonnie asked one of the instructors. "Oh, that's Kevin Mitnick," he replied. "Don't piss him off. If he doesn't want you to flush his job, then don't." Bonnie looked across the room at the overweight stranger and smiled. She sent him a reply. "What else do you do besides tell people not to flush jobs?" "I like to go out to eat," came the response. "Would you like to go out?" "I can't. I'm engaged," Bonnie replied. "That's too bad. You have a nice smile," he wrote back. Bonnie had been engaged for six months to an engineer who was a great deal older than she, but the excitement of the relationship's early days had gradually diminished. She considered this for some minutes, then wrote back to him: "Well, I'm not so happy with the relationship." He answered within seconds: "Then maybe you'll go out with me." She was tempted. "Maybe next week," she typed back. Kevin Mitnick's electronic entreaties persisted. For several weeks after KW; 1U b«Uc-&U fM** t 85 that, each time he flashed her a message asking her to have dinner with him, she politely declined. Late one evening, he abandoned the com puter messages and approached her desk, eating something. "Well, ob viously you're not seeing your fiance tonight," he said midchew. "Do you like Thai food?" At that point, although Bonnie had never considered dating anyone quite so bulky, she finally said yes. Over dinner, Kevin asked her where she worked. When she replied that she worked for a phone company, he began to laugh so hard he nearly choked. But he wouldn't explain why. Bonnie found him charm ing and interesting. It surprised her to discover that he was just twentythree, six years her junior; and he professed to be equally surprised that she wasn't his age, as he had at first assumed. He seemed more mature, particularly in comparison with some of the other, younger CLC students who were just out of high school. What was more, he could explain difficult computer and mathematical concepts as no one else seemed able to do. He wasn't boastful, and yet it was clear that his knowledge of computers ran deep. They began to see each other often, sometimes taking a bottle of wine to the beach in Santa Monica on a Friday evening. Not much of a drinker, Kevin gamely swirled his wine in his glass as they talked. And although Kevin had never done much dancing, Bonnie managed to coax him into local discos. When Kevin was around Bonnie, in the early stages of their relationship at least, another side of him emerged. In contrast to the young man who reacted against a difficult and isolated childhood by lashing out at hams, monkeying with people's phone ser vice or reaching for a computer—the one thing that gave him a feeling of control and power—around Bonnie he was easygoing and engaging. Love had its salutary effects as well: Kevin began to drop his excess pounds like so much ballast, and Bonnie watched his body transform into a more appealing shape. Within a few weeks, Bonnie officially dissolved her engagement, and Kevin all but moved into her apartment in Thousand Oaks. It was a small one-bedroom place, but there was enough space for the two of them. Before long, marriage became Kevin's obsession. Every week or so, he asked her to marry him. Something about it felt right to Bonnie. She was ready to accept. When Bonnie joked to Kevin that she was his shiksa—the Yiddish word for "non-Jewish woman"—he asked her what the word meant. A T A 86 a CYBERPUNK Steph Marr had been around computers long enough to know that a good system administrator knows how to read his machine. And some thing was wrong with the system at Santa Cruz Operation. A blind church organist can tell how many people are in the church by the way his music sounds, but he probably can't explain how he does it. A good jockey can tell what kind of mood his horse is in, and can often tell how well the horse is going to run by the way it walks to the starting line. A good computer system administrator develops a feel for the patterns and sounds of his computer. When they are aberrant he always investigates. Computers are supposed to do the same thing over and over again, and when they do something different there is always a reason. The internal rhythm of a computer is seen in the delays in getting a response to typed keys, the staccato sound of a disk arm rat tling, the flickering lights of modems and disk controllers, or the daily routine of log and journal file entries. Named for the Northern California coastal town where the company had its headquarters, Santa Cruz Operation got its start selling a version of the UNIX operating system to run on personal computers. In eight years, Santa Cruz Operation had grown from a father-son consulting start-up to a multimillion-dollar company. Marr was one of the people who worked to keep Santa Cruz Opera tion's network of computers up and running. He had been there for a year, long enough to know that certain users not only had certain privi leges on the system but also had individual habits. Engineers logged on from their homes late at night; secretaries logged on only from work and only during working hours. Steph was sufficiently tuned in to his computer's own circadian rhythms—the times of heavy use and the periodic lulls—to notice an aberration in late May of 1987. Not only did he feel the trouble, but the system was telling him in no uncertain terms that something was going awry: one of the secretaries who used the computer was acting out of character. She was logging in after hours, cruising the system and trying to peek into other people's directories. She was accessing files that had been dormant for many months, including an out-of-date "help" system. When Steph asked her about it, she professed ignorance. Apparently someone had ferreted out her password and was blundering around inside SCO's computers. When Steph realized that an intruder had entered the system, instead of immediately trying to throw him out, he set up an alarm system, and put limits on what the stranger could do. The trespasser must have felt KW: 1U VmJc'&U fM** t 87 the presence of someone electronically peering over his shoulder, watch ing his every move, because a few days after the monitoring started, he typed onto the screen, "Why are you watching me?" "Because it's my job," Steph typed back. Once he had engaged the company in an electronic conversation, the hacker made a request that signified so much audacity that the system administrator knew this was no ordinary intruder. The uninvited guest told Steph that he wanted an account that gave him unlimited privileges throughout the system. By this time, a group of onlookers had formed a half-moon around Steph's desk, and a lively debate ensued over whether or not Steph should give him an account on the company computer. Steph believed his own experience as a hacker on the edge of the law gave him a better understanding of just what motivated this person. In his younger days, Steph had done his share of system cracking. As a college student, his favorite pastime was to slide past the security on university computers, then call the system administrators to inform them of what he had done before they discovered it. He, too, believed in free access to information. But Steph also knew when to stop. He believed in exercising restraint and respecting someone else's right to run a com puter system without having to build elaborate safeguards against out siders. There was something about this person's attitude that made Steph sense that he knew he was breaking the law, and was perhaps even proud of his trespass. A high-level account was out of the question. If Steph gave him such power over other users, and if he was clever enough, the intruder would be able to change the machine's operating system, or even do something as patently malicious as depriving others of the use of the computer. If he wanted to, he could become the electronic equivalent of a mad gunman in a bank, holding the computer hostage. Finally, Steph decided to give him an account that masqueraded as something more powerful than it actually was. The account was called Hacker, a label of the intruder's own choosing. In setting up an account for him, to which Steph also had full access, Steph figured he was erecting an aquarium, in which he could watch every move of this felonious fish. Moreover, letting him lounge around on the computers would make it easier to trace his calls. Within forty-eight hours, Pacific Bell security was doing just that. But when Pacific Bell security investigators started to trace one call, they discovered that somehow the trespasser was wily enough to get access to the phone company computers themselves and block certain commands requesting information about the line he was using. 88 a CYBERPUNK Despite the long hours the intruder was dedicating to wandering through the SCO computer, he appeared to have no discernible quest. He seemed merely to like to prowl through the system, checking out directories but seldom opening files themselves. But after a week or so, the hacker's probing seemed more directed. He fastened onto programs that would allow someone to modify the operating system, but he didn't have the necessary privileges to do so. It was clear after a while that he seemed to have a peculiar goal of modify ing XENIX, a derivative of the UNIX operating system and the crux of the company's business. More disturbing was his apparent goal of trans mitting a copy of XENIX to his own computer. But the owner of the Hacker account gave himself away. The simple oversight that exposed him lay in his use of MCI to gain access. A special MCI feature automatically identified the telephone from which the tres passer's call to the local MCI access number was placed. It was a tele phone in Thousand Oaks, California. A T A When investigators from the Santa Cruz Police Department flew to Los Angeles on the morning of June 1, 1987, to conduct a search at apart ment number 404, 1387 East Hillcrest Drive in Thousand Oaks, years of experience investigating fraud couldn't have prepared them for the odd collection of evidence they encountered. The officers had been told what to look for—computer printouts, a computer, a modem and notes of phone numbers and access codes—but they weren't sure why. When the officers knocked on the front door there was no response, so they let themselves in with a pass key borrowed from the manager of the com plex. Detective Patricia Reedy of the Santa Cruz Police dutifully noted in her report: "On the dining room table was a computer with a black box with multiple small red lights on it. Detective Nagel advised the black box was a modum [sic]. The 'MC light on the modum was lit. Lying next to the computer was a beige touchtone phone with the front plate removed. The computer, the modum and the phone were all hooked together." To prevent anyone from calling the apartment and erasing possible evidence from the computer, Detective Reedy followed what she must have thought was the proper procedure: she removed the receiver from the phone. As she noted in her report, the receiver then "made a loud screeching noise." Any computer crime investigator would have warned her to keep the phone in place, as the suspect might well have been in the process of transmitting data. RW; 1U D«Ul-$Ul WacJIha ▼ 89 As they made their way through the small dwelling into the bedroom, they first encountered large piles of clothing on the floor. On a bedside table they counted fifty-five computer disks, in boxes and scattered on the tabletop. From underneath the bed they retrieved "a book marked 'OS Utilities,' numerous loose sheets of printed materials on computers and a plastic bag containing a large quantity of hand-written notes and computer printouts." They gathered all of it as evidence. Also under the bed was a loaded Charter Arms .38 special two-inch revolver. Inside the bedroom closet the detective found a second, much larger firearm—a Remington .87 shotgun. On the bedroom floor they found two small plastic bags containing what appeared to be marijuana, and a glass bong. They took the items as evidence. When Detective Reedy checked the clothing in the closet, she found $3,000 in $100 bills in the pocket of a man's suit jacket. She initialed each of the bills and left them on the kitchen table. The detectives knew they didn't understand enough about computers to analyze what they had found and decided to call in a computer spe cialist from the Ventura County sheriffs office. "The specialist advised us that what we had in front of us was a computer terminal that had no way of storing information. He explained the black box on top of this terminal was in fact a modum. He was able to put the receiver back on the phone . . . and access into the terminal. He was able to bring up on the screen information that said 'abort.' He advised we probably inter rupted the computer accessing into somewhere else." The search ended at 4:00 p.m. When Bonnie came home that afternoon, she thought they had been burglarized. The computer terminal was gone, as well as the modem, the floppy disks and all of their computer books. But when she saw a stack of $100 bills on the table, money Kevin had been saving for their wed ding celebration, next to a document bearing an official seal, she knew they had been searched. She packed a bag and went out to find Kevin. When she told him who had just been to the apartment, he flew into a panic. One of Kevin's first calls was to Roscoe, demanding to know whether Roscoe had informed on him. Roscoe tried to calm Kevin down and ask him questions. But Kevin was too excited to listen; he began to sound as if he were talking to himself. Should he get out of town? Without waiting for an answer, he kept talking. Then again, he rambled on, he didn't want to leave Bonnie. Should she go too? Roscoe cut him off and told him to get in touch with an attorney. 90 a CYBERPUNK The officers returned to the apartment at 8:30 the next morning. They knocked on the door and got no answer, so they went to interview the manager, Alice Landry, who told them that the tenant in number 404 was Bonnie Vitello, a nice-looking woman in her twenties with a thin build and dark hair who worked at GTE. She said Vitello had had "her brother" staying with her. He was tall, heavyset, nice-looking and clean-shaven. Overall, the manager told the inquiring officers, Ms. Vi tello had been a good tenant, although there had been a couple of complaints about noise from inside the apartment in the evening, the sound of people arguing. The brother, she said, was at home a lot. Later that morning, the officers called GTE's security manager, who verified that Vitello had worked there for several years. That morning she had called in and asked for vacation time. She had said she was moving and would be back the following Monday. Detective Reedy asked the security manager if he recognized the name Kevin Mitnick. Not only did the manager recognize the name, but he rattled off a list of agencies he knew had investigated Mitnick in the past. Mitnick, it seemed, was something of a household name around GTE. Reedy's next call was to the L.A. County district attorney's office, where she was directed to Bob Ewen. Ewen told Reedy that Mitnick had been a suspect in several major computer crimes in Southern California, and that he himself had worked a case involving Mitnick several years before. At one time, Ewen said, there had been a warrant for Mitnick in the office's computer, that Mitnick had found out about it and that he had then fled to Israel. There were no current warrants out for Mit nick, but Ewen believed the FBI was working some cases involving him. In any case, Ewen warned, Mitnick was extremely dangerous, capable of destroying computer systems remotely using "logic bombs." Logic bombs? Israel? Southern California was bizarre enough, but this sounded absurd. That afternoon, the officers called Santa Cruz Opera tion to say they believed they had found the intruder. The arrest war rants that were issued from the Santa Cruz County Court charged both Kevin David Mitnick and Bonnie Lynne Vitello with unauthorized ac cess to a computer, a felony under California law, with bail set at $5,000 each. The officers who had conducted the search described Vitello to the court as "dangerous and bright." And twenty-three-year-old Mitnick was a known criminal with a long list of previous offenses. Three days after the warrant was issued, the suspects surrendered voluntarily at the West Hollywood police station. Once it was established that Mitnick KW: 1U b#Uc-$Ut WkJIha t 9 J had acted alone, Santa Cruz Operation dropped the charges against Bonnie. For all the trouble he had been in through the years, Kevin still had a clean adult record and he wasn't about to let that change; he refused to plead guilty to a felony charge. His attorney asked that, in exchange for Kevin's full cooperation in explaining how he had cracked the Santa Cruz system, the charge be reduced to a misdemeanor. So a misdemeanor it was, with a small fine, thirty-six months' probation and a three-hour meeting between the Santa Cruz Operation computer staff and Kevin Mitnick in the presence of their respective attorneys. When Steph Marr, the system administrator at Santa Cruz Operation, met Mitnick for the first time, he thought he should offer some words of praise. After all, Mitnick had managed to muscle his way into the Santa Cruz Operation computers and, for a time at least, had eluded detection. "Well played, well met," Marr said as he greeted him. But Mitnick barely responded. When Marr asked him a technical question, he re sponded to the Santa Cruz Operation attorney instead. And his attitude as he described his methods was annoyingly condescending. It was hardly the hacker-to-hacker session Marr had hoped for. When Marr got a call a year later from Mitnick asking about a job, it only confirmed that this was indeed a young man with extraordinary gall. Kevin and Bonnie were married that summer, while the Santa Cruz charge was still hanging over Kevin's head. It was a trying time, espe cially the frequent trips to Santa Cruz for court appearances. It wasn't exactly the way Bonnie might have chosen to spend her thirtieth birth day, which arrived just a month after their apartment had been ran sacked by the police. But for all the problems Kevin was causing her, Bonnie still wanted to marry him. She had already been through one big Catholic wedding and she didn't want another extravagant affair, and Kevin didn't seem to mind one way or the other, so they went to City Hall and emerged fifteen minutes later with their vows in place. To appease Bonnie's mother, the newlyweds dressed in wedding garb and went to her house for a celebration party. The couple stood smiling for the obligatory photographs. Bonnie was happy. Kevin had given her a ring and his heartfelt word that his computer shenanigans were forever behind him. If Kevin was planning to make a clean break with his past, it didn't help that he became the primary subject of a Pacific Bell security memo a month or so later. A ham with whom Kevin had a less than friendly 92 a CYBERPUNK relationship happened to work at the telephone company, and read the memorandum over the air. Written by a security manager, the memo detailed the contents of the computer disks found during the search after the Santa Cruz break-in. Describing the events surrounding Kevin's case as "alarming," the manager listed what had been found in the Thousand Oaks apartment: "The commands for testing and seizing trunk testing lines and channels; . . . the commands and logins for COSMOS wire centers for Northern and Southern California; . . . the commands for line monitoring and the seizure of dial tone; . . . references to the im personation of Southern California security agents ... to obtain infor mation. . . ." The list went on. The memo concluded that computer hackers were becoming more sophisticated in their attacks on phone company computers. The author suggested that it was possible that hackers could incapacitate an entire central office switch by overloading it or tampering with the computers that controlled it. The memo also voiced concerns that terrorists or organized crime groups might get their hands on "underground computer technology." When Kevin heard this, he panicked. He had to see the memo. He called Lenny, then Roscoe, who may have stopped his extralegal activi ties but didn't mind being pulled in on the occasional clever hack. The three worked out a plan for getting the memo. Kevin called the secretary in the San Francisco office of the manager who had written the memo and, posing as another security manager, told her he had never received his copy of the security memo. Would she mind faxing it to him? Of course not, she replied, she would be glad to; she even had the number programmed into her fax machine's speed dialer. When she pushed the button to send the memo on its way, she had no way of knowing that Kevin had programmed the number her fax machine was calling to forward the memo to Roscoe's fax machine at work. Roscoe had reprogrammed his fax machine so that when it responded to the secretary's machine, it looked as if the proper fax machine was responding. Even after Roscoe received the memo and read it aloud to Kevin, Kevin wanted to see it immediately. He didn't want to wait and pick it up after work. So he had Roscoe fax it to him at a copy shop in the San Fernando Valley. Roscoe later leaked a copy of the memo to reporters and a story describing its contents landed on the front page of The New York Times. He couldn't resist embellishing slightly the story of how the memo was obtained. He told the reporters that it had been intercepted by tapping KW: 1U b**lc-&U HacU* t 93 a phone line between two Pacific Bell fax machines. Company officials confirmed the memo's authenticity, but said they were mystified by how it had landed in the hackers' hands. A T A The first call from Pierce College came in to the Los Angeles Police Department on the afternoon of February 17, 1988. A Pierce College security officer was on the phone to report that since January 13 two young men had apparently been making illegal copies of software. On that January evening, Pete Schleppenbach, a computer science instruc tor, had walked into the computer science lab and seen a tall, slender man in his late teens or early twenties hovering studiously over one of the system terminals. Schleppenbach was taken aback by the sight of a complete stranger standing so authoritatively in a place clearly off limits. "No Admittance—Authorized Employees Only" warned a sign sus pended directly above the stranger's head. And one would have to be unable to read English to be oblivious to the warning notes Schleppen bach had taped to the terminal, obscuring the screen: "Do not turn this terminal off. Leave it on!" and "Students: Don't use this terminal unless all others are in use!" To see what was on the screen, the young man had taken Schleppenbach's handcrafted monitions and flipped them onto the top of the monitor. Schleppenbach stood and watched the young man—a student? a Digital technician?—as he reached behind the terminal and turned it off, then on. Then the stranger sat in front of the machine as if he owned it and began to type. Schleppenbach approached him. "What are you doing?" he asked. The young man barely looked up. "Just looking," he mumbled. His speech had the tone of someone convinced that his actions were beyond reproach. "What are you doing on the terminal? Didn't you see the signs? You're not a student here, are you?" He shrugged at Schleppenbach. "No, I'm not, but she said it was all right," and, without turning around, he thrust his shoulder in the direc tion of a student employee working in the computer lab. Unsatisfied, Schleppenbach told the stranger to leave. The teacher then asked the student worker if she had given the stranger permission to use the ter minal. She said she hadn't. When he turned around, Schleppenbach saw that the trespasser had not left the room, but was seated at another terminal with someone who appeared to be his friend, a pudgy complement to the rangy, cocksure 94 a CYBERPUNK stranger. Might he be a Digital technician? He looked old enough to be out in the world of gainful employ. The friend seemed engrossed in what he was seeing on the computer screen, and he typed in short, feverish bursts. As Schleppenbach began to approach the two, he saw the slender one tap the shoulder of his friend, who turned around to face Schleppen bach. He turned back to the computer and, as if in a big rush, typed something quickly and got up to meet Schleppenbach halfway across the room. The pudgy stranger spoke first. Friendly and inquisitive, he told Schleppenbach that he and his friend were there to find out about the course Schleppenbach was teaching in office computer networks. Cau tious despite the young man's friendly, almost engaging demeanor, Schleppenbach explained the course's prerequisites, and told them how to register for classes. He told them they shouldn't be using the system unless they were enrolled at the school. "Okay, we were just leaving," replied the heavy one, at once defensive and vaguely arrogant. "We just know a little about Digital computers." When they were gone, Schleppenbach walked over to the computer where the two had been sitting. He saw that a tape was inside the tape drive, and that a light on the drive was flickering to indicate that some thing was being written on the tape. The only person aside from Schlep penbach who was authorized to mount tapes for backup was another instructor. Schleppenbach went straight to the classroom next door, where the other teacher was holding class, and asked his colleague if he had been doing work on the Micro VAX II, a small Digital Equip ment computer. The other instructor shook his head. Schleppenbach rushed back into the lab and saw that the light next to the tape drive was still on. Schleppenbach enlisted the help of one of his students to try to figure out what was going on. They went to a terminal and typed, "show system"; their screen displayed the name of every job running on the computer. When Schleppenbach saw a program called CP.COM, he began to get nervous. Schleppenbach knew that program hadn't been there before, and when he displayed it on the screen, he saw it was a simple seven-line program, a command procedure for making a.complete tape backup of every program on the college's system. At first, Schlep penbach decided the only thing to do was to abort the work of the tape whirring inside the tape drive, but he thought better of it. The backup process lasted forty minutes. When Schleppenbach removed the reel of tape from the drive, he saw right away that it did not belong to Pierce College. When he reloaded the strange tape into the tape drive, he KW; 1U DmI-SUc H^Ui ▼ 95 asked the computer for a listing of its contents. The tape contained a copy of every file in the system. If he hadn't intercepted those two young men in the middle of their task, they would have walked out of the room with a copy of software worth $20,000. It wouldn't have deprived the college of the software, but in Schleppenbach's view it was theft none theless. Schleppenbach figured he had seen the last of them, but for safekeeping he put the tape in a locked room accessible only to faculty. The next morning, he called the chairman of the computer science department to tell him what had happened. When Schleppenbach walked into the lecture room at 7:00 p.m. on February 9 for the first class of Computer Science 64, he was shocked to see the same two youths seated in the back of the classroom, grinning and tapping pens against their desks. They had enrolled. Two days later, Schleppenbach ran into Anne Delaney, the former computer science chairwoman, now a professor in the department. He had hardly finished telling her of the incident with the tape drive when she interrupted him. "It isn't Kevin Mitnick, is it?" He looked down at his class roster. Yes. Kevin Mitnick was one. The other was Lenny DiCicco. Delaney looked stricken. She told him that in 1982 Mitnick had been expelled from the school's computer science program for tam pering with the school's computers. He was trouble. She told Schleppen bach to alert everyone that Kevin Mitnick was back on campus. A T A This was not the first that Jim Black had heard of Kevin Mitnick. Tall and wiry with an appeal suggestive of Montgomery Clift, the forty-sevenyear-old LAPD computer crime detective had loosely kept track of Mit nick for years. When the call came from Pierce College, Black's hunch was that this was more than a simple matter of copying some software from the computers of a junior college. He had heard enough about Mitnick through the years to suspect that he might be up to something big. This time, he wanted to see Mitnick and his friend spend some real time in prison. Black had heard that Mitnick didn't like jail one bit. The detective suspected there wasn't much that would disrupt the young man's impulse to seek control of electronic devices other than a healthy dispensation of justice. He dropped everything to work full-time on the case. Black had begun to specialize in computer crime in 1982, when two embittered employees of Collins Food, a restaurant chain, were accused of planting two "logic bombs" in the company's computers. The insidi- 96 a CYBERPUNK ous software was designed to destroy payroll, inventory and sales records, and it was only a lucky accident that led an employee to discover the potent little pieces of code before they did their damage. Black had begun to handle other aspects of fraud eight years earlier. He was work ing auto repair fraud when he was asked if he'd like to join in the Collins Food case investigation. He spent several years on the case, and although the prosecution couldn't gather enough evidence to convict the suspects, the challenge of working a case in which someone had the ability to do something so destructive without leaving a trace was such an interesting departure from routine investigative work that he moved into the de partment's fledgling computer crime unit. By 1988, Black's division was one of a dozen or so units around the country devoted to computer fraud. Black saw people like Mitnick not just as a general threat to computer systems, but as a personal threat. Mitnick was known to take direct revenge on members of the law-enforcement community. Black spoke with one of Mitnick's former probation officers, who said the telephone service at her home had simply gone dead one day, but when she called Pacific Bell to report the problem, the company told her that according to its computer her service was just fine. It had taken her days to con vince the phone company that her line was really dead, and still longer to get it fixed. Black didn't want to take any chances. He made special arrangements with TRW so that anyone attempting to see his credit rating would have to go through extra steps. The telephone company made similar provisions for Black's home telephone service. The day after the initial call, Black was at Pierce, talking to the staff and administration. That afternoon, he ran a search on both Mitnick and DiCicco. DiCicco's record showed several outstanding traffic war rants. Curiously enough, Mitnick came up clean. Black put in a call to Bob Ewen in the DA's office, and Ewen told him about the Santa Cruz case. When Black called the Santa Cruz Police Department, he learned that Mitnick had pled guilty to a misdemeanor eight months earlier, and was currently on probation. Black pulled driver's licenses for Mitnick and DiCicco, and called the letter carrier to see who received mail at 8933 Willis #13 in Panorama City. The mailman said that Mitnick got mail there. So did Bonnie Vitello, Mitnick's wife, and Shelly Jaffe, Mitnick's mother. Black's next call was to the local FBI office. An agent there said he had gotten a call from the FBI office in Baltimore a few months earlier, linking Mitnick to the penetration of a National Security Agency computer from the Hughes Radar Systems Group in El Segundo, but as far as he knew the KW; 1U V«Uc~$Ut HacUi ▼ 97 L.A. office had no open case on Mitnick or DiCicco. A few days later, Black and a deputy district attorney met with Schleppenbach at Pierce. They told Schleppenbach that before and after each class he should watch both suspects and jot down anything that looked suspicious. Black's next step was to call the local Digital office and describe the problems at Pierce. An engineer from Digital's Los Angeles office took on the job of analyzing the tape DiCicco had left in the college's com puter and monitoring the duo's computer activity at the school. On March 3, surveillance began. Black wanted their every movement accounted for. First, the campus police took up the watch. At 6:30 that evening, plainclothes officer Kenneth Kurtz watched Lenny DiCicco arrive at the computer science lab, sit down at a computer and begin to type. Thirty minutes later, Mitnick arrived. Once Schleppenbach ar rived, the students in the lab moved to the lecture room; DiCicco spot ted Mitnick and sat next to him. For the next hour, the two students watched the instructor, occasionally leaning over to whisper to one another. At 8:00 p.m., both Mitnick and DiCicco bolted from their chairs and beat the rest of the students to the adjacent lab. The officer sat nearby and watched as Mitnick began helping his stumped peers with their assignments. DiCicco got into a conversation with Schleppenbach and, by way of explaining his thorough knowledge of VMS, the operat ing system for Digital's VAX computers, told him that he worked at TRW on a VMS system. Kurtz left a few minutes before class was to be dismissed and waited outside the building for Mitnick and DiCicco to appear. At 9:45 p.m., Mitnick came out and began to walk the perimeter of the computer science building. Kurtz climbed onto a roof and watched as Mitnick reentered the building. About three minutes later, Mitnick and DiCicco emerged together. Kurtz hopped from roof to roof of adjoin ing buildings. He scrambled down in time to see DiCicco get into his small brown Toyota and drive away. Mitnick drove in his car from a separate exit. Black and his partner picked up the surveillance from there. They followed Mitnick's black Nissan Pulsar as it traveled a seven-mile stretch of the western edge of the San Fernando Valley. By the time Mitnick reached a smaller, winding road in Calabasas, the detectives noticed that he seemed to be following another car. Both cars turned into a parking structure beneath a Home Federal Savings and Loan building. The cars parked out of sight, but Black saw Mitnick walk toward the front. He looked up and saw a light go on in a second-story office. A man with dark hair stood in front of the window. The light went out. 98 a CYBERPUNK The officers left just before midnight, making a quick swing through the parking area. The Toyota and the Nissan were the only cars there. For the next month, Black and his partner continued the surveillance. On occasion the two detectives had help from the department's Special Investigative Section, or SIS, which carried out most of the sophisti cated surveillance needed by the L.A. Police Department. Officers in SIS usually busied themselves with violent criminals, and although these two suspects posed no physical threat, SIS was needed to carry out the fine art of successful tailing. With ten to twelve men, two to each unmarked car—Camaros, Volkswagen bugs, and pickup trucks—the of ficers carried out a tag-team approach to its surveillance. As one car peeled off, another picked up, sometimes accelerating to one hundred miles per hour to catch up to the suspects, but always staying at least a couple of blocks behind them. The two suspected software pirates stuck to something of a routine. After leaving the campus on Tuesday and Wednesday nights at about 10:00 p.m., they would drive to the Calabasas office building. They frequently stopped along the way at a Fatburger, an L.A. fast-food chain famous for its tacky decor and gigantic burgers. This Fatburger outlet was squeezed into an L-shaped pink-stucco minimall between a 7-Eleven and a taco restaurant. The two would emerge from Fat burger laden with bags. Judging from the sheer volume of food the two carried upstairs, Black figured they were packing in for a long night. It would have come as a surprise to the two police officers to learn that Mitnick was supposed to be on a strict diet. As far as his wife, Bonnie, knew, her husband subsisted on a low-calorie menu consisting of oatmeal for breakfast, two ounces of turkey for lunch, and a salad for dinner. It was a sensible diet for someone with heart palpitations who frequently checked himself into nearby emergency rooms with chest pains and kept a drawer at home filled with medical insurance claims. Not surprisingly, the regular pit stops at Fatburger had been the downfall of many Mitnick diet plans. Computers and eating went together for Kevin, which was one reason he never managed to fall below 240 pounds for very long. The two police officers got permission to use a residential driveway across the street. They tucked their car as far back in the driveway as they could while still keeping a clear view of the insurance office. Occa sionally, one of the suspects would venture outside, look to his left and right as if preparing to cross the street, then slip back inside. The vigils livened up on the occasions that Mitnick came outside, crossed the KW: 1U bnJc-SUt H*clu* T 99 street, walked a few paces to the Hotel Country Inn and began using the pay phone in the lobby. Mitnick's pay phone sessions would last about twenty minutes. Whatever DiCicco was doing inside seemed to be re lated to Mitnick's time on the pay phone: DiCicco would walk to the landing outside the office and peer down the street toward the hotel. One of the more difficult things to establish was just what office door of the Calabasas building the two suspects were entering. The manager of the Home Federal Savings and Loan branch told Black that neither Mitnick nor DiCicco worked at the bank. There were at least a half dozen other businesses that rented space there. Two members of the surveillance team were dispatched to the roof of the building, where they lay until they figured out that it was the door to suite 101, the offices of a company called VPA, which stood for Voluntary Plan Administrators. When Black did some research into VPA, he found that it was a company that administered disability programs for larger companies. The company used a Micro VAX computer made by Digital Equipment. But notifying VPA that it might have computer criminals in its midst was out of the question. Black didn't know if the company was involved with whatever Mitnick and DiCicco were doing. On March 17, when Black's partner got to work, he received a frantic phone call from Pete Schleppenbach, the Pierce teacher, who wanted to report a bizarre and annoying incident. Five hours earlier, at 3:00 a.m., Schleppenbach had been awakened by a telephone call from a man identifying himself as Bob Bright, an officer with campus security. The officer told the bleary-eyed Schleppenbach that he had just appre hended two male suspects who had been caught wheeling heavy equip ment out of the computer science lab. He described one as tall and slender, the other as shorter and fat. "That's Mitnick and DiCicco," Schleppenbach said. "You've really hit the jackpot with these guys." Schleppenbach said he would come right over. The officer told Schlep penbach that that was a good idea, and that he had just put in a similar call to two other Pierce officials who were also on their way. When Schleppenbach and two other Pierce faculty members arrived at the campus security office, there was no one in sight but one lonely security guard, who said it had been an uneventful evening. There had been no burglary and he had no colleague named Bob Bright. It was a mean and childish trick, but for Lenny and Kevin it had served a useful purpose: now they knew they were being investigated. There wasn't much the police could do except log a mischievous phone call. It was clear that Mitnick and DiCicco weren't going to make J 00 a CYBERPUNK this easy. Black and his partner gathered as much background as they could on the two pranksters. DiCicco, at least, appeared to have a fulltime job at VPA, as his car would usually stay parked in the garage beneath the building all day. Mitnick, it appeared, was unemployed. In March, Black got a disturbing tip. Someone from inside the police department had heard that Kevin Mitnick was getting ready to start a job in computer security at Security Pacific Bank. A T A For anyone with Kevin's record, the Security Pacific job should have been out of the question. When he applied in early March for the opening as an electronic funds transfer consultant in the bank's audit department, he knew the chances of getting it were remote. His reputa tion as a computer criminal was more difficult to shake loose than he had thought it would be. A few months earlier, he had taken a job at GTE as a COBOL programmer. He had worked there for only a week before the security department checked his background. A security offi cer then approached him one day, escorted him to his car and waited to see that he left the premises. It was a humiliating episode. Most of his other jobs had opened for him through family connections. Had the bank managers at Security Pacific known that a computer criminal would be in constant contact with the computer system that executed, moni tored and logged hundreds of millions of dollars of transactions every day, they would have been aghast. Kevin diligently completed the job application. For the standard query, "Have you every been convicted of or are you pending trial for a criminal offense?" he placed a small, bold check next to "No." An unusual collection of references included Donald Wilson, his former employer at National GSC; Arnold Fromin, owner of Fromin's Delica tessen and his mother's boyfriend; and Roscoe. Then, in a surprising concession to the cloak of secrecy he had maintained for the past three years about his time as a fugitive, Kevin tipped his hand. Perhaps to boost his otherwise anemic educational background, he noted on the application that in the winter and spring of 1985, just when the police had him on a kibbutz in Israel, he was a student at Butte College, a twoyear community college in Oroville, a small town in Northern California about 250 miles northeast of San Francisco. Kevin had apparently re mained anonymous by enrolling under an assumed name. Kevin told Lenny that if he got the job at Security Pacific, he would stop breaking into computers for good. And it seemed that he might get KW; Ik Dtok-$Ut H*dciA T WI the job. With a little embellishment here and there, on paper Kevin didn't look at all bad. He listed his job at National GSC, where he had spent so much time on the telephone, as programmer/analyst. At Fro min's Delicatessen, where his primary job was that of a delivery man with a little computer work on the side, he was also a programmer/ analyst. Both businesses were owned by friends of the family who could be expected to give good references. When he received the letter from the bank's personnel office confirm ing an annual salary of $34,000, Kevin was ecstatic. His first day of work, the letter informed him, would be March 25, when he was to report to the training center downtown for an orientation. The last paragraph of the letter was boilerplate: "As discussed, your employment is contingent upon satisfactory reference checks." When Bonnie got home from work, a smiling Kevin told her he had been offered the job. They went out to dinner to celebrate. Black got the tip about Mitnick's new job on March 23. He called the bank's security department immediately. The next day, Black got a call from Peter Kiefer, a Security Pacific vice-president. Yes, he told Black, the bank had just offered Mitnick a job in its electronic funds transfer section. Mitnick was to start work the following day. Late that afternoon, Kiefer and a colleague named Barry Himel ar rived at police headquarters to talk with Black. They presented Black with Mitnick's application and his list of references. They also showed him an article that had been clipped from the Los Angeles Times, dating back seven years to 1981 and telling of three young men, a Kevin Mit nick among them, who had been arrested for stealing manuals from Pacific Bell's downtown computer center in order to wreak havoc on the telephone company and its computer systems. The story had been brought to their attention by a bank employee who knew of Mitnick from his involvement in amateur radio. The worried executives asked Black if this happened to be the same Kevin Mitnick who was about to start work as a security consultant at Security Pacific. By that point, Black's confirmation was hardly necessary. The two security officers had already established a strong link: as one of his references, Kevin Mitnick had listed the true name of Roscoe, one of the three arrested in 1981 for breaking into the Pacific Bell COSMOS center. It was an awkward situation, to be sure. A decade earlier, Security Pacific had been the victim of a historic heist. The thief, Stanley Rifkin, a plump and soft-spoken thirty-two-year-old computer expert, had worked there as a computer security consultant and walked away one J02 a CYBERPUNK afternoon with the day's code for the bank's electronic funds transfer system. Later that same day, Rifkin phoned the wire transfer room and, using a fictitious name, said he was with the bank's international divi sion. He rattled off a few security codes and his $10 million withdrawal sailed through. Rifkin was eventually caught, but the bad publicity sur rounding the bank's security system had stuck with the bank over the years. No one wanted a repeat performance. When Barry Himel called Black the following day, he said Mitnick had been informed in person that the employment offer had been with drawn. Mitnick's response, Himel reported, was simply to smile. There was a pause, then Himel asked: Did Jim Black think Mitnick was the type of person to seek revenge in any way? If he were to seek revenge, Black answered, it would most likely be through his knowledge of com puters and telecommunications. Two weeks later, Black got another call from Himel. He told Black that one of the officers of the bank had just had a call from a news service in San Francisco seeking confirmation and more details about a press release from Security Pacific that had come over the wire earlier that day. The release stated that for the first quarter of 1988, Security Pacific was going to show an earnings loss of $400 million. The only clue Himel had that the release was a forgery was the absence of a customary signoff identifying the source of the story. Of course, Himel told Black, the story was completely false. Apprised of the fraudulent press release, the bank's corporate officers were horrified. The potential damage to the bank if such a release got into the newspapers was incalculable. In plunging stock value and account closures alone, it could exceed the $400 million reported in the fictitious press release. Fortunately, the hoax was stopped in time. Again, Himel paused. Could this egregious act possibly have been committed by Mitnick? It was possible, Black replied, but he couldn't verify it. Nobody ever could. Computer crime cases were notoriously difficult to investigate, and that was part of the appeal for Black. The little evidence that could be gathered was difficult to tie directly to a suspect. Companies and univer sities whose computers had uninvited nocturnal visitors could produce dozens of pages of computer printouts covered with blatant evidence of the intrusion, but they didn't necessarily add up to much in the way of evidence. Telephone traps were useful only as far as they went: intruders such as Mitnick who had started out as phone phreaks were expert at covering their tracks. When someone like Mitnick got into a telephone company computerized switch, he could treat the vast telephone net- KW; 1U b**k-$Ut fM** t j 03 work like a series of disappearing stepping-stones, manipulating the ma chines to create fictitious billing numbers and forward calls to nonexistent telephones. Black saw computer crime as the ultimate challenge. Not only was the technology interesting, but he enjoyed thinking about a computer criminal's mind-set. Computer criminals hardly fit the common profile of an outlaw. The old investigator's axiom, "We catch only the dumb ones," seemed to break down when it came to computer crime. There were no dumb ones. More often, they were caught because a friend or an associate snitched. Black believed that Mitnick and his circle had been snitching on one another for years, stretching all the way back to the COSMOS incident, but the original gang Mitnick was involved with appeared to have long since split up. Susan Thunder hadn't surfaced for a few years. After a prostitution arrest in 1982, followed by a bizarre incident in 1984 in which she and a friend tried to spring their friend Steven Rhoades from jail by impersonating a deputy district attorney, Susan had apparently given up her computer security consulting in favor of beating the odds at professional poker. Both Roscoe and Rhoades seemed to have gone straight by this time, and as far as Black could tell, neither of them was involved in this incident. Black had never worked directly on a case involving Mitnick before, but Mitnick appeared to be one of the few old phone phreaks, perhaps the only one, who had kept his skills honed. From experience, Black knew that this was a case that would require a lot of close cooperation from Pacific Bell and Digital Equipment. Not only was Pierce College using Digital equipment, but this VPA outfit was as well. Black had little doubt that Mitnick had devoted hundreds of hours to refining his talents on Digital computers. Black knew that Mitnick's technical ability far exceeded that of most investigators, especially those unschooled in the subtle art of exploring computer crime. The Santa Cruz Operation incident was a case in point. Black and his colleagues had been stunned to hear of the careless way in which the Santa Cruz police detectives had conducted the search of Vitello's apartment. Why hadn't anyone told them not to take the phone off the hook? Now that Black knew where the two suspects were working from, he asked Pacific Bell to put a dialed number recorder on the VPA phone to register outgoing calls. After eleven days of bureaucracy bashing, Black was able to get the tap. It yielded a number of surprising calls: several to nonworking, unassigned phone numbers; others made to the MCI local W4 a cmmiNic access using pirated authorization codes. Among the most interesting calls were those made to a New Jersey Bell COSMOS computer similar to the one Mitnick had been caught breaking into at Pacific Bell seven years earlier. There was also a call to a New York City-based subsidiary of Security Pacific. Called Precision Business Systems, this company managed data communications for the West Coast bank. The FBI's New York office had recently been investigating a possible wire theft case involving Security Pacific: in early April someone had attempted to get into the bank's secured data communications lines. Although Black thought he had enough evidence from the Pierce incident to nail Mitnick and DiCicco on computer fraud charges, he kept holding out for more. While intriguing, the Precision Business Systems lead was still too sketchy. Black wanted enough evidence to warrant a substantial prison sentence and he hoped to get it from the VPA surveillance. But in late summer, another case forced him to put the investigation on hold and end the surveillance temporarily. In the meantime, Pierce College had brought its own case against Mitnick and DiCicco. The college held a disciplinary hearing for which the two suspects put together their own defense, exhibiting enough legal acumen to draw the hearing out to an exhausting twenty-one hours. When Black set aside the criminal case, they were appealing their ex pulsion. It had been a frustrating exercise for Black. These investigations hinged on the close cooperation of law-enforcement agencies and com mercial institutions working together against a common foe. The detec tive had hoped for instant help from both Pacific Bell and Digital Equipment. Instead, Pacific Bell's bureaucracy had stonewalled his ef forts. And although he had received immediate help from the local Digital office, Black couldn't seem to get the attention of security people at headquarters in Massachusetts. He hadn't been able to trace any of Mitnick and DiCicco's outgoing calls to a major computer system. Still, he was sure that somewhere out there a computer system admin istrator was having Black's problem in reverse, wondering who the invader could be. A T A When Lenny began his job at Voluntary Plan Administrators in May of 1987, Kevin had no reason to visit: there were no modems. And even though Lenny kept the news from Kevin when the company bought modems that summer, Kevin somehow figured it out. Just as a well-fed KW; 1U M-&U HacU* t j 05 cat learns to run to the kitchen at the sound of a can opener, Kevin started showing up regularly at VPA. The company, it turned out, was an ideal place from which to practice his craft. As one of the principal computer operators there, Lenny had the run of the place once everyone had left for the day. But things were beginning to sour between them. Lenny knew Kevin's capacity for threatening people. He had already threatened to turn Lenny in for creating the fraudulent identity that got Lenny the flower delivery job. But there was more to it. It was also a classic form oifolie a deux: Kevin could appeal to criminal aspects of Lenny's nature that might have remained unrealized if the two had never met. Also, in Lenny Kevin found someone with the flashes of intuition that Kevin lacked and that were so necessary for their work. Lenny too had become addicted to the excitement of breaking in to computers. Kevin had stolen, or at least tried to steal, software in the past. Now he had a major project in mind: the acquisition of Digital Equipment's most important software, the latest version of the company's VMS op erating system. Lenny became project assistant. They started out from VPA in a low-key fashion. The first thing they established was a way into the Arpanet, the vast research and military computer network. The duo found an account at Patuxent Naval Air Station in Maryland. For a few months in the summer of 1988, Kevin and Lenny used the Patuxent computer as a convenient storage locker for the software they were stealing electronically. When system managers at Patuxent noticed something was going on and closed the electronic doors, the two looked for another place to stash their data. They found it a few weeks later, when they sneaked back into USC's computers. A T A Mark Brown noticed immediately that someone was in the system. Ex cept for the highly publicized degrees-for-sale incident three years earlier in 1985, nothing very damaging had happened to the USC computer system in the past few years. Brown was now manager of research and development for USC's computing services, and he had all but forgotten about the two teenagers who had so boldly waltzed onto campus and broken into the system six years earlier. But now, someone was dialing into the USC system from off campus. Having found a bug in the system program, the intruder was able to modify the VMS operating system subprogram that acted as the com puter's gatekeeper. Brown had to admit the trespasser was extremely 106 a CYBERPUNK clever. Somehow, the electronic interloper had altered the program that supervised user log-ins so that every time someone logged in to the computer, a copy of the password was slightly jumbled and stored in an innocuously named place inside a file. And he had altered the program so it left open a "back door" that allowed him to return any time to harvest passwords. But there was a flaw. In trying to cover his tracks at the same time that he was installing his rogue code in the system, the thief occasionally crashed some of the USC computers accidentally. Users around the campus, of course, simply assumed that the system had crashed. It was the sort of annoyance that users expected from time to time. But Brown could tell that these crashes were connected to the break-in. From what he could gather, he had fallen victim to the infamous West German Chaos Computer Club, which had achieved international notoriety that fall after claiming responsibility for a summer of poking around inside NASA's SPAN computer network, an international web of computers used by scientists for space and physics research. The Chaos Computer Club had attacked the NASA VAX computers using the very same software trick. They called their program "the loginout patch." Who ever was breaking into USC wasn't just installing the loginout patch, but was using the school's computer as a launchpad to break into other computers on the Arpanet. That was precisely what Chaos had done on the SPAN network. And since most of the activity seemed to occur in the late afternoon and early evening, it made sense that West German troublemakers would be at work late into the night from Hamburg or Hannover or Berlin, or wherever they lived. A second odd occurrence left Brown even more concerned. Soon after the break-ins started, he noticed that disk space was disappearing from a USC computer with thousands of user accounts dedicated to coursework in physics and chemistry. Huge chunks of storage capacity, forty mega bytes at a time—the equivalent of dozens of textbooks—were being eaten up with no corresponding files to account for the missing space. After a few days of pulling apart the operating system in a hunt for the source of the mysterious problem, Brown finally figured out that the intruder was creating files and disguising them as system index files, which are directories that describe other files—the last place anyone would think to look. When Brown opened the files to examine them, he was amazed. Someone was salting away the source code—closely guarded original programs—for Digital Equipment's proprietary VMS operating system. Km*: 1U M-tUt H**U* t j 07 Brown didn't want simply to lock out a trespasser who had entered privileged accounts and seemed to know the operating system. There was no telling what might happen if USC locked him out. It might make him angry enough to find his way in again and start doing some real damage—deleting files or crashing systems. Software designers write source code in what are called high-level languages. A translator, known as a compiler, then converts the highlevel code to binary form—ones and zeroes that can be understood by a digital computer but are difficult for humans to decipher. Computer companies guard their "human readable" source-code files as if they were the crown jewels. Only the binary code, which cannot easily be under stood or modified, is distributed to customers. In this, computer compa nies are like a master chef who serves a six-course meal without giving away the recipe. A competitor can easily copy a computer's hardware, but recreating the operating system that runs on that computer is a far more difficult and expensive undertaking. Companies guard their source code not only because they're worried about competition, but also be cause access to source code makes it easier for a saboteur to open a secret back door into the computer, known as a Trojan horse. A Trojan horse is a seemingly innocent program planted inside a computer that is de signed for a special purpose, such as capturing passwords or even destroy ing data. It is often difficult to tell that a change has been made. Access to source code can make the planning and execution of Trojan horses easier. The thief was stealing Digital's lifeblood, millions of lines of software that run on most of the VAX computers in the world, and electronically stashing it in the USC computers. Furthermore, whoever was doing this wasn't just taking any old VMS code; he was copying the very latest version, called VMS Version 5.0. And the only place from which he could have been lifting this software was a group of development com puters at Digital's laboratory in New Hampshire. Version 5.0 was so new that Digital customers themselves didn't have it yet and would even tually get only parts of it on microfiche. Perhaps the intruder had man aged to break into Easynet, Digital's internal network, which connected tens of thousands of Digital computers around the world. From Easynet, the interloper must have found a gateway to the USC machine on an academic network. Brown guessed that this thief was keeping his loot on ice at USC because he didn't have enough storage capacity of his own or he didn't want to be caught with the stolen goods. Every time the pilferer logged J 08 a CYBERPUNK out, Brown opened the files to see what was in them. He watched in amazement as Digital's trade secrets scrolled by on the screen. Within just a few weeks, many megabytes of disk space had been consumed in the process of stashing stolen material in the illicit treasure chest. But when Brown called Digital's security department about the theft taking place seemingly under the company's nose, he was surprised again, this time by the lukewarm reception he received. He could un derstand that the world's second-largest computer manufacturer, with tens of thousands of customers around the world, including a growing number of banks and government agencies, wouldn't be eager to have it widely known that some thief was breaking into its computers and mak ing off with its most prized software. After all, what did that say about the safety of information stored on the customers' computers? But Brown wanted to stop this thief and assumed Digital would rush to offer its full support. He was hoping that the company would arm him with some high-tech monitoring technology that would enable him to peek elec tronically over the invader's shoulder while he was in the act of burying his plunder. He had heard that Digital had special programs that allowed a system operator secretly to watch people who were on the system in real time—that is, while they typed. When he called the local Digital office, he explained the situation. "Look, we've got this guy breaking in here," Brown said, "and it's pretty big time. He's got some of your sources." Brown asked if he could get one of the company's monitoring programs. He was told to wait for a return call. The call came from Chuck Bushey, the chief security investigator at Digital headquarters in Massa chusetts. But instead of offering to send a team out to Los Angeles to investigate the situation, Bushey asked for an account on the USC system so that his experts could look things over themselves. He prom ised he would send Brown the monitoring programs he was asking for. But the software never came. From that point forward, Brown felt that the matter had drifted out of his hands. Digital didn't seem exactly to be denying that someone had penetrated the very core of the company, but the company wouldn't acknowledge, to Brown anyway, the gravity of the situation. From his conversation with Bushey, Brown got the impression that Digital was somehow trying to brush the matter off. It was like dealing with the Pentagon. Brown surmised that while the security people appeared phlegmatic, software engineers back in Massachusetts were madly scamp ering to plug their security holes. KW; 1U Dmjl-&U \\AckA, t j 09 The Digital security experts seemed much more concerned with the lax security all over Easynet—it wasn't called Easynet for nothing— than with the fact that the company's source code was being stolen. Brown could have built his own VMS monitor, a program for watching the intruder's keystrokes while he was on the USC system, but it would have been time-consuming and tricky. VMS was an esoteric, user-un friendly operating system; it wasn't built for customers who liked to tinker under the hood. It was built for large commercial and scientific customers who were content never to touch it because they expected Digital to handle their problems. So after a handful of unsatisfying encounters with the people in Mas sachusetts, Brown threw up his hands and decided to let the intruder keep his millions of characters of disk space and have at it. After all, he didn't seem to be hurting anything on the USC computer. And although this was a lot of space to be giving to some uninvited guest, it wasn't more than an engineering graduate student might use up in one night. All he could do, Brown decided, was to keep careful logs of what he was able to see. The intruder became bolder. He was beginning to use the USC system as a way into other computers more frequently. So Brown shut down access to his privileged accounts on the system. And no sooner had he done that than the Brian Reid hoax happened. Chris Ho, who worked with Mark Brown at USC, got a telephone call one afternoon in August from someone who identified himself as "Brian Reid from Stanford." "We're having a break-in here, and it looks like he's coming from USC," said the caller. "We need a privileged account on your system so we can track him down." "Sure," Ho replied. "Just give me a number where I can call you back and we'll set it up." "I'm not in my office right now." "Oh, then give me a time when I can reach you and I'll call you back then." "I'll have to get back to you." With that, the caller hung up. Chris Ho was more than a little skeptical of the call he had just received. He called Stanford at once to check on Brian Reid, a Stanford computer science professor. A secretary in the computer science depart ment told him that Reid had left Stanford to work at Digital, in the company's Western Research Lab in Palo Alto. Ho's suspicion con firmed, his curiosity led him to follow through. He called the Digital J JO a CYBERPUNK office in Palo Alto, and after several days of leaving messages and im ploring secretaries to get Reid to the telephone, he finally succeeded. Reid needed to utter no more than two words for Ho to detect the difference between Reid and the impostor. Where the timbre of Reid's voice was deep and resonant, the earlier caller had spoken in a much higher pitch, as if each word got trapped in his larynx before escaping from his mouth. No, Reid assured the anxious USC worker, he had not called Chris Ho, and yes, he had been aware of the break-ins at Digital for months. After the phone hoax drew new attention to USC's plight, coopera tion from Digital improved considerably. In October, Bushey flew out to Los Angeles and met with Brown and Ho. But Bushey seemed interested only in logging the intruder's every move. And Brown knew what that would mean: late-night vigils for the next two months, or until whoever was using USC as an electronic warehouse was caught. He wasn't exactly eager to lose weeks of sleep to help Digital, but he agreed to keep a watchful eye on the situation. A T A Lenny had always enjoyed the aspect of traveling through computer systems that made him feel like a fearless explorer. He liked the idea of having computers throughout the world at his fingertips. The most ex citing thing about playing around on the Arpanet military network hadn't been so much the information it contained; it was the act of roving itself. Lenny's hacking may have kept him cooped up for days at a time in the VPA office, or in the Hiway Host Motor Inn, but at the same time it broadened his world far beyond the San Fernando Valley. The Arpanet was the granddaddy of all computer networks. Started with United States military research funding in the late 1960s, the network had served as the technology testing ground for the commercial computer networks such as Tymnet and Telenet that were to follow. The Arpanet originally linked universities with corporate and military research facilities. By 1988 the Arpanet had largely been subsumed in a growing thicket of commercial, academic, scientific, government and military networks known collectively as the Internet. The Internet joined individual networks together via computerized gateways so that it was possible to travel electronically almost anywhere in the industrialized world. With the advent of computer networks, the traditional sense of geo graphic space as it was known to explorers of earlier times was becoming KW: 1UM-SU*y«k* t in obsolete. It had been replaced by a different notion, the idea of cyber space. Traveling from a computer in suburban Los Angeles to a computer in Singapore was a matter of typing one command on a keyboard. It happened instantly. In fact, distance on the Internet was so transparent that a computer located in Southeast Asia would appear no different than a computer in the next building or in the next county. They would merely be different numbers on a computer host table, a listing of com puters on a network. As it happened, Kevin and Lenny's favorite computer manufacturer was also a pioneer in computer networking. At Digital, networking really meant remote computing—the freedom to move work around the net work from one computer to another. The company also tried to make it easy for an engineer in Massachusetts to work on a set of data in Califor nia. Networking among Digital computers was built around simplicity, uniformity and ease of use. . In 1984, Digital built its own internal corporate network, the Easynet. Eventually the Easynet would connect thirty-four thousand Digital com puters in more than twenty-five nations, giving direct access to nearly two-thirds of the company's 120,000 employees. Easynet has made Dig ital the world's best-networked corporation. Engineers in Germany, Japan and the United States share design work and rally support for project proposals. Employees also send messages directly to Digital pres ident Ken Olsen. So it wasn't surprising that Easynet became a favorite playground for Kevin and Lenny. Since it was strictly a VMS system, as opposed to the UNIX-heavy Internet, Easynet spoke their language. And for two young network explorers with an eye toward procuring Digital's proprietary software, Easynet was the perfect transportation me dium. Once they were on one computer in the network, they could connect to any other. When Kevin and Lenny penetrated Easynet, Lenny was as excited as he had ever been. Later, Lenny would say that his breaking into com puters with Kevin was "like we were boldly going where no hackers had gone before." But to Kevin "it was just a task, like coming to work every day, just to get the job done." While Lenny seemed content to scamper from one computer on the Easynet to another like a puppy, sniffing at each new one, Kevin considered their computer system cracking a seri ous endeavor with a series of discrete goals. In fact, for as long as Lenny could remember, Kevin had always approached his illicit computing as a serious project. When he sought revenge on someone, it was if he were taking on an assignment from some invisible employer. Once an assign- 112 a CYBERPUNK ment was complete, he reported back to Lenny or Roscoe with news of his triumph. As early as 1981, Kevin would call Roscoe to report the results of a frontal assault on the telephone service of someone he was out to harass. Kevin's project for 1988 was downloading Digital's VMS source code. It wasn't so that he could make pirate copies and sell them. Rather, it was both the challenge of the hack itself and his intellectual curiosity about such a complex and advanced program. Kevin's heavy phone use had just gotten him fired from a small firm near Thousand Oaks that made electronic testing equipment. He was sleeping until at least 11:00 every morning and would usually put in his first call to Lenny around noon. Around 3:00 in the afternoon, Kevin would instruct him to get started with a particular task. Then, at about 7:00, on the days they didn't have class at Pierce, Kevin would show up at VPA, and after dinner they would return for a night of network exploring. As the night wore on, Kevin's pocket pager sounded every hour. It was Bonnie, wondering where her husband was. He lied and said he was taking an evening class at UCLA. Kevin's lack of account ability to his wife didn't seem to matter to him. One of the first orders of business on these evenings was to go into a large telephone wiring closet on the ground floor of the building and connect VPA's modem line to another tenant's phone. To someone checking toll records, it then seemed that calls were coming from an other business. By now, Kevin had refined this technique, prompted in part by his increasing knowledge of how the police and telephone secu rity forces worked, and by a growing paranoia. He regularly checked to make certain there were no dialed number recorders on the line he was using. And to be extra safe, Kevin and Lenny looked for an untraceable way to make long-distance calls. Like many other hackers and phone phreaks, they frequently used illegal MCI calling card numbers. Most phreaks would "scan" for them—that is, they would program their com puters to have their modems keep dialing a local MCI port and enter different codes until a successful code was found. Purloined codes were traded on electronic bulletin boards or "code lines," toll-free voice-mail numbers that had been discovered by hackers and modified to dispense pirated calling card numbers. But Kevin, in his inimitable way, had perfected a method for obtaining telephone credit card numbers with great efficiency. He later told the FBI that he had obtained the password for the network security account on MCI's electronic mail system from an electronic bulletin board. But Lenny knew that Kevin had talked someone out of the password, using his excellent social engineering skills. Once logged on to the MCI network security account, Kevin and Lenny were privy to confidential information about new accounts, stolen accounts and accounts that were in a state of limbo until MCI actually discontinued them. They could also read electronic messages concerning security breaches. It was a fertile field from which to harvest account numbers, as well as an early warning system to subvert the security types. Kevin guarded the MCI network security account from Lenny as if he were in possession of the Hope Diamond. "This is something I could make money with," he would tell him. Slipping into Digital's Easynet was a little like discovering the mother lode. All of the company's private discussions were carried out over the worldwide network. Using relatively standard tricks, Kevin and Lenny collected passwords. For instance, when a machine is first set up, there are a few preestablished accounts with preset passwords for the conve nience of Digital's field service people. Each such password gives access to that account's electronic mail. Once Kevin and Lenny had found these passwords, they used Kevin's gift for intuiting how organizations functioned and who was important in an organization. An untrained but instinctively expert social scientist, Kevin could look at patterns of com munication in stored electronic mail and figure out who had power and who had valuable information. In that way, they found the mail that was worthy of their attention. Andy Goldstein's mail was by far the most informative. Goldstein was regarded by many as the most brilliant technical expert in the VMS engineering ranks. He was also a VMS security expert. As a result, most messages about VMS security problems eventually ended up in Gold stein's mailbox. One of his correspondents was Neill Clift, a researcher at Leeds University in England. From what Lenny and Kevin could tell, VMS security was a hobby of Clift's; he seemed to spend hours plumbing the depths of operating system arcana in search of security flaws. Clift was a prolific electronic correspondent. Most of his messages to Gold stein concerned problems with VMS security. And every time he de scribed a new flaw to Goldstein, Kevin and Lenny drank in every word. It was while snooping through Andy Goldstein's electronic mail that Kevin and Lenny found the infamous Chaos Computer Club loginout patch. From what Kevin and Lenny could decipher from the mail to Goldstein, it seemed that someone in Europe had broken into a Euro pean institution using the Chaos patch. The victimized company had 114 a CYBERPUNK made a copy of its entire system and sent it to Digital to analyze. Gold stein, it appeared, had analyzed the program, extracted the portion con taining the rogue code and reverse-engineered what the Chaos Club had inserted. After stealing Goldstein's analysis from his mailbox, Lenny and Kevin puzzled for days over the unexpected prize that had landed in their hands. From what they could tell, someone from Chaos had changed loginout, the program for logging in and out of the computer. Chaos had modified, or patched, the program so that each time a password was entered a copy of the password was sent to a spot in a remote corner of the system, where it sat unnoticed until someone came to retrieve it. Lenny and Kevin couldn't believe their luck. A program to steal any VMS password, courtesy of Digital! Not only was the loginout patch small and smooth, but it had an added feature that made the user's presence difficult for the system to detect. To further confound Digital's computer security experts, the loginout patch had been written in such a way that it successfully eluded ordinary techniques to detect software that has been tampered with. Thus no standard computer security alarms were set off by the program when the patch modified the computer's operating system. A system operator would never realize something was amiss. In fact, the patch was written so well that Digital officials had little notion that their machines had been so thoroughly compromised. Kevin and Lenny were delighted by this bit of serendipitous international cooperation. More than that, they were in awe of the Chaos Club for its ingenious hack. They had been calling themselves "the Best," but now that they had seen this, they amended their epithet to "the Best in the West." So USC's Mark Brown had been right after all. However, it wasn't the work of the Chaos Club itself he was seeing, but that of a pair of the club's admirers who had discovered and were using one of the club's cleverest hacks. The Chaos Club's famous hack into NASA's worldwide SPAN com puter network in the summer of 1987 had been a public-relations calam ity, both for NASA and for Digital, whose computers were the foundation of the SPAN network. For months, members of the Chaos Club had foraged through hundreds of computers on SPAN. By exploit ing an embarrassingly obvious hole in VMS, the cocky group of young computer anarchists had first broken in to the CERN physics laboratory in Switzerland, then electronically hopped over the Atlantic to Fermilab in Illinois, and continued on to hundreds of computers on SPAN. When the incident first surfaced after Chaos held a press conference to an- Ke**:lkM'$UtH*«tu+ ▼ 115 nounce its accomplishments, it revived some concerns that were first expressed following the 1983 release of the movie WarGames. The film, which depicted a teenager who played havoc with a North American Air Defense Command computer, roused widespread speculation that bright kids could somehow compromise U.S. national security. In what seemed to be a similar situation, the infiltration of SPAN by Chaos implied to the public that SPAN was a sensitive military network. This proved not to be the case; nevertheless, it was more than an embarrass ing incident for NASA and for Digital. The company suffered a corpo rate black eye. Nothing like this had ever happened to computers made by International Business Machines, Digital's principal competitor. Digital could ill afford bad publicity. The company was under fierce competitive pressure, moving thousands of employees from assembly lines and corporate offices into the sales force in an effort to slash costs and boost sales. For nearly a decade Digital's strength had been its sturdy, steady seller, the VAX, a potent force against IBM. But by 1988, the pace of technology was forcing Digital to seek out new markets while continuing to satisfy its traditional customers. Digital was locked into a race, scrambling to bring out new products and rebuild the VAX line. The computer industry was no longer growing exponentially, particularly in the minicomputer business that Digital had long dominated. Instead, the markets for personal computers and workstations were still expand ing, but the company had stumbled badly in the PC business. To get back on course, Digital was going to have to go after a more commercial market than it had served in the past. Financial institutions were a new major target and they would hardly tolerate potential flaws in the security of the machines they were buying. So the company remained as quiet as possible about the NASA incident. It patched the loopholes and tried to tighten security. As it turned out, its efforts were less than successful. The loginout patch was written so cleanly that Lenny and Kevin had to modify it only slightly to install it on the newer version of VMS used in the United States. Once they had done that, they were ready to insert their new Trojan horse. In the ensuing months it was to become their most valuable electronic crowbar. Kevin and Lenny dubbed it their "super-duper password scooper." A T A But even before Lenny and Kevin discovered the loginout patch, they had used Kevin's wiles to get access to the company's VMS development cluster. 116 a CYBERPUNK Digital's largest software development facility is a complex of buildings in Nashua, New Hampshire. Three of the Nashua buildings are at 110 Spitbrook Road and are code-named ZKOl, ZK02, and ZK03. The ZKO complex is the software capital of the company. It employs about two thousand people—more than half of them programmers—and has more than three thousand computers on-site, thirty of them mainframes. There is a heliport outside that employees can use to travel to other major Digital facilities or to Boston's Logan Airport. ZKO is set in the middle of a stand of hardwoods, near a pond. It's at least a quarter of a mile to walk indoors all the way from one end of the complex to the other, and as you walk down the hall you look out at landscape that probably hasn't changed much since the days of the American Revolu tion. It's an intriguing mixture of moods, and the floor-to-ceiling win dows along the hallways manage to blur the boundary between modern high-tech and hardwood forest. Managing three thousand of anything can be tricky. People who man age large collections of computers typically organize them into groups, and into groups of groups. Fred Brooks, the chief designer of IBM's OS/ 360 operating system, made a shrewd observation some time ago: the structure of a computer system almost always mirrors the structure of the human organization that created it. As a result, the VMS computers in Digital are largely organized into groups that correspond to the manage ment structure: people who work together cluster their computers to gether under a single administration. However, technical peers work across the grain of the organization and often give one another privileges on their own machines. . The Star development cluster of VAXes in the ZKO complex was where all of Digital's VMS development work took place. Late one night, soon after Lenny started at VPA, Kevin stationed Lenny at VPA and, from a pay phone, called a graveyard-shift operator in the Star control room. Posing as a technician in the field, Kevin had her walk over to the console and type in a single command that seemed harmless enough to someone without an intimate knowledge of VMS. Without hesitation, she logged in to the computer, thereby spawning a new process. A dollar-sign prompt appeared on Lenny's screen, the signal that he could now type in the privileged commands reserved for a Digital operator. But the full import of where Kevin and Lenny had landed eluded them at first. Kevin wasn't so interested in hanging around to check out the development cluster. It looked a lot like any other VAX system. Instead, once they were in, Kevin invoked his personal battle K W : T & D m M ^ W * ^ * ▼ 11 7 cry: "Get priv'ed, set up, move on." Setting up was a matter of creating an account for themselves so that they could get in at some future time. Who knows, the reasoning went, when access to the company's devel opment computers might be useful? Only gradually did it dawn on Kevin that they had achieved their ultimate goal. Breaking into the development cluster could give them unlimited access to the VMS source code. But even though they were inside the temple, there were still obstacles. They needed to transport the software to some safer haven, some secret location. In order to acquire the source code in such volume, one of the things the two data hijackers needed was a high-speed gateway through which they could transfer the programs. Relying on their relatively low-speed modems at VPA would have been like siphoning the ocean through a straw. Just as important, they needed to find a link from Easynet to the outside world. Digital's computer network was not, as a rule, connected to the outside world. But there were some exceptions. Digital's Western Research Lab in Palo Alto, it turned out, had just the gateway they were looking for. Established in 1982 by a group of defectors from Xerox's Palo Alto Research Center, DECWRL, as it was called (pronounced DECK-whirl), represented Digital's future, a computer science labora tory where researchers experimented with the most advanced ideas in computing. The Palo Alto lab was composed of about twenty-five people in a fourstory streamlined brick building that also served as Digital's western headquarters in the downtown section of Palo Alto, an upper-middleclass community next door to Stanford University. The Western Re search Lab seemed more like a Silicon Valley start-up than a corporate outpost. The lab was also one of the few UNIX havens in Digital's otherwise VMS-dominated universe. It was logical that the researchers at DECWRL would want to work with UNIX, specifically Digital's ver sion called Ultrix; not only had they grown up with UNIX, but in their frequent cooperative research with university scientists, UNIX was the common denominator. And there are other things that make UNIX attractive: it is highly "portable," which means it can run on almost any type of computer, from an IBM PC to a Cray supercomputer. VMS, on the other hand, is confined to VAX computers. UNIX, which was in vented by two computer researchers at AT&T's Bell Laboratories, has gradually become a standard for scientists, engineers and universities. Scientists at the Western Research Lab were experts in the UNIX oper ating system, though they held a grudging respect for VMS. 118 a CYBERPUNK Also at Palo Alto was the Digital Workstation Systems Engineering Group, a small group of designers inside Digital who were working around the clock on the next-generation workstation, Digital's first ma chine ever to be designed solely for the UNIX operating system. It was being built outside Digital's traditional development process and the company wanted to get the machine out as soon as possible in order to remain competitive with smaller, younger companies, such as Sun Mi crosystems. The new workstation's code name was PMAX. High-speed network gateways may have been common at large uni versities and research laboratories, but they were found less frequently at large corporations. Most IBM sites have no direct connections to the outside world, mainly for reasons of corporate concern about security, and those with connections can only dial out to other computers—they cannot accept incoming calls. The Digital gateway in Palo Alto, with links throughout the world, was extraordinary in its very existence. It could crank data in and out at 56,000 bits per second, which is the equivalent of transmitting all of Moby-Dick in less than two minutes. Its purpose was to put the research of Digital's computer scientists closer to research that was going on at places like Stanford and Berkeley. Having good network connections mattered to a computer scientist in 1988 the way a properly equipped kitchen would matter to Julia Child. As part of the international research community, sharing ideas and papers and ongoing research with counterparts around the world, the Palo Alto computer scientists believed it was necessary to have direct connections to the global Internet. And in recognition of the open-mindedness back at corporate headquarters, the computer scientists in Palo Alto took great care to operate their precious gateway responsibly. To give the best possible oversight both for maintenance and security, Ph.D.'s in com puter science took turns poring over daily log files, a job usually per formed by administrative staff. So it was only a matter of hours after the intrusions into the Palo Alto computers began that the gateway watchers there noticed something amiss. The Palo Alto scientists who monitored the gateway—Brian Reid and Paul Vixie—decided they were dealing with experts. Sometimes the intruders came into Digital over a phone line, as an employee might dial into the company's computers from home. From there, they knew how to get access to Easynet. From Easynet, they could connect to any of the small VMS computers in the Palo Alto building, often a desktop work station, where they experimented with passwords until they managed to log on. Once they had logged on, they exploited weaknesses in VMS to Kt**: 1U DMk-ZUt H*J** t j 19 gain privileges on the small system. And once they had done that, they would commandeer the small computer, forcing it to masquerade as a larger system on the network, some users of which would have expanded access rights. This is a method known as "network spoofing." At the same time, the intruders would plant their Trojan horse, a modification of the loginout program, and capture user passwords, and then take ad vantage of the natural tendency for people to use the same password on all the systems on which they worked—whether VMS or UNIX. A T A The intruders' objective was to log on to the gateway computer—an Ultrix machine called Gatekeeper, named for a character in the film Ghostbusters. Gatekeeper was the only means of contact with the Arpa net. Getting into Ultrix, then, was necessary if they wanted to take software out of the company. Once the intruders had gathered their crop of passwords from a VMS machine, they could try each one of them on an Ultrix machine. And that is how they got into Gatekeeper. Long after midnight one night, Paul Vixie noticed activity in the account of one of the secretaries, who appeared to be using Gatekeeper in a very unusual and sophisticated manner. The next day he had her change her password, and disabled her account on the Gatekeeper computer. It was a daily battle, and even the best computer scientists at the research laboratory began to feel beleaguered. The intruders were creat ing too much extra work. Reid and Vixie were copying all recently changed files to special backup disks in case something went wrong. The intruders' clandestine copying activities were creating an unusually large number of recently changed files, which occasionally overflowed the backup disks. The Palo Alto scientists felt that the intruders were as clever as any they had ever seen. They were experts who didn't make mistakes. They broke into almost any computer in Digital at will. It was evident from the way they were exploiting bugs that they must have source code, some pieces of which were so proprietary that even Reid and Vixie didn't have access to them. Frustrated by his own lack of access to the source code, Reid wrote in a message to Digital's security administrators: "Clearly the intruders have the sources. When sources are outlawed, only outlaws will have sources." One thing they did to limit the loss of information was to alter the data just before the intruders transmitted it out of the Palo Alto computer, coding it in such a way that it was useless after it was stolen. 120 a CYBERPUNK By August, at least three people in Palo Alto were taking turns mon itoring the laboratory network. It usually made for an interesting eve ning. One thing they noticed was that unlike a typical intruder in a computer, whoever this was had a fairly sophisticated method of sifting through directories for what he wanted. Ordinarily, a meddler entered a directory that appeared to contain something worth looking at and read the first twenty lines or so of several files. But this intruder was consid erably more efficient. He had an uncanny way of finding a computer with vast amounts of data and within half an hour he would have the one thing up on the screen that was worth stealing. He did it by execut ing a sophisticated sweep of the entire system, looking at access times and looking to see which people had been using which directories. His search strategy, curiously people-oriented, revealed an ingenious insight into corporate hierarchies. That is, he seemed to be able to figure out which people were important, then he would go look at what they had been doing recently. The kicker was that he kept opening the safe and looking inside, but he never took anything other than source code. Perhaps he was just casing the joint. Among those involved in chasing down the interlopers, frustration grew. Sometimes, just to get some work done, or to get a decent night's sleep, the Palo Alto crew would break the network links between Palo Alto computers and the outside world, disconnecting from both Easynet and Internet by pulling the plug on the modems. If the computer scien tists at DECWRL felt that they were under a sustained attack, some system managers at Digital's commercial offices were terrified, convinced that someone had taken the control of their machines out of their hands. In an electronic mail message to his managers, one irate Digital em ployee wrote: Ne seem to be totally defenseless against these people. Ne have repeatedly rebuilt s y s t e m a f t e r s y s t e m a n d fi n a l l y m a n a g e m e n t has told the system support group to ignore the problem. As a good network citizen, I want to make sure someone at network security knows that we are being raped in broad daylight. These people freely walk into our systems and Bre taking restricted, c o n fi d e n t i a l a n d p r o p r i e t a r y i n f o r m a t i o n . KW; 1U DmJc-&U H^Ui ▼ 121 The best that could be done was to take the VAX development cluster in New Hampshire off the Easynet, which meant that engineers were unable to work on those computers from home, or from remote sites. To many of them, it was an irksome and unacceptable solution. In the meantime, those in the Workstation Systems Engineering Group in Palo Alto who were working on the new PMAX workstation had some real trade secrets to protect inside their computers. The Palo Alto group was toiling secretly, trying to bring its workstation to market ahead of Sun Microsystems, which was working on a similar computer. The principal objective behind the development of the new workstation was to take Digital's competitors completely by surprise. Losing that element of surprise could significantly hurt the computer's chances for success. Although the intruders logged on to machines belonging to the workstation group, they didn't appear to be interested in taking anything there. But as an extra precaution, the group kept the specifications to the new machine off line, and gave them out in person to a select group of people. A T A It might have had something to do with residual instincts left over from his days in the intelligence community, but Chuck Bushey was con vinced that the break-ins were the work of an international espionage ring, with malicious West German computer hackers feeding valuable Digital programs to the East Bloc. Bushey was Digital's top cop and he had a cop's way of thinking. Once he had gone to a morning appoint ment at a remote Digital office two hours early to test security by con fronting guards at all the doors. But Bushey was unschooled when it came to technical matters, and the subtle points of computer penetration that a computer security expert might find significant tended to mystify him. His suspicions arose in part from the fact that he had recently received intimations of shady doings on the part of the Chaos Computer Club, and partly because some of the phone traces went back to network nodes close to East Bloc borders. Another piece of evidence led to Karlsruhe, West Germany, which Digital officials knew to be a hotbed of Chaos Computer Club activity, and to a university student who had spent the previous summer working at Digital in Palo Alto. While at Digital, the student had spent much of his time in front of the photocopier. Moreover, the German student was the only person who knew the location of Brian Reid's password-cracking 122 a CYBERPUNK software, which the intruders stole from a Palo Alto computer. By this time, it seemed that the Digital security forces were building up a strong case for the existence of an international conspiracy. In early November, Bushey met with Mark Rasch, a young attorney from the Justice Department who had developed an expertise in com puter crime. Bushey told Rasch about the months of fruitless investiga tion and false starts with no suspect. When Bushey posited his international conspiracy theory, Rasch found it very plausible. A toughminded thirty-year-old New Yorker who had gone straight to the Justice Department from law school, Rasch had become proficient at investigat ing high-tech crimes. His first position was in the department's internal security division and his early cases had included an investigation into the unlawful export of VAX computers to Eastern Bloc countries. His practice was to assume the worst. Presented with a set of brazen, system atic electronic break-ins aimed at the heart of Digital's software devel opment efforts, his inclination was to assume it was espionage until proven otherwise. It was a busy week for Rasch. While meeting with Bushey he received word that a computer virus had infected the Internet the previous eve ning, crippling thousands of computers around the nation. Mike Gib bons, an FBI special agent in the Washington field office, tracked Rasch down at the Digital offices that morning to tell him he had already opened an investigation into the Internet virus. As Rasch was hearing the reports, there were still no leads on who had written the virus. Rasch saw no apparent link between Digital's troubles and this new computer virus, but he couldn't rule one out entirely. One of the virus's targets was VAX computers. The Palo Alto scientists were beginning to disagree with Bushey. By November, they had been monitoring the intruders' activities for months. This was not international espionage at work, they decided. First of all, the passwords that the intruders made up when they created accounts for themselves—words like Spymaster and Spoofmaster—were in consistently flawless American vernacular. Second, it was widely known that the Soviets already had both VMS and UNIX and wouldn't need to steal them. Moreover, if they did need to steal an updated version, it was more than likely that among Digital's 150,000 employees, or among those few customers with source code, there was at least one Russian operative who had already taken home everything he needed. It just wasn't necessary to go through all the effort that the intruders under took. Brian Reid, the Palo Alto office's resident computer security ex- KW; 1U DmA'SU* \\*cUa t 123 pert, believed that in all likelihood this was a game being played by some ne'er-do-well somewhere who slept'into the afternoon, got up, ate some breakfast and sat down at his home computer at three in the afternoon for a long day of hacking. After a hard day at the office breaking into computers, he (experience had taught Reid that it was inevitably a male) would knock off around midnight, meet some fellow hackers for pizza and go to bed around three in the morning. Not only did those hours correspond directly to the hours during which the break-ins took place, but Reid had spent enough time around the computer underground to know its mind-set. In the ten years Reid had taught at Stanford, he had been involved in network security, had met several such "cyberpunks" and had sparred with dozens of them inside the Stanford computers. Both Reid and Vixie were impressed with the technical skill displayed by this one, but they argued that anyone with a modicum of talent and ten hours a day to devote to the problem could probably do the same thing. The one piece of evidence in favor of Bushey's international conspiracy theory was that the intrusions were so energetic they had to be the work of at least two people, a tag team perhaps. If these were truly bored teenagers, on the other hand, then there was also in them something of the network cowboy, out on the nets having a good time roping computers like so many steers, just out to see how many network nodes they could lasso in a night. Witnessing the frenetic activity every day was a little like watching a movie with the sound turned off; Reid didn't get to hear the whooping with each vanquished system, but he could imagine it well. A T A Retrieving the data from USC was a three-man operation, so Kevin and Lenny pulled a reluctant but curious Roscoe in on the project. Fearing that he would be recognized, Kevin stayed off campus; Lenny and Roscoe went to USC together. Lenny stationed himself at a pay phone outside the university's main computer center and called Kevin, who was sta tioned at a terminal at the offices of a friend. Kevin then instructed Lenny to tell Roscoe to mount a magnetic tape. Roscoe walked in and, dusting off his old social engineering skills, posed as a student working on a project, handed a tape to a computer operator and asked him to mount it. Once that was accomplished, Roscoe returned to the pay phone where Lenny had Kevin on the line, and Kevin typed in the appropriate commands to transfer the files from the USC hard disk to the magnetic tape. Then Roscoe could retrieve the tape and hand it to 124 a CYBERPUNK Lenny. This complicated procedure had to be done a few times in order to build the collection of tapes, which were gradually stacking up at AllPurpose Storage in Mission Hills, where Lenny had rented a locker. Roscoe occasionally provided a blank tape from his workplace, but most of the tapes came from VPA. Kevin and Lenny both considered what they had accomplished a tremendous feat. By having their own copy of the VMS source code, they could pick the operating system apart line by line, understand it, find its numerous flaws and even, if they wanted, create a modified version—say, with something like the Chaos patch included. If Kevin and Lenny really wanted to be malicious, they could send contaminated software back to the Star cluster, or even to the software distribution center in Massachusetts, which generates exact copies of what it has received. People who work at a software distribution center are typically not engineers and would have no way of checking to see if their copy of the information had been secretely altered. That meant that until the next release came from the developers, every copy of VMS that left the distribution center for a customer site would contain the corrupted soft ware. When the engineers back at the Star cluster discovered that someone had broken in, they had no way of knowing whether or not their master source code had been corrupted. So they were forced to go through a laborious week-long exercise of installing all the magnetic tape backups of their master files and comparing them with what was on the disks, to make sure that every change was authorized. But Kevin and Lenny had had no plans to visit havoc on the software. Their electronic joyride through Digital was harmless by their standards. They were copying the source code, but in their minds they weren't taking anything. As they saw it, they weren't even stealing, because they left the original software intact, just where it was and just how it was. By the same idiosyncratic view of the law, when Kevin and Lenny encountered a security program called XSAFE, which they learned about while reading the confidential electronic mail of an engineer named Henry Teng, they had no qualms about taking it. Teng appeared to be the program's chief architect and "Digital Confidential" was stamped all over any memos concerning XSAFE. The program wasn't due to be released for another year, and Kevin wanted the source code. It didn't take Teng long to notice they had been in, so he changed his password. Getting Teng's new password was a particular challenge, KW: 1U Dm^-SUc W^jui ▼ 125 as he was choosing from a list of randomly generated passwords. Al though the password Teng picked did not echo back on his screen, the list from which he chose went to a log file he kept, which Lenny and Kevin could see. They went to the log file, found the list of choices, and eliminated their way to Teng's new password. When Teng discovered they were back in, he moved to a machine that was on the Easynet but had disabled inbound connections. Through reading mail, Kevin and Lenny found the name of the machine Teng was now on. When they tried the "set host" command, a way to link one computer to another, they got a response that all inbound connec tions would be refused. Figuring that Teng himself had to have a way of connecting to the computer, they started looking at terminal servers (computers that act as switchboards, making connections between com puters on a network) in the development center and finally found a hidden avenue that gave them a way to reach to the machine. They continued the task of transferring out the XSAFE source code. Perusing the personal mail of network security experts like Brian Reid, and corporate security people like Chuck Bushey and Kent Anderson, who was in charge of European security, was a good way for Kevin and Lenny to track the progress of the hunt. They read mail in which net work security people were told to drop what they were doing to work on the case. At one point, it appeared to Kevin and Lenny that at least three people in corporate security were working on the problem fulltime. Even if they were caught, Lenny and Kevin had read enough about computer crime to know that Digital might be reluctant to press charges against them. They were aware that few of the computer crimes detected were ever reported to the police and still fewer were made public through criminal charges. Lenny and Kevin knew that companies worried about having their vulnerabilities publicized. A T A But in June 1988 there was a close call. Lenny got a telephone call one day from a particularly overwrought Kevin. "Get a copy of today's L.A. Times!" he cried. When Lenny looked at the newspaper, he couldn't believe it. "JPL Computer Penetrated by a 'Hacker' " was the front-page headline. The duo's traversing of the Internet had taken them briefly into a computer at NASA's Jet Propulsion Laboratory in Pasadena a few months earlier. Kevin was interested in the JPL computer because it was one of the few 126 a CYBERPUNK VMS machines on the Internet and he had considered using it as a storage locker for the VMS source code, but then decided against it. But they didn't think they had been detected. Luckily, the laboratory ap peared to suspect the Chaos Club, because of evidence of the club's trademark "insidious Trojan horse," the loginout patch. The newspaper article said that although no classified material was compromised by the hackers, one JPL engineer said officials there "worried that an intruder could learn how to send bogus commands" to the eight unmanned inter planetary Explorer spacecraft the laboratory controlled. Kevin and Lenny, of course, had no such intentions. They had just been poking around. By early fall of 1988, Kevin was acting particularly paranoid, eating more than usual and making unreasonable demands on Lenny. He had no regular job, leaving him with plenty of time to be obsessed with his hacking projects. He insisted that Lenny be ready to drop what he was doing in his legitimate job and start work for Kevin promptly at three o'clock every afternoon. Or he would call Lenny at five in the morning and instruct him to go to VPA to insert the Chaos patch just as everyone in Massachusetts and New Hampshire was logging on. Kevin had changed his telephone billing name to James Bond; the last three digits of his new number were 007. He had changed Lenny's billing name, too —to Oliver North. Kevin made it clear to Lenny that he wanted to stay several steps ahead of the growing pack of hounds Digital had deployed for the chase. By this time, Kevin had improved his phone work so much that he made it almost impossible for USC to track him down. His most effective red herring was his use of the call-forwarding feature on the telephone com pany's computers. This masking technique meant that when the phone company initiated a trace, it would lead to a blind alley. Kevin was ruthlessly arbitrary in forwarding the telephone numbers. And until he and Lenny read Chuck Bushey's mail one day, they had no idea that Digital had gone so far as to trace the calls back to the random numbers they had chosen to forward to. One of these random numbers led back to the apartment of a Middle Eastern immigrant in Santa Monica, a middle-aged man who was watching television when federal agents barged in looking for computer equipment. They found none. When in the throes of the hacking, Lenny was having a good time. The idea of having control over many computers was incredibly seduc tive. The challenge of figuring out where to go to look for the informa tion they wanted was more stimulating than any college programming KW: 1U DmA-SU* WacJIha, t 127 course. And all the while they watched a twelve-billion-dollar company flounder helplessly as it headed down one cul-de-sac after the other. Yet something in Kevin was changing. He had become so secretive that when he told Lenny he had lost the Security Pacific job, the greater surprise to Lenny was that he had gotten it in the first place. The same thing had happened when Kevin got and quickly lost the job at GTE. For Lenny, too, the thrill was beginning to disappear. He became suspi cious that Kevin was storing information to use against him someday, while withholding anything about himself that Lenny could use. They began to argue frequently over trifling things. And they were constantly betting against each other—twice Lenny lost a $120 bet on whether Kevin could break into the VPA computer from outside. Kevin did it through sheer doggedness. When it came to perseverance, Lenny was a distant second. He lost most of the bets. And since Kevin had come back from his months "underground" a few years earlier, he seemed to take his electronic penetration more seriously than ever. Perhaps he was thinking that if he was going to lie to Bonnie every night about where he was, it should be for a reason he considered defensible: he had goals to meet. On the other hand, some thing seemed to be beyond his control: he kept telling Lenny that he wanted to stop the break-ins as soon as they finished the project they were working on; but once they had finished one project, Kevin always seemed to want to start another. By November, Kevin was insisting on coming to VPA every night to break into Digital. Whenever Lenny tried to beg off so that he could get some sleep, see other friends or spend time with his girlfriend, Kevin would badger him until he agreed to spend the evening with him. Some times he even called Lenny at two in the morning and rousted him from bed, insisting that he meet him at VPA. Kevin was obsessed and he had drawn Lenny into his mania. Bonnie, who was paying most of the bills, had started losing patience with her errant husband. She paged him constantly, and Lenny sat in disgust as he listened to Kevin lie. "I'm at the UCLA law library working on the Pierce case," he would tell her. Or: "I'm studying for my exten sion class." After he hung up, Kevin would grumble about Bonnie. She was a nuisance. Getting in the way. He was thinking of divorcing her. Lenny could feel that things were heating up. He turned to Roscoe. Kevin was getting out of hand, he told him. He felt as if he couldn't pee without checking in with Kevin first. Roscoe, too, was beginning to get fed up with this roller-coaster relationship between Lenny and Kevin. It 128 a CYBERPUNK was true that Kevin was a nuisance. He was calling Roscoe all the time, too. Mostly, Roscoe felt terrible for Bonnie, who knew of none of it. He resisted a temptation to tell her to go to the UCLA law library one night and look for her husband. Now Lenny was sounding panicked. Roscoe didn't want to get involved, but he did offer him some advice: get a lawyer. Even now that the VMS software was encrypted and safely locked away in a storage locker, Kevin still wouldn't quit. His next project, he decided, was to steal a game called Doom from Digital's Star cluster. He was quite content with the setup at VPA. Judging from the unsuccessful traces, there was no one even close to catching them. In the face of Lenny's protests, Kevin was insistent. What had once been a friendship between like-minded teenagers had become a series of demands and contests and long nights in the stuffy offices at VPA. If this was big-time electronic crime, then Lenny wanted nothing more to do with it. A T A It was the stunt with the paycheck that unhinged Lenny completely. "Hello, Ms. Sandivill," came the chatty, genial voice on the other end of the line. "This is Carl Halliday with the Internal Revenue Ser vice. I understand you're in charge of payroll at VPA." "Who did you say you were?" "Well, ma'am, we're doing an investigation into an employee of yours. A Mr. Leonard DiCicco. Seems he owes Uncle Sam some money. So we need your cooperation." "Yes?" "We need to ask you to withhold Mr. DiCicco's paycheck until we clear this matter up." Livia Sandivill, VPA's bookkeeper, shook her head. There was some thing about the call that made her uneasy. She asked him to hold on and went into Ralph Hurley's office. "The IRS is on the line and they're asking about Lenny," she told him. "They want us to hold his paycheck." Hurley, VPA's vice-president, took the call. At first, the IRS agent seemed credible enough, but it didn't take long for Hurley to become skeptical. When he asked the agent to fax him a letter with the request to hold the paycheck, the agent said his fax machine was broken. Then, when Hurley asked for a number to call him back, the caller gave him Sacramento's area code but a number with a prefix Hurley recognized as KW; 1U Dm^-SUc H*du* T 129 one for California state agencies, not federal agencies. Moreover, there was something very familiar about the voice. Of course! He sounded exactly like Kevin Mitnick, that overweight, Eddie Haskellish friend of Lenny's. Kevin was a frequent caller. He chatted up the secretaries in the same friendly tone. "How was Palm Springs?" he would inquire of one. "Sorry to hear about your appendicitis" were the kind words for another. He called so often, in fact, that it had become something of a joke among the women who answered the phone at VPA. Whenever Lenny was on the phone to Kevin Mitnick, he sounded as if he were fighting with a girlfriend. When Hurley tried calling the number back, he got a recording that said there was no such number. So just after lunch, Hurley called Lenny into his office. "Lenny, are you in trouble with the IRS?" he asked. Lenny shrugged it off. "Of course not." "Then are you in trouble with Kevin?" That was all it took. Before he even knew what he was doing, Lenny found himself telling Hurley about Kevin. In a rather disjointed confes sion, he told Hurley that Kevin had been operating from VPA for the past year, that he had been letting Kevin into the building after hours to sit in front of the VPA computer until early morning. He told him that he and Kevin had been secretly using a computer twenty miles away on the USC campus as their personal data storage locker. And he told him about all the break-ins at Digital. Hurley, who had suspected noth ing, was stunned to hear this. Lenny knew he was well regarded at VPA. He was the general troubleshooter who maintained the company's modest computer system. The last thing he wanted to do was lose yet another job because of Kevin. Lenny told Hurley he wouldn't have been doing all this illicit comr puting if it hadn't been for Kevin. In fact, he claimed, Kevin had forced him into it. Kevin Mitnick was cannibalizing his life. So he kept letting Kevin in to use the VPA computers, night after night. If he decided he didn't want to work with Kevin one night, Kevin always managed to track him down. He was a master at that. And Lenny wasn't the only one to have been terrorized by Kevin Mitnick through the years, Lenny said. He had seen Kevin cut off a person's phone service on a whim. Hurley leaned back. "Well, Lenny, what are we going to do? I'll tell you right now that I want to get the authorities in here. Either you can do it or I will." "Well, geez," Lenny said, looking alarmed. "I'll just get in trouble." 130 a CYBERPUNK Hurley tried to be understanding. He told Lenny that if he was the victim he claimed to be, he would be likely to get sympathetic treatment from the authorities. "Why don't you think it over," he said. At 6:00 that evening, Lenny came back into Hurley's office. "Well, Kevin's really done it this time." "What do you mean?" "He just forwarded all our lines to my house and busied out the whole switchboard." When Hurley picked up his phone and tried to call an other line in the office, he just got a busy signal. With this came another round of confessions. Now Lenny told Hurley that Kevin wasn't just a computer expert, he was adept with telephones as well. He told him about rerouting the wires in the telephone closet and about the MCI access codes they used to call places as far away as England. The phone forwarding stunt he had just pulled was something Kevin had been threatening Lenny with for some time, Lenny said. "Something has to be done about this by tomorrow," Hurley said. "I want to see you in here at eight-thirty tomorrow morning." Later that evening, both telephone lines at the Hurley residence went dead. The next morning, Lenny told Hurley he knew just whom to call at Digital, and he placed a call to the headquarters in Maynard, Massachu setts, from Hurley's office. He told the man who answered in Digital's corporate security office that he needed to speak with someone about the computer hacker who had been plaguing Digital for the past year. To make his words sink in, he started listing things: the VMS source code, the XSAFE program. Lenny said he would like to be put in touch with the FBI. He was told to sit tight for a few minutes. Five minutes later, Chuck Bushey called him back. Lenny knew ex actly who that was because he and Kevin had been monitoring Bushey's personal electronic mailbox for months. He knew Bushey was angry and fed up. And he knew that the security department at Digital would give anything at this point to catch those who had privately embarrassed the company so thoroughly. "Uh, hello," said Lenny. "I just wanted to let you know that I know who's been breaking into Digital's computers for the last year." There was silence on the other end. "Who is this?" Lenny stumbled. "My name, uh, my name is Leonard DiCicco and I'm calling from Los Angeles and I want to tell you about Kevin Mitnick. I know that he's been breaking into Digital's computers all this time. I know you're looking for him." Bushey told him to go find a "secure" phone and call him from there. KW: 1U D«Ul-$JU \\AckitA t Bl Lenny and Hurley went together to a pay phone at a nearby super market, and Lenny called Bushey back using Hurley's credit card. "Well, I'm, uh . . . I'm a friend of his, and I'm calling you because I want to turn him in," Lenny said, and he launched into a condensed version of what he had told Hurley the previous day. He made certain to mention all of the key incidents. He told Bushey that Kevin had taken a copy of a highly secret security program that only a handful of people within Digital were even aware of. To prove it, he named the program. He also said that a copy of the latest version of Digital's operating system for the VAX had been taken as well. There was silence on the other end. Lenny kept talking. He said he wanted to be as much help as possible in apprehending Kevin Mitnick, who was, Lenny intoned, a menace to society. Silence. Digital had better move fast, Lenny added, because Kevin had been talking lately about giving up his break-ins, and the company might not have many more opportunities to catch him in the act. Bushey was speechless at the sudden lucky break. This breathless young man on the telephone was describing the break-ins that had been plaguing the company for months. That night, Bushey and Kent Ander son, the company's head of European security, were on a plane to Los Angeles. While the two Digital people were on their way, an FBI special agent named Chris Headrick summoned Lenny to a meeting at a hotel in the San Fernando Valley. Lenny was impressed by the very ordinariness of the agent. Slight and bespectacled, the low-key Headrick looked as if he would be more at home in a classroom in front of a chalkboard, scrib bling out differential equations. In fact, some of Lenny's high school teachers were flashier than this. When the Digital security men arrived at the hotel, they turned one guest room into a makeshift command center. Lenny drove out to All-Purpose Storage, retrieved the three dozen tapes filled with the fruits of his and Kevin's electronic adventures and surrendered them to his interrogators. Lenny stayed at the hotel, talking until 4:00 a.m. Feeling rather like a hero, he was brazen enough to mention to Bushey that Digital could have solved this frustrating case much sooner. If Bushey had pressed people at USC, university records would have revealed a history of problems with Kevin Mitnick. Also, Lenny told him, if Bushey had consulted Digital's old records, he surely would have seen that Mitnick had gotten into trouble as early as 1980 for breaking into a Digital computer. Then there was the Pacific Bell security memo that followed 132 a CYBERPUNK the Santa Cruz Operation incident and circulated around Digital several months later, at the same time that Mitnick's activity inside Digital was at its peak. The names had been deleted from the memo but a few phone calls to Pacific Bell security would have made the Mitnick connection. The next morning, together with Lenny and Ralph Hurley, the au thorities drew up a simple plan to verify Lenny's claims. As usual, Kevin was planning to show up at VPA at 7:00 that evening, after the regular employees had all gone home. Headrick's plan was to use a computer room on the first floor of the building to monitor everything Mitnick did from the main computer room, which was one flight up on the opposite side of the building. Hurley stayed around that night too. His presence downstairs would prevent Kevin from using the first-floor computer room. An FBI agent named Gerald Harman arrived at 5:00 p.m. and began to set up a surveillance. He wired Lenny with a tape recorder, fastening an elastic belt with two pockets—one for the tape recorder and one for the microphone—to his chest. A Digital engineer installed a monitoring device into the VPA computer that would let them watch and record everything that happened from the system upstairs. When he arrived that evening, Kevin seemed to be in good cheer. In fact, he was on a roll. He had recently gotten a more extensive list of users on the computer at the university in Leeds, England, and wanted to try to get their passwords. He was also hoping to break in to the machine of Neill Clift, the Leeds researcher whose hobby was spotting security holes in VMS. The agents planted themselves downstairs, and Hurley stayed in his office. Lenny greeted Kevin outside and lowered his voice. "Kev, we can't use both computer rooms tonight. Hurley's working late." The two went straight upstairs and Kevin began to dial directly into Digital. His first order of business was the Digital engineering cluster. Lenny was wearing a loose-fitting T-shirt, but he was still worried that Kevin would pat him on the back, thwacking his hand against the recording equip ment. Kevin sensed that Lenny was jittery. "What's going on with you tonight?" he asked. "You're acting strange." Downstairs, in the hastily appointed command center, the Digital people must have been surprised to learn that all their theories had been wrong. Not only was this not the work of an international spy ring, but the notorious West German Chaos group didn't seem to be involved at all. Instead, the culprit appeared to be an obese, nearsighted twentyfive-year-old high school dropout from L.A. whose diet, according to his friend, consisted of greasy cheeseburgers and Big Gulp colas from the KW; 1U JW-SUe WmjIha ▼ 133 nearby 7-Eleven—to say nothing of Lenny, a whiner who had spent months letting himself be bedeviled and blackmailed by the fat one. This must have been a far less glamorous denouement than any of them had imagined, inside a stuffy room the size of a walk-in closet, listening to two grown men taunt one another like children. As the evening wore on, it became clear that this Kevin Mitnick was indeed their man. Mitnick seemed to have a special fascination with the Leeds computer that night. He talked someone at Leeds into giving him a password, then logged on to the British system and perused lists con taining the names and access codes of everyone with legitimate access to the Leeds computer. The FBI agent seemed befuddled by what he was witnessing. Anderson explained to him that once Mitnick had obtained the list of authorized users and their passwords, he could come back later and log on as any of those people. This young man's facility with the telephone network in general, and MCI codes in particular, was impressive enough. As soon as he finished his session on the Leeds computer, Mitnick dialed his way into an MCI Mail account, from which he was able to harvest MCI credit card num bers, so that the session would never show up on VPA's telephone bill. He seemed to know exactly what commands to type, as if he had done it hundreds of times before. But even more remarkable was Kevin's ability to monitor Pacific Bell's telephone traces. And that was precisely what had kept Digital at bay for so long. His knowledge of the phone system was so extensive that he could tap straight into Pacific Bell's monitoring equipment and keep a careful watch over anyone trying to trace his call. For that purpose, he always had two active terminals in front of him: one for his breaking and entering and a second to show what was happening on Pacific Bell's computer. If a trace to his phone line started, he could log off at once. Anderson had been in the'computer business for nearly a decade and he was aware that hackers were known for their patience and stamina. This one seemed to be among the most indefatigable. At 1:00 in the morning, long after the FBI agent and the jet-lagged engineers had grown bleary-eyed, Mitnick seemed to be just waking up. If it was true that he was recently married, didn't his wife wonder where he was? Lenny's role seemed to be a small one, though the surveillance team suspected he might be lying low for its benefit. Lenny's principal job that night was to keep an eye on the second computer terminal that the pair used to maintain their electronic lookout for any traces. Lenny had done his part. He had led them straight to the person who 134 a CYBERPUNK had eluded them all these months. Kevin was doing so many illegal things that Lenny was surprised the agents didn't storm upstairs and arrest him on the spot. So he stole downstairs and rapped lightly on the door of the small computer room. The door opened a crack and Harman stuck his head out. "Well?" Lenny asked. "Aren't you going to arrest him now?" Harman shot back a stern look. "Not just yet." Harman said they had seen quite enough for one evening, and they were going to pack up for the night. He ushered Lenny inside and removed the taping equipment. Lenny grew impatient. "What do you want? A signed confession?" "That would be nice." Harman smiled and gently pressed him out the door. Lenny climbed the stairs again, shaking his head. "What's going on? Where've you been?" asked Kevin, speaking, it appeared, straight to the computer screen. He was back in Leeds. "I was just checking to see if Hurley's still here. Listen, Kev, I'm tired and I have to get up early in the morning. Can't we call it a night?" "No, I'm onto something great here." "Kev, come on. Let's go." Lenny was becoming exasperated. Kevin turned and glared at him. It wasn't until 3:00 a.m. that Kevin was finally ready to call it quits. When the two went outside, they saw that Kevin's car had a flat tire. So Lenny offered to drive him home—after a pit stop at the Fatburger. In a fit of generosity, Lenny told Kevin he would pay for Kevin's meal. Surprised but not about to object, Kevin ordered two King Fatburgers with everything on them, large fries and a large Diet Coke. Lenny ordered fries and watched as Kevin, out of habit, systematically emptied half a dozen ketchup packets onto his paper place mat then jabbed the mound of sauce with his french fries. His meal dispensed with, Kevin asked Lenny what time he should arrive at VPA the following night. Lenny said he was busy. As usual, an argument ensued. But rather than retread old ground, Lenny told Kevin to find his own way home and stalked out the door. A T A The FBI agents and Digital security experts gathered at VPA the follow ing morning to examine what they had collected. That morning, Har man and Headrick decided they had enough to make an arrest. In an unusual move, Digital, normally intent on keeping the lowest profile possible when it came to security matters, agreed to press charges and KW: 1U DMk-$Ut fMe* ▼ 135 risk public exposure. It was a daring move, for once Digital customers learned that someone had been roaming freely throughout a network they believed was secure, and that he not only had helped himself to company software but, by reading people's electronic mail, had discov ered security weaknesses, Digital would have a lot of explaining to do. But as far as some Digital officials were concerned, seeing this criminal behind bars might be worth a little public disgrace. Once they had Mitnick taken care of, they would handle the more nettlesome problem of Lenny. Headrick went to find Lenny. "How do we find your friend to pick him up?" Lenny was overjoyed. He told Headrick he knew exactly where to find him. Kevin had just come by to have his car towed to a nearby garage. Lenny called the garage. Lenny knew Kevin well enough to know that money ranked only behind food and computers on Kevin's priority list. Lenny had lost a $100 bet a few weeks earlier that Kevin wouldn't be able to crack one of the electronic door codes at VPA. When Kevin punched the correct code after just a couple of tries, Lenny accused him of cheating. He must have seen the code scribbled on a scrap of paper inside someone's desk. But Kevin not only demanded his winnings, he charged Lenny 10 per cent interest for each day that Lenny failed to pay him. So Lenny called him at the garage to tell him he had just gotten some vacation pay and he had the money for him. "I'll be there in twenty minutes," Kevin said, and hung up, Headrick told Lenny he didn't want to arrest Kevin unless he had his blue canvas duffel bag with him. Lenny had explained that the bag was Kevin's tabernacle. It contained all his diskettes, papers and other com puting paraphernalia, as well as the computer-age equivalent of a lock picker's kit—handwritten access codes and passwords Kevin used to steal his way into heavily guarded computers from the safe remove of thou sands of miles. Lenny had told Headrick that the bag contained docu ments linking him to the stolen Digital security programs, as well as to the abuse of the USC computer. In fact, Lenny had said, if they were going to get any hard evidence, it would come from that bag. Kevin's house had been searched so many times that he no longer kept anything incriminating there. The material gathered from the eight hours of surveillance was help ful, but if the bag contained as much incriminating evidence as Lenny claimed, it would be indispensable in building a case against Mitnick. Lenny cheerfully suggested that he steer Kevin to the trunk of the car, 136 a CYBERPUNK where Kevin always kept the blue bag. As soon as Lenny saw it, he would scratch his head. The signal was carefully arranged. When Lenny reached up and gave the back of his head an absentminded scratch, they would make the arrest. It was just after sunset, and in the gathering darkness half a dozen FBI agents slouched under the steering wheels of their unmarked govern ment cars inside the small open parking garage beneath VPA. Just after 5:00 p.m. , Kevin's black Nissan Pulsar rolled into the garage. Luring Kevin there had been easy enough. His next challenge was to get Kevin to open the trunk. Lenny told Kevin he needed an empty disk from him to copy a piece of software from upstairs in VPA. But snaring the quarry wasn't so easy. When Kevin pulled into the garage, he said nothing about the money. He wasn't even eager to get out of his car. "Let's go eat," he said, apparently forgetting the argument they had had the previous night. "I'm hungry." Lenny had to think fast. "But Kev, I really want to make a copy of this great terminal emulator. Let me just run up and do it. Then we can eat." "No, I wanna go eat now. Copy it later." Kevin's desire for nourish ment didn't surprise Lenny, but his insistence seemed unusual. This was one test of wills Lenny planned to win. He stood his ground. Kevin finally agreed to get a disk for him. Grumbling, he went to the trunk, opened it and lifted out the large blue canvas duffel bag. He put one foot on the bumper and propped the bag on his knee. Lenny reached up behind his head and gave his hair a tousle. Suddenly, the garage filled with the sound of engines starting and tires screeching. Kevin looked around, surprised and confused. Lenny grinned broadly: "Kev, you know that queasy feeling you get in your stomach when you know you've been caught and you're about to get arrested?" Kevin looked at his friend. "Yeah?" "Well, get ready." Kevin was taken completely by surprise. The broad grin on Lenny's face left him confounded. The FBI agents jumped out of their cars and shouted to Kevin that he was under arrest. They demanded that Kevin put his hands up and lean against the car. Kevin laughed a tight little laugh. "You guys aren't from the FBI. Show me your folds." Six large FBI identification folds emerged. Kevin looked at Lenny, who was dancing in little circles and laughing. "Len, why'd you do this to me?" "Because you fucked me over" came Lenny's reply. fa*: 1U M-SUc W+ck* T 137 The agents hustled Kevin into one of the cars. "Lenny!" Kevin cried out. "Could you call my mom and tell her I've been arrested?" Ignoring the plea, Lenny turned to Chris Headrick and smiled. Head rick nodded approvingly. "You did so well you should be in my business." PA R T T W O Pa»co Ahd- Project I,.n the late fall of 1986, two young men took the subway across the border and got off at Friedrichstrasse in East Berlin. When they arrived at passport control, Peter Carl, a dark and slightly gnomish man in his early thirties, took over. With a businesslike flick of his wrist, he slapped his passport down in front of the guard and said he had an appointment. His companion, a tall and slender teen ager with a pale complexion who called himself Pengo, sat to one side and waited to be cleared. As Pengo understood it, Carl had made the initial contact a few weeks earlier by slipping a note containing secret code inside his passport. From then on, he could enter East Berlin any time he pleased, without exchanging the requisite 25 marks. A West Berliner usually had to apply a day in advance to travel the few miles across the border. The guard waved the two men through. The corner where they emerged from the U-Bahn, Berlin's subway network, was bustling by East German standards. But the elegance of the cafes that once defined this part of Berlin had long since been replaced by tall public buildings, their dull finish suggestive of a more proletarian aesthetic. Carl and Pengo made their way to Alexanderplatz to kill some time. If not exactly friends, the two were caught up in a 141 142 a CYBERPUNK mutual adventure that bound them. They sat down on a bench. Peter Carl produced a joint from his pocket, lit it and offered it to Pengo. Eager as Pengo might otherwise be to do something so daring—smoke a joint in the middle of Alexanderplatz, East Berlin, in broad daylight— he declined. He was nervous. Shortly before noon, they walked the ten minutes to Leipzigerstrasse, a wide boulevard that began at Checkpoint Charlie and flowed eastward. The building they were headed toward—number 60 Leipzigerstrasse— didn't differ in appearance from the dozens of other postwar apartment buildings that lined the wide boulevard. While West Berlin had em braced a haphazard, extroverted approach to reconstruction, a Sovietinspired blueprint informed East Berlin. The dreary designs of the fourteen-story buildings along Leipzigerstrasse were first cousins to the high-rise apartments ringing Moscow's outskirts. But its proximity to the West always gave East Berlin a bit of an edge over its East Bloc brethren. Technology had been creeping into East Berlin, and the change was especially evident on Leipzigerstrasse. There was a peculiarly capitalist innovation—an automated teller machine—just outside num ber 60. From the names listed next to the buzzers in the entryway, the build ing appeared to be chiefly residential. They took an elevator the size of a refrigerator, which jerked its way up to the fifth floor. They were greeted at the door by a bearded, slightly stocky, well-tailored man in his forties. He and Carl shook hands like old friends. Then Carl gestured to his associate. "Hier ist mein Hacker. Pengo," he announced with a note of triumph in his voice. Sergei turned to Pengo—his real name was Hans Hiibner, but he had been better known as Pengo for years—and extended his hand. The meeting was relaxed enough at the start. A secretary served coffee. Sergei, cordial and businesslike, inquired about Pengo in accom plished German somewhat overwhelmed by a Russian accent. What was the young West Berliner's background? What were his views, his poli tics? Pengo responded proudly that he was a product of West Berlin's leftist scene—the sixties movement—and that he was sympathetic with what Mikhail Gorbachev was trying to achieve in the Soviet Union. Sergei seemed unfazed, perhaps even slightly amused. Then he got down to business. "Do you have something for me?" he asked, turning to Peter Carl. Carl produced a magnetic tape and diskettes from his briefcase, handed them to Sergei, and the discussion turned serious. On the disks, Pengo explained, was a security program for Digital Equipment Corpo- Pc*^ toU Piejut E*j<**lty* ▼ 143 ration computers, the computers of choice in the Soviet Union, and on the tape Sergei would find some other interesting software. Barely acknowledging what he had just heard, Sergei told Pengo ex actly what he was interested in. Referring to what appeared to be an order list, Sergei said he was anxious to obtain state-of-the-art engineer ing software—expensive and sophisticated programs that fell high on the embargo lists intended to stop American and Western European high-technology products from landing in Eastern Europe. He asked, for example, if it would be possible for Pengo to obtain computer-aideddesign software for designing chips. Pengo deliberated for a few moments, then decided he should tell Sergei what a hacker really did. He explained that he was capable of traveling the world through a computer. He could hop from West Berlin to Pasadena in a few seconds, dipping in and out of foreign computer systems in the blink of an eye. But at the moment, Pengo complained, his means of transmitting information were limited. He had a modem, but it sent and received information at a paltry 120 characters per sec ond. The electronic theft of the kind of software that Sergei wanted might take days at the rate Pengo would be able to gather it, making such an exercise far too risky. Pengo began to make his pitch. "Of course, I could do it if I had the right equipment"—perhaps a high-speed modem, one that would allow him to manuever more swiftly, and a more powerful computer with plenty of disk space. It was, after all, his dream to hack on powerful computer systems, but he didn't mention that to Sergei. Pengo hesitated. Sergei was silent. The teenager continued: How would the Russians like to set him up to do safe hacking from phone lines that couldn't be tapped, perhaps even to do his hacking from East Berlin? It would be to everyone's benefit. Pengo sensed no sympathy, nor could he see even a flicker of compre hension on Sergei's part. His only response was to suggest that Pengo try to fulfill his requests, after which they could talk again. If Pengo needed to talk in the interim, Sergei said, he should feel free to come back. With that, the Russian invited his two visitors to take a meal with him. If not an unqualified success for the two West Germans, the visit was in its own way instructive: Pengo had established contact with a KGB agent and had learned what it might take to engage in espionage for the Soviets. A T A 144 a CYBERPUNK Most eighteen-year-olds, no matter how interested in computers, wouldn't have had the chance to talk business with a KGB agent. If Pengo had been asked to describe how he felt about what he had just done in political or even ethical terms, he would likely have shrugged his bony shoulders, rolled another cigarette and passed the question off not just as unimportant but as annoyingly beside the point. Politics and ethics, he would say, had nothing to do with it. Hacking was the means and the end, the information and its destination secondary. He wanted a powerful machine to hack with. He couldn't afford one, the Russians could, and it was the Russians who seemed interested in letting him indulge his passion. He might even say that the purity of his purpose struck him as somewhat heroic; his goal was to be the world's best hacker. That he was living what he might have read in a spy novel made it all the more exciting. Pengo was the son of middle-class Berliners whose lives were torn apart in 1961 by the wall that divided their city. In 1945, five years after his father, Gottfried Heinrich Hubner, was born, the first Western troops marched in and Berlin became a city administered jointly by the four Allied powers. It had been badly damaged, with only half its resi dents remaining and a fifth of its buildings destroyed; there was no electricity or gas, and drinking water had to be hauled in from the country. In the late 1950s, when travel between East and West required only the price of a subway ticket, Gottfried went to the technical university in West Berlin to study engineering. Renate, small, blond and his high school love, traveled frequently from East Berlin to visit him, against strict orders from her father, an impassioned Communist Party function ary. Renate's trips to the west so enraged her father that he informed the East German authorities of the nineteen-year-old girl's hostile act against the Party. He banished her from his home. Renate continued her trips to visit Gottfried, assuming that she could return at will despite her father's opposition. Fate decided her future, however, during one latesummer visit in 1961. On the day before she was to return, a line was cut through the city's heart. The young couple went to the Brandenburg Gate and watched East German soldiers unfurl a twenty-eight-mile-long barbed-wire barrier. Within days, the Berlin Wall was under construc tion. Gottfried and Renate settled in Schoneberg, an older section of West Berlin that became famous for its town hall, from the steps of which John F. Kennedy delivered his famed "Ich bin ein Berliner" speech. Pv*$o mU Pwjut E<)4**ltyi ▼ 145 Renate was studying graphic design and Gottfried was just starting out as a construction engineer. Both were pulled into the anti-authoritarian movement, the European equivalent of the American Left's countercul ture that was sweeping through Europe. They married when Renate got pregnant, and Renate dropped her studies to become a full-time mother. Hans Heinrich was born in July 1968 into a tumultuous time. Three months earlier, Rudi Dutschke, a brilliant sociology student and pacifist who had founded an opposition party in West Berlin, had been shot and nearly killed outside his apartment on Kurfurstendamm, West Berlin's main boulevard. Dutschke was shot by a housepainter who couldn't stand what "Communist pigs" like Dutschke represented. The incident triggered mass riots in the city, and the unrest in Berlin inspired student uprisings throughout West Germany. Hans tended more than most children to give free rein to his fantasies. As a young child, he used the rubble of a partially reconstructed Berlin as an endlessly fascinating playground. Hitler's massive concrete fortifi cations, scattered throughout the city, were indestructible, so architects learned to design their way around them, occasionally just building new apartments on top of them. The abandoned bunkers beneath were ap propriated by the child explorers of Berlin, and Schoneberg had one of the best. It stretched for half a block, stood several stories high and reached four stories below-ground into a catacomb that was filled with endless stretches of ramps and passages. Oblivious to the historical sig nificance of their romping place, neighborhood children scouted its ex panse for old helmets, uniforms and other remnants. The building was a real-life fantasy world, a secret domain perfect for role-playing adven tures; perhaps it was even a first taste of the kinds of interlocking paths and channels that computer networks would come to offer. Partly out of boredom at home, Renate joined a group of mothers who were exploring alternative education for their children. Every day after kindergarten the five-year-old Hans went to a Kinderladen, an experi mental preschool not unlike the Montessori schools in the United States. Parents of Kinderladen children generally belonged to the antiauthoritarian movement of the time and believed that their children should decide for themselves what they would eat, when they would learn to eat with utensils and even when their diapers needed changing. Parents like Gottfried and Renate favored uninhibited self-expression in their children, encouraging them to resolve conflicts by themselves and to assert themselves in ways that had been forbidden to their parents. Yet the Hubner family was drifting apart. Hans was still in school 146 a CYBERPUNK when his father and mother divorced. Hans stayed with Renate, and his younger brother, Ferdinand, moved in with Gottfried. Renate went to work as a dental technician building ceramic teeth, and Hans joined the ranks of latchkey children. He wasn't much of a student. At ten, he was an awkward, slightly plump, bespectacled kid who showed little aptitude for penmanship, English or art, and none at all for sports. His performance wasn't en hanced by the breakup of his family. His teachers regularly sent home reports stressing Hans's potential, while complaining that he was lazy and disruptive. The only subjects in which he excelled were math and physics. When report cards were issued and Hans called Renate with the news, she would tell him to forget the grades and just read her the written remarks. But Hans had a charm that tended to obscure his failings. From an early age, he displayed a sophisticated, relaxed and dry sense of humor. Whenever he got into trouble, he was able to talk his way out of punish ment, inspiring awe among his more academically diligent friends. His teachers decided that what the young charmer needed was more intellec tual stimulation: they decided to advance him by having him skip the eighth grade. But this backfired. The youngster did not throw himself into schoolwork in a more mature surrounding. Instead, he withdrew into his own world, alienated from the classmates for whom he felt little affinity. When he was twelve, Hans discovered squatting. Squatting in Berlin started in the 1970s when artists, punks and runaway teenagers laid claim to abandoned industrial buildings, apartment houses and stores. By 1980, there were more than one hundred buildings in West Berlin oc cupied by squatters. Hans joined a group that took over an abandoned store in Schoneberg, where they set up a punk band. What the adoles cent lacked in musical talent he made up in aesthetic sensibility: his sixinch spikes of hair dyed jet black soared above his head with the help of copious applications of soap. He completed the costume with black mil itary boots and a heavy chain around his hips. He was now growing quickly, and sharp angles were replacing the soft folds of childhood. The wild adolescent distressed his parents. First there were incidents of shoplifting—a cola, for instance, or the electronic parts to build an amplifier. When Renate went to the police precinct to retrieve Hans after the cola episode, officers displayed pity mixed with disgust at her for having borne such a son. She was so enraged that she slapped Hans across the face, but she succeeded only in stinging her own Pim^o mU P+ejut Ey*LtyA ▼ 147 palm. And then there was the time Gottfried was called to the hospital to fetch his barely conscious son, who had gone to a rock concert, drunk too much and smoked his first appreciable quantity of marijuana. A T A Personal computers arrived in Germany in the early 1980s, mainly by way of England. The first wave were toys that went into the bedrooms of teenage experimenters, children of middle-class homes in trim and tidy neighborhoods in antiseptic towns across West Germany. Parents gladly paid the money for an Atari or a Commodore 64, toys that seemed capable of serving an educational function, rather than see their adoles cent children experimenting with drugs or joining the punk scene. Hans was destined to become an electronics freak. In 1982, Sven, a friend since first grade, borrowed a hand-held computer the size of a large paperback from someone at his school and took it home. Hans began to program it immediately, as if he had been programming all his life. Though a miserable English student, he had learned enough to write his first BASIC program, a loop that produces an infinite number of hellos: 1 0 print 20 goto 10 "hello" It was a rudimentary program, to be sure. Later Hans was to develop an elegant self-taught programming style. He had a logical mind, stimulated by the discovery of an ability to create something from nothing. He was transfixed. Squatting in abandoned houses had its pull, and spending time with girls was nice enough, but here was something that could command Hans's attention as nothing ever had. It wasn't long before the hand-held computer yielded to mail-order kits for bigger computers that had to be soldered together. As their first big project Hans and Sven put together an entire computer—a Sinclair. Until the advent of the Sinclair, personal computers, even those assem bled from kits, were out of the reach of most young pockets. But now, for $250, Sven and Hans could buy a complete computer. Even measured against the standards of the day, the Sinclair was exceedingly primitive. At that time Apple Computer, Commodore and IBM were already on the market with machines that look similar to what people now use. But all that the two young Berliners could afford was a kit that, once assem bled, resembled a small box of chocolates plugged into a television set. The software for the Sinclair came on tape cassettes, not on the floppy 148 a CYBERPUNK disks of today. The machine had very limited memory, but it was enough to write a program or two. For Hans, the Sinclair provided a taste of the hidden power of the machine, of binary worlds to be explored. Even as the computer lay in pieces in his room, waiting to be assem bled, Hans was getting ready to start programming it. He had taken the programming manual with him on a vacation to southern Italy that summer with his father and his father's girlfriend. Culture just annoyed him, and if the two adults coaxed him into accompanying them to museums and ancient churches, he sulked. Finally, they gave up and left him in the rented villa, inseparable from the book. When Hans returned from Italy, the two budding computer experts spent day after day in Hans's room, a dark little chamber covered with graffiti, putting together the Sinclair. Oddly enough, although Hans had never done much with his hands, and wouldn't have known what to do with a hammer, his instincts for putting together the computer were perfect. But after he had put it together, his desire for a better computer was immediate. As soon as he could, Hans ordered a more powerful model, the Spectrum. It had the same design as the Sinclair, but twice the internal memory. Circumventing rules became an early obsession for Hans. His main activity in programming was piracy—he attempted to bypass the copy right restrictions on the commercial software cassettes, mostly games. Hans wrote little programs that allowed him to load a game into the computer, save it and put it onto another cassette. It was a challenge to the young hacker, not an ethical question. If the publishers tried to build anticopying devices into their programs, they just had to expect hackers to try to unravel them. Hans and Sven turned into computer-game freaks. Their favorites were those with good graphics, arcade-style games that involved some relatively simple task, such as shooting lasers at successive waves of bugeyed aliens. These electronic games really came to life when played on the colorful, large screens at a video arcade. Hans was spending much of his free time at the video arcade around the corner from his school. The arcade was run by a shifty character who hired teenage boys willing to work in exchange for the privilege of communing with the electronic gadgetry. For doing minor repairs on the games, renting out videos (mostly pornographic) and generally watching over things, Hans had the run of the place. He also set up something of a pirate's copy center, making illegal copies of Sinclair Spectrum software for all his friends. The arcade also provided the setting for his first true hack. Hans Pthfe mU P*u>jut E Pwjtct E*i<**ltyt, T 167 friends, Hess dismissed the Illuminatus theories as so much nonsense, but like everyone else he was drawn in by Hagbard's soft-spoken zeal. Unlike the other three hackers, Hess had no use for the drugs that he saw at once sustaining and destroying Hagbard. Hash was the mainstay, but LSD appeared to be the drug of choice for Hagbard and the major inspiration for his paranoid fantasies. Hess's only real vice was his chain smoking, accompanied by the occasional beer. And whereas he main tained a semblance of order in his two-room Hannover apartment, Hag bard inhabited chaos. He lived in a surround of overflowing ashtrays, heaps of dirty laundry and other signs of the necessities of daily life not just neglected but transcended. As one of the few on the West German scene specializing in UNIX, Hess was something of an oddball, and he wanted nothing to do with organized hacking, so he had no use for the "VAXbusters" from Ham burg. Further, their area of expertise, VMS, was of no interest to him. Besides, Hess had a real job at Focus to attend to; he didn't have Hag bard's freedom to devote every waking moment to hacking. Even if he had, he wasn't sure he would be able to sit as Hagbard did, with a meditator's stillness, oblivious to outside distractions for hours on end. However, it was such an infectious passion that before long Hess was using any spare moment he had exploring networks. In a way, it was Hess's own break from the predictable way of life he had always known, with its built-in constraints and expectations. Hess may not have been interested in group hacking or VMS, but he was interested in hacking into UNIX systems. Most of the time, he stayed late at Focus and worked from there. Sometimes he used Focus's NUI, sometimes he used his own, legitimately acquired NUI. Only occasionally did he resort to the stan dard practice of using stolen NUIs. That, as far as Hess was concerned, was straying too far toward questionable ethics. One of the most useful lessons Hess learned from Hagbard was that this pursuit required endless patience. It meant sitting for hours on end, dialing and redialing. Once you had reached a system, and the friendly log-in prompt at a computer's portal asked for an account and password, it meant more time expended in getting in. Once you were on the machine, exploring its crevices and testing the limits of your powers took still more perseverance. Although Hagbard was no programmer, and was fully dependent on others to write programs for him, his infinite patience and utter single-mindedness made him a more effective cracker than many of the others. 168 a CYBERPUNK Part of the tremendous attraction of computer networks for Hess, Hagbard and Pengo came from knowing that beyond their underpowered little personal computers, or even beyond Focus's comparatively more powerful machines, there was always a larger, faster machine somewhere to be explored. If a log-in prompt appeared, and a password worked, the next task would be to try to guess the type of the machine and how powerful it was. Privileges, sometimes referred to as superuser status, were frequently a goal. Unlike Hagbard, Hess and Pengo could try some creative programming once they were inside a computer. They could use operating system commands and write programs to find and exploit weak nesses in operating system security. Once an intruder obtained superuser status, it meant that the machine was entirely under his control. It was possible to read and change peo ple's files, peruse their electronic messages, destroy their work or even do their work for them. The ultimate benign hack would be to send someone a note announcing that the intruder had just visited and had found—and fixed—a bug in his program. Nothing could be protected from a superuser. And hacking was far more efficient than rifling through a roomful of filing cabinets, scrutinizing every scrap of paper for some thing interesting. The power of the computer could easily be turned back on itself. The machine could be instructed to show a list of all its documents that mentioned a key word or phrase, such as classified or nuclear, or whatever an intruder was seeking. Like the others, Hess was transfixed by the sheer number of possibili ties. The Arpanet alone linked thousands of computers. It in turn was part of the Internet, a network that linked so many computers that no one was really sure how many there were. Pengo's first visit to Hannover ended when, at a party at Hagbard's, Dob said he was on his way back to Berlin and asked Pengo if he wanted a lift. It was five in the morning. Pengo had been away from home for two weeks. He had run out of money and clean clothes and he welcomed the ride. When they got into Dob's sports car, Dob produced a nugget of hash the size of a walnut. The two smoked it as they sped through East Germany at over one hundred miles an hour. Dob told Pengo he made the trip all the time, always at high speed, and always in an altered state of mind. Dob liked to carry out logistical chores such as a trip from Hannover to Berlin in the most efficient way possible, even if it meant placing his life in danger. Pengo enrolled at the technical university in Berlin to study computer science, but he couldn't stay away from Hannover too long. He started Puty mU Pi*jut E*i<**kyt\ T J 69 to travel there frequently to spend a few days at a time with Hagbard. A visit usually started off with a round or two of hash and progressed to allnight hacking sessions. Once or twice, they went to Focus to visit Hess and watch him hack from there. A T A It would have been natural to select Cliff Stoll out of a lineup of sus pected computer fanatics. Skinny Cliff had a maniacal edge to his per sonality, cultivating what might even be a parody of the eccentric scientist. Wild corkscrews of brown hair projected six inches from his head; he had the gait of a pogo stick, a yo-yo always in hand and in perpetual motion. Stoll's speech was punctuated by a parade of excla mations—"Hot ziggity!" and "Holy smokes!," "Jeez" and "Really, really neat!" If his computer kept him waiting for more than half a second before executing a command, he would yell "Commie!" at it. In fact, "Commie!" was the mocking charge leveled against any recalcitrant inanimate object. Stoll's political views leaned appropriately leftward, in part because it never occurred to him to think otherwise. He went to college during the 1960s, and he opposed the Vietnam War, but he wasn't much of an active crusader for the Left. In fact, he considered himself a nonideologue who resisted left-wing dogma. He operated more on his principles. It was on principle, for instance, that he made certain that all of his employers were involved in nothing but the purest of research. He couldn't bring himself to work for the Lawrence Livermore Laboratory, a government research center whose bread-and-butter projects include designing nuclear warheads and Star Wars weapons for the U.S. mili tary, to say nothing of the National Security Agency, whose computer scientists were, by definition, spies. So in 1986, Stoll took a postdoctoral job at Lawrence Berkeley Labo ratory designing mirrors for the Keck Observatory in Hawaii. High atop the Berkeley campus, LBL is Livermore's sister laboratory thirty miles to the west. LBL is one of the United States' national research labs and the site of broad-based unclassified scientific research. When Stoll's grant money ran dry in late 1986, he was forced to look for something else to do. For an astronomer in the midst of the Reagan era it wasn't an unusual fate. Federal money to support the basic sciences was shrinking. The money was over the hill, literally, at the weapons laboratories. As it happened, the computer knowledge Stoll had picked up in high school 170 a CYBERPUNK and college gave him a certain advantage over other astronomers who lost their funding. In August 1986 he became a system administrator, in charge of maintaining the laboratory's dozen mainframe computers. This meant being responsible for everything from backing up important data and taking care of computer security to helping the scientists who were his customers use the powerful machines more efficiently. Although it wasn't exactly the work he was looking for, it allowed him to stay in Berkeley. One of his first assignments seemed simple enough: to reconcile a small accounting error that had shown up. LBL used some home-brewed accounting software, and the patchwork of programs, written by summer students over the years, had come up with a seventy-five-cent discrep ancy between the normal system accounting and the lab's own charging scheme. Cliff stayed at work until midnight puzzling over the mysterious seventy-five-cent error, which he suspected might be a computational rounding error. After careful examination, he discovered it wasn't a rounding error, but the work of an unauthorized person from outside the lab using the account of an LBL researcher who had left several months earlier. With characteristic gusto, Cliff became a self-appointed one-man SWAT team. He set up traps that captured the hacker's every keystroke on a printer and alerted him every time the intruder was in the computer. He kept a detailed logbook, and he wrote a software program that tripped his pocket pager whenever the trespasser logged on. Before long, he was doing little else but tracking the uninvited guest. Occasionally he even slept in his sleeping bag on his office floor to keep a constant vigil over the hacker. Finding an intruder on a computer system is often as serendipitous as guessing the correct password to break into a system. Detecting a breakin can be a matter of timing, perseverance and ultimately luck, especially if the trespasser takes steps to cover his tracks. It requires the same skills that the hacker himself employs, and it can often mean getting inside the hacker's head to anticipate his next move. A system manager like Cliff Stoll hunts down an intruder not only because computer security has been broken. It's also a matter of wounded pride, and a threat to the institution's ability to keep its doors to the outside world open and keep hackers out at the same time. Stoll gradually began to understand the hacker's strategy. By exploit ing a mistake in the way LBL's computer managers had installed certain software, the intruder had managed to give himself privileges on the Pt*$e mJ- P\oyUX E^i^tA ▼ 171 system that are usually reserved for system managers. As a result, the intruder was able to create accounts with names such as Hunter and Jaeger, assigning them such passwords as Benson and Hedges. And the hacker was careful: every few minutes, he typed the command "who," which listed everyone using the computer. Evidently, he knew how to log out in a hurry. If the hacker thought he detected a legitimate system operator on the computer, or someone else with full privileges, in a single keystroke he could instantly disappear back into the electronic beyond. Stoll didn't know, of course, whether it was indeed just one hacker plaguing his computers or a gang. Some empirical evidence seemed to support the case for just one hacker, but he wanted to be certain. So he set up a scientific probe, to see if he could discern typing patterns from among thirty colleagues at the lab. Once he decided he could, he applied the same test to the hacker's typing rhythms and discovered that most of the time the typing came across the telephone lines in methodical, evenly spaced strokes. Only occasionally was the typing more random, as if someone might be hunting for the keys. He didn't pause to consider that by the time the keystrokes had been transmitted through interme diate computers and data networks, all of the information that could identify the typist had long since disappeared. The most obvious solution to the problem would have been to lock the hacker out entirely. And that would have been simple. Stoll needed only to change all the lab's passwords and tweak a piece of software called GNU Emacs that ran on LBL computers. A powerful program mer's text-editing program, GNU Emacs was used by nearly everyone at LBL. Because LBL programmers had installed GNU Emacs on the lab's computers in a way that gave a user special privileges, any user could access any file on the system using a command called "movemail." In effect, LBL created a hole in computer security—an effective window into normally inaccessible areas within the computer, and the hacker had discovered this. Stoll was beside himself. He decided that instead of slamming the door and keeping the hacker out, he would let him roam through the system with relative freedom and catalogue his every move —and then trap him. He reasoned that by keeping the system open he could get the hacker to stay on the line long enough to let the phone company trace him back to his lair. What really was the danger of an interloper browsing around anyway? The information in the system was often personal but, as far as the LBL 172 a CYBERPUNK system was concerned, not vital for national security. The hacker could peruse grant proposals and information about the computer system, as well as electronic mail carrying gossip, news and love letters. Stoll's salary and resume were open for browsing, too. To Stoll the problem was not so much the hacker's rummaging around the LBL computer as his use of that computer to ricochet his way to other computers over the Arpanet—to virtually anywhere in the Inter net. With the simple command "telnet," the hacker could instruct the LBL computer to connect to Internet computers anywhere in the world, at military bases and Pentagon contractors and research laboratories. He had only to come up with an account and password for those computers. In fact, the hacker was losing interest in the Berkeley machines, and was just using them as a launchpad to others, especially those on Milnet, the unclassified military network connecting Defense Department instal lations. Given Stoll's studious avoidance of military matters, he had no real idea what went on in those computers, but their locations alone sounded like serious business: Redstone Missile Command in Alabama, the Jet Propulsion Laboratory in Pasadena, Anniston Army Depot, Navy instal lations in Virginia and Florida and the Air Force Systems Command Space Division in El Segundo, California. Not only was the hacker logging on, but he was directing his searches in an ominous way. He told the computer to seek out files containing such words as stealth, nuclear and NORAD. He latched on to files about the space shuttle's secret missions. Stoll had heard a lot of stories about hackers from colleagues at Stan ford, fifty miles south of the San Francisco peninsula, and Fermilab, near Chicago, but they had struck him as harmless pranksters. This interloper seemed different. Stoll was stunned by the hacker's ability to traverse the nation, nudging computers open just by guessing obvious passwords. The nation's computers appeared to be surprisingly unprotected. A guest account, for instance, might have guest as its login and guest as its password. Or the login might be a user's last name, the password his first. So the hacker could ask the computer to show him a list of users on the system, then try breaking in simply by typing in people's names. On the handful of occasions that the hacker managed to give himself superuser status, he would create his own accounts or change passwords of existing accounts for his future use. When the hacker hopped over the network to a computer at Lawrence Poi^o **J> Pi* jut E^sl^A ▼ 173 Livermore, Stoll panicked. He called Lawrence Livermore and told the system manager to shut down that machine. A T A In 1986, thoughts of breaking into computers for money were beginning to waft through the air. One Hamburg district attorney had developed a theory of how young hackers might unwittingly allow their computer expertise to be exploited for purposes of industrial espionage, or even by the East Bloc: Communist agents, he reasoned, already expert at manip ulation, would have no trouble engaging the minds of wayward teenag ers. Not only did nervous West German authorities and imaginative computer crime experts have their own finely crafted theories about the potential for exploiting impressionable young hackers, but the hackers themselves were beginning to see what was possible. Sometime in early 1986 the West German group decided to try in earnest to market its talents. Back in Dob's Hannover apartment, under the influence of many pipes of hash passed back and forth, Carl, Dob and Hagbard had a night of intense discussion. The first question, of course, was how to execute the initial contact. One idea was to go up to the door of the Soviet embassy in Bonn. Another idea, lifted perhaps from the pages of an espionage potboiler, was for one of them to slip a note written in code into his passport, a missive that would alert a border guard to his mission. It was a fine idea, all agreed, but no one was quite sure what the note should say. Peter Carl didn't have the technical talent of his colleagues but he had made up for that with sheer bravado and a sense of the possible, so the intrepid Carl readily agreed to travel to East Berlin and do a little cold calling. The idea was simple enough: they were hackers who could get into some of the world's most sensitive computers. From those computers they could extract sensitive informa tion, information they knew would interest the Soviets. What was more, they could provide the Soviets with some of the software they needed to catch up with the technologically more advanced West. Why shouldn't the Soviets want to do business with them? Of course it was illegal. They all knew that. But in selling the Russians military and scientific infor mation, they argued, they would be doing their part for world peace. A name for the project? Equalizer. The idea was not to teach the Soviets how to hack themselves but to keep them dependent on the group somehow, to tell them just as much as they needed to know to stay interested, but not so much that they 174 a CYBERPUNK would be able to hack on their own. If the hackers were going to sell the access codes and hacking knowledge itself, then it would have to be a onetime deal and their price would have to be steep. A million marks, they decided. For that they would tell the Soviets about networks, and throw in the lists of logins and passwords for computer systems world wide. The night wore on, and so did the hash. More hacking business ventures came to mind. Why restrict themselves to doing business with the Soviets? Why not include the Chinese? That idea was discarded when the group agreed that China wasn't enough of a player in the struggle between world powers. Project Equalizer had to stay focused. Hagbard and Dob took on the job of putting together a "demonstra tion package" to show to their future business partners. Hagbard assem bled a list of logins to computers, including those at SLAC in California, a computer at the Department of Energy and the U.S. Defense Depart ment's Optimis computer. Once Hagbard had opened a computer, he left it to Dob to do research inside the computer, looking for material that might interest the Soviets. One document with the title "Radioac tive Fallouts in Areas 9a and 9b" sounded good. So did one called "Propellants of ICBMs." Once he had downloaded the data, Dob trans ferred it onto diskettes and made printouts of each file, being careful to delete any clues to passwords and break-in methods. All told, they gath ered material from thirty different computers. In early September 1986, Peter Carl drove across East Germany from Hannover, left his car in West Berlin and took the subway to the Soviet trade mission in East Berlin at Unter den Linden. He approached a guard who was seated behind a glass partition, introduced himself as Peter Carl from Hannover and asked to speak to someone from the mission, as he had a business proposition to discuss. He assumed it was obvious that he was there to speak to someone from the KGB. The guard told him to take a seat. After a thirty-minute wait, a man appeared in the waiting area and asked Carl what he wanted to propose. Carl explained that he was a hacker from the West with access to interesting information, and he wanted to propose a business deal. The man nodded and disappeared. Ten minutes later, a tall, dark-haired man emerged from the building's recesses. He introduced himself to Carl as Serge, the French pronuncia tion of the Russian name Sergei, and showed the visitor into a sparsely furnished conference room. Sergei asked Carl what he had in mind. Carl explained again that he was a member of a group that could get its hands on interesting infor mation. Sergei was only vaguely familiar with the term hacker, and asked Pu^c toU P*ejut E<)4**kyt\ ▼ 175 Carl to explain. Carl described most of what he knew. He said hackers were people who could break into computers and retrieve information and programs quickly and surreptitiously. Sergei still appeared to be confused, but his interest was piqued and he asked for more specifics. This particular band of hackers, Carl said, had the means to break into dozens of Western computers and get everything from information on high-energy-physics research to proprietary banking data. Carl said he would like to offer the Soviets a package of West German hacking knowhow, including logins and passwords to dozens of military computers in the United States. His price: one million marks—more than half a million dollars. Sergei raised his eyebrows but remained silent. Carl kept talking. He wanted very badly to appear to be someone worth one million marks. He had a salesman's delivery and a salesman's confidence even if the terms he tossed around were not quite accurate. He said he didn't have the demonstration package with him, that it was in West Berlin, ready for him to pick up and deliver to Sergei. He hadn't wanted to bring it with him on this first trip, as there was no telling who might search his bags. Sergei must have been amused and curious. If nothing else, the ap pearance of a computer hacker at the trade mission in East Berlin had no precedent. As a rule, when it came to gathering technology the Soviets had a long tradition of doing their own fieldwork. Since most of what they were interested in, especially technology for advanced com puting, was on a list of highly restricted technologies maintained by a consortium of Western nations known as COCOM, the Soviets had long since resorted to extralegal means of procuring hardware and soft ware. The FBI liked to maintain that Northern California's Silicon Val ley, where much of American computer innovation resided, was crawling with KGB agents. The FBI claimed that one of the primary missions of the Soviet consulate in San Francisco was to funnel U.S. technology into the Soviet Union. The consulate building was suspected of having a hidden forest of antennae and other surveillance equipment on its roof—all targeted at capturing sensitive telephone calls in Silicon Valley. Through the years, a smattering of Soviet espionage cases had become public, but only because the spies were caught. The Soviets acquired advanced computers by hiring agents to set up dummy companies, order whatever was needed and then fold quietly. For the most part, the Soviets had a long-standing practice of reverse-engineering technology based on what they were able to gather. Of course, there was no way the 176 a CYBERPUNK Soviet Union was going to build a technological infrastructure by that method. Nevertheless, it was a system the Soviets continued to use partly because of trade restrictions, and partly from a simple predilection for doing things that way. All told, their software was a motley collection of retooled operating systems and compilers, roughly equivalent to the American originals but transposed into Cyrillic. Their hardware was based principally on VAX and older IBM 360 designs and they were always on the lookout for good VAX software, especially VMS source code. Given the ease with which American computer networks can be entered from a safe redoubt outside of the United States, it isn't hard to consider the possibility of a sophisticated Soviet intelligence-gathering operation targeting the vulnerable computers of commercial American high-technology ventures and nonclassified U.S. military systems. In the early 1980s, officials in the Reagan administration expressed alarm at the existence of a circuitous computer link that would have allowed Soviets in Moscow to log directly in to American computers: an out-of-way international research center located outside of Vienna and known as the International Institute for Advanced Statistical Analysis was con nected by a commercial computer network to the United States and had a direct computer tie to a research center in Moscow. The institute lost its U.S. funding as a result of the computer link. Some American officials argued that even though nothing secret was accessible from the center, it was conceivable that the Soviets could use the power inherent in computers to scan quickly through vast amounts of information and piece together a clearer picture of classified data. But there was no evidence to support this scenario, and several years later U.S. funding for the Vienna institute was quietly restored. Whether the Soviets truly had designs on young computer outlaws is unclear. That the Soviets would have called upon a select group of young experts to rummage around inside U.S. computers for them, or would have dispatched someone like Sergei on a recruiting spree to the Chaos meetings in Hamburg, was probably a notion that existed only in the minds of nervous Western officials. But with this self-described hacker on his doorstep promising tapes filled with digital delicacies from the West, it wasn't surprising that Sergei considered the idea worth pursu ing. The Soviet official made it clear to his visitor that while he was by no means uninterested in what Carl was suggesting, he could hardly agree to hand over a million West German marks for something he not only Poi~£e mU P\ejut E<\**Lyi\ ▼ 177 hadn't seen but didn't quite understand. And Carl himself, still strug gling with some of the technical concepts with which his cohorts seemed so comfortable, was in no position to deliver an extemporaneous lecture on the navigation of data communications networks, the computers that resided on those networks or the specific information they contained. Like that of any marketing man, Carl's job wasn't so much to understand what he was trying to sell but, by virtue of his unerring enthusiasm, to convey the value of his product. But even Sergei's most basic questions were too tough for him. Sergei asked Carl to return in the next few days with his demonstration package. It would be sent to Moscow for a thor ough analysis and, if it were deemed to be worth a million marks, then a million marks would be forthcoming. Sergei then asked to see Carl's passport. He took some notes and left the room briefly. When he re turned, he told Carl that the next time he came, as long as he used the border crossings at Friedrichstrasse and Bornholmer Strasse, the guards would let him pass freely. Two days later, Carl took Dob's car and drove to the border at Born holmer Strasse. After a brief glance at his passport, the guard waved him through. At the trade mission, he asked for Sergei. This time, Carl had with him the demonstration package: an index to computers around the U.S., with Pentagon computers at the top of the list. Under each head ing was an index of what was contained in the individual computers. Account names and passwords had been carefully deleted. Sergei re mained polite but skeptical. This time, Sergei gave Carl 300 marks for his expenses and made out a receipt. He also gave Carl a telephone number in East Berlin where Carl could reach him. He told Carl to learn the number by heart and to call only in an emergency. Carl used part of the money to fly back to Hannover. With the rest, he went straight out and bought a small Casio electronic notebook, where he entered Sergei's telephone number. When he spoke on the telephone to Hagbard or Dob about his trip, he imparted his information in an appropriately cryptic manner. Paris meant East Berlin. Teddy Bear stood for Sergei, Russia and the East Bloc. Equalizer, of course, was understood by all as the code name of the operation. A week later, on instructions from Sergei, Carl appeared at a building on Leipzigerstrasse, a main thoroughfare for traffic in and out of East Berlin. He took a rickety elevator to the fifth floor. From what Carl could observe, the office served as a business dealing in heavy machinery and railroads. Sergei greeted him, and this time they had a general conversation. Sergei wanted to know more about Carl's background. 178 a CYBERPUNK Carl could only assume that Sergei hadn't yet received word back from Moscow on the demonstration material. From then on, Sergei said, their meetings would take place at the Leipzigerstrasse location. At the next meeting the following week, Sergei told Carl that he had gotten a response from Moscow. While the package contained some interesting information and bore out Carl's claim that the group could get into certain interesting computers, it wasn't exactly what they were looking for. More to the point, a million marks for the demonstration package was out of the question. However, Sergei was interested in certain things that could bring the hackers some money. While he wasn't interested in general hacker know-how per se, he wanted to know if Carl's group could produce information about radar techniques, nu clear weapons and the Strategic Defense Initiative. Moreover, he said, the source code for VMS and UNIX, compiler programs and programs for computer-aided design and computer-aided manufacturing could bring the West Germans a tidy sum. Sergei said his customers back in Moscow also wanted software from the American firms Ashton-Tate and Borland, two highly successful personal computer software companies. Such an exchange wasn't precisely what Carl had in mind. He had imagined that he would present Sergei with a menu of sorts, courtesy of Hagbard and Dob, and that Sergei would tick off the various computers he was interested in. Then Carl would dispatch Hagbard to root out whatever he could. But Sergei appeared to have a different notion of what a hacker could provide. Not only was Carl not altogether certain he could get what Sergei needed, but he wasn't altogether certain what Sergei was talking about. Source code and compilers? These were things to consult with Dob about. It was beginning to look as if the things Carl had to offer Sergei didn't want, and the things he wanted Carl couldn't offer. Nonetheless, Sergei remained sanguine about the prospects of what Carl and his friends might be able to supply. This time, he gave Carl 600 marks, or $300, for his expenses and took him out to eat. Over lunch, they made small talk. Carl learned that Sergei was married with children, and that he liked to go fishing. But when Carl asked him to explain precisely what his job was, Sergei declined to answer. Sergei gave Carl photographs of a young woman and a small child, along with the woman's name, address and telephone number. In the event that his frequent trips to East Berlin should prompt Western au thorities to question him, Sergei said, Carl should tell them that he went to visit his girlfriend, with whom he had a daughter. Sergei seemed to keep at least two lists containing names of data bases Pch$e> mU P*cjuX Entity, ▼ 179 and software. It appeared to be a priority system of sorts, as the lists had a numbering scheme and items that were crossed out. By the fifth meet ing or so, Sergei asked Carl to tell him something about the others in the group. Carl told him about Hagbard and Dob while Sergei made notes in a black binder. And so the meetings went, once every week or so, through late 1986, always starting at noon, always consisting of a meal in a restaurant at which Sergei smoked Marlboros, drank glass after glass of orange juice and at the end handed Carl 600 marks for his expenses. Even when Carl had nothing to deliver, he went anyway, just for the 600 marks. Occa sionally Sergei gave Carl small presents: a nice cigarette lighter, a bottle of spirits, some Russian caviar. In spite of Sergei's measures for protecting Carl and his generally solicitous manner, the Soviet didn't appear to be particularly satisfied with what he was getting. Most of the material, he told Carl, consisted of indexes to information rather than the information itself. And that was often available only on microfiche. So Sergei brought his own com puter expert to one of the meetings, but the expert could speak only English and Russian. He and Carl could barely communicate. Carl was frustrated. He didn't want the entire business going sour just because of a communications problem. So he asked Dob to accompany him on one of the trips to East Berlin. Carl told Dob that he would be able to clear things up because he would be able to understand exactly what Sergei was looking for. It took some persuading, but Dob finally agreed to go. During the meeting Sergei explained once again that he was not going to buy the hacker know-how for a million marks, and that he wasn't satisfied with the material that had been delivered so far. His interest, he emphasized, was in information from U.S. military computers, source code and compilers. Dob knew exactly what Sergei was saying, but the meeting was a disappointment. He didn't see that he would be able to get source code, nor could he get very excited about the idea of making a lot of small, low-paying deliveries over an extended period. Then Carl told Sergei about Pengo. He told him that Pengo was a particularly capable hacker specializing in VAX computers, and that he could get good material. The Soviet expressed a great deal of inter est in what Pengo might have to offer. He said he wanted to meet him in person and make his own assessment. Carl said he would bring him by. A T A 180 a CYBERPUNK Meanwhile, Cliff Stoll's vigil wore on. He was obsessed with his hacker; all but the most basic housekeeping for the lab's computers was shunted aside. And the hacker seemed to get even more single-minded. It be came clear to Stoll that this was no mere computer science student romping in an electronic playground—he had developed a keen interest in things military. Now he seemed to want to see files pertaining to intercontinental ballistic missiles and the Strategic Defense Initiative. Stoll watched him try with a persistent series of educated guesses to get into a computer at the White Sands Missile Range: login: guest Password: guest Invalid password, try again login: visitor Password: visitor Invalid password, try again login: root Password: root Invalid password, try again login: sys t em Password: manager Invalid password, disconnecting after 4 tries If it seemed that the hacker could cause some harm in the system he was poking around in, or if Stoll thought that the people in charge of the computer should know there was a hacker poking around in their data, he would call them. Perturbed and incredulous at first, they would close the hole that the hacker had used to climb in. So far the hacker hadn't found any sensitive national security data, or at least Stoll didn't think he had. But it was almost certainly on his agenda. The hacker plaguing Cliff Stoll didn't seem to be much in the way of a computer genius. He was seldom inventive. In fact, his most remark able trait was his plodding persistence: he created connection after con nection, then, like a dog trained to sniff out drugs, systematically searched each system for military information. Long after Stoll had be come overcome with fatigue, the hacker would continue twisting door knobs. Stoll began to think the intruder might not be human at all. Could it be a robot, a computer programmed to look for military infor mation? Stoll decided that it wasn't, simply because whatever it was made spelling errors. Pohfe MUP\*jutE^4**JUytx ▼ 181 At first, Stoll believed the intruder to be somewhere on the Berkeley campus. But there was evidence against that theory. The hacker was very familiar with UNIX, but his behavior showed that he didn't know anything about Berkeley UNIX, a variation on UNIX that was de rigueur in Berkeley. Instead, he was using the traditional UNIX commands first developed at AT&T's Bell Laboratories. He was speaking UNIX with a strong AT&T accent. From the high keep of various universities, Stoll had never had much cause to interact with the outside world. His view of things left little room for shades of gray. As Stoll saw it, scientists who engaged in pure research and divorced themselves from the military were on the right side. The CIA, NSA, FBI and military establishment were, by contrast, sinister and shifty, not to be trusted. And so was this hacker. Not only was he inside computer systems that he had no right to be using, but he was robbing Stoll of his time, time to spend on the work he had been hired to do: to help the lab's astronomers use computers to design their telescope. If his more forgiving colleagues were entertained rather than upset by teenagers who broke into computers, Stoll saw nothing to excuse. In something of a contradiction to his self-consciously liberal way, Cliff Stoll was, in the end, a bit of a crank. He saw the hacker as a dark foe and he wanted to see him behind bars. If he was going to catch the hacker in the act, Stoll knew he would have to trace the telephone calls. And in order to trace them, he would need a search warrant. So Stoll did something that was at odds with his political sensibilities: he called the local FBI office. He explained that there was a hacker in his computer who seemed to have a taste for military information. He was surprised and upset by the FBI's response: the agency had far bigger things to worry about than a loss of seventyfive cents. The second call across the great academic divide to the nasty world of bureaucratic authority proved more successful. The Oakland district at torney's office was immediately interested. Stoll explained that the hacker was coming in through one of LBL's Tymnet links. Tymnet's network ran all over the United States; the hacker could be calling LBL from almost anywhere. In order to trace the call farther than the Oak land Tymnet connection, Stoll needed help from the phone company, and the phone company required a search warrant. The Oakland DA took care of that. Pacific Bell, the local telephone company, traced the call from the Tymnet node to McLean, Virginia, and from there to Mitre Corpora- 182 a CYBERPUNK tion. An MIT spin-off, Mitre is a Pentagon-funded research center. When Stoll confronted computer security managers at Mitre with the news that a mysterious hacker was using it on his way to supposedly secure military and university computers all over the United States, the Mitre officials swore it couldn't be true; their computers were absolutely impenetrable, secured from the outside world, they claimed. But it turned out there was an enormous hole. The hacker was using a local area network (these networks tie computers within a building, permit ting them to communicate locally at high speed) at Mitre to slip around the side of the company's computer security protections. He would dial into a pool of modems at Mitre that were shared by the local area network and then use the same modems to dial back out again. The hacker used the loophole as his personal bridge to reach other computers. It was costing Mitre thousands of dollars in long-distance telephone calls because when the hacker called from Mitre he stopped network hopping and started dialing directly into other computers. He had also planted a Trojan horse program in the Mitre system that cap tured passwords as others typed them in and copied them to a hidden file he could retrieve later. Mitre's computer people were shocked by this discovery. They pleaded with Stoll to keep the whole matter secret. For the public to discover that a defense contractor engaged not just in classified work but with contracts to build secure computer systems had fallen prey to a hacker would have been a disastrous turn. In exchange for that promise, Stoll coaxed Mitre out of its past months' telephone bills. From scrutinizing the telephone bills, he discovered that the hacker had been active for several months before Stoll had even detected him —for far longer than Stoll had thought. Stoll had already counted close to thirty computer systems the hacker had broken into. The number of attempts was at least ten times that. Soon after the phone company had completed the Mitre trace, Stoll watched the hacker jump from LBL into the Milnet Network Informa tion Center, a computer network directory information service, where he discovered four network addresses and telephone numbers for CIA personnel. The hacker wasn't actually inside a CIA computer. That would have been far more difficult, because those machines are not directly connected to public computer networks. But he seemed to be getting closer. Stoll wrestled for a moment with his conscience. Why consort with the Establishment and alert the CIA to the electronic spy in its midst? Why not just drop the matter right there and let the hacker romp unchecked? But before he could do much more ruminating, Stoll Pvh^O MU P\*JUX E<)4**kytA, t 183 was reaching for the telephone and calling the phone numbers the hacker had discovered. In contrast to the tepid response Stoll had gotten from the FBI, the CIA immediately dispatched four people to Berkeley to discuss the matter. A T A It hadn't taken much to convince Pengo to join Project Equalizer. At first, Dob flattered him by letting him know how much they needed him and by telling him that Sergei had expressed a particular interest in meeting him. Hagbard had too many limitations. Given enough phone numbers and passwords, Hagbard could browse for hours inside VMS systems. He knew how to log in and find a directory. He knew how to search for keywords and files. He knew what a disk was and where electronic mail was stored. But beyond that, he was lost. Ask him, for instance, to determine which machines were connected to the system he was on and he was utterly confused. Often, he was too stoned to work very efficiently. He needed too much time to think of the next step. A gifted hacker worked as much on spontaneous leaps of intuition as on anything else. And for all his grandiose theories, Hagbard couldn't pro gram. The group needed a VMS expert who could program. Pengo was the natural choice. Carl made it clear that it could be a lucrative ven ture. Pengo had theories of his own on how to get money for hacking. He developed a three-point strategy. One idea was to sell a certain amount of know-how and charge a more reasonable sum, perhaps 150,000 marks, or $75,000. Another suggestion was that he organize some seminars for the East Bloc, to teach the Soviets about technology and hacking. The third idea, which Pengo seemed to latch onto with the most enthusiasm, was to convince the Soviets to set him up to do "safe" network prowling from East Berlin—that is, to supply him with a top-of-the-line VAX computer with plenty of storage capacity, a high-speed modem for fast data transfer and secure telephone lines that couldn't be traced. Of the three ideas, the last one seemed to have the most potential: it would give the Soviets the software they needed while providing Pengo with some easy money. That, Pengo decided, was the idea he would empha size with Sergei. But he could hardly meet Sergei empty-handed. At Carl's urging, Pengo looked for something to take over as a first enticement. Any software he could get his hands on, as long as it seemed impressive, would probably do. First he managed to procure a magnetic tape contain- 184 a CYBERPUNK ing some software from previous forays—a chip-design program called a PAL assembler from a hack into Thomson-Brandt, the state-owned French electronics manufacturer, and smaller programs for the VAX. But to get something worthwhile from the networks, he would have to stay logged on to a computer system for a long time. That meant choos ing a computer on which he knew the security was lax. He had been inside Digital Equipment Corporation's Singapore computer center be fore and he knew it fairly well. As far as he could tell, there was little security at the Singapore facility. The system manager seemed to be asleep at the switch, seldom checking to see who was logged on to the computer. It was easy to get on the Singapore VAX with full privileges, and Pengo knew it would be easy to stay on for a long time. He logged on late one night and found exactly what he needed. It was a security program for VMS called Securepack, developed at Digital in 1983 for internal use on Digital computers. The program, which allowed system managers to alter levels of privilege on a computer, would make an interesting nugget for the Soviets. Pengo downloaded the program and put it onto several diskettes. He also made about thirty pages of print outs, taking care to delete any information as to how the computers were actually penetrated. On the night before the trip to East Berlin, Pengo, Dob and Peter Carl spent long hours hacking from Dob's room at the Hotel Schweizerhof. Hash was burning in abundance, and although it helped to keep spirits high, it also produced one unfortunate side effect: when he was high, Pengo had the habit of dwelling for hours at a time on one prob lem, which undermined his overall productivity considerably and aug mented the phone bill. Every few hours, Peter Carl would poke his head into the room to check on Pengo's progress, and each time he threw up his hands in disgust. Pengo was costing them hundreds of marks in connect time, and from what Carl could tell, he wasn't producing any thing. Pengo decided to put a digital record of the session from the Schweizerhof onto several diskettes and take those over too. He and Carl emerged bleary-eyed from the hotel the following morning and started out for Sergei's office while Dob slept off the excesses of the night. Their loot stored in Carl's briefcase, they boarded the subway at Wittenbergplatz, a short walk from the hotel. They changed to a different line and boarded the train that traversed the eastern portion of the city, speeding past abandoned stations. It was a familiar trip to Pengo. He had been to Pchfe mU Pie jut E*j4**li%tr T 185 East Berlin many times when he was younger. On Christmas and Easter, when his parents were still together, the Hiibners from West Berlin went to visit the Hiibners in East Berlin. And even if Pengo hadn't stopped to consider the quirk of fate that brought him into the world in the West, it's likely that his indifference to borders was a sign that he understood, if only subconsciously, Berlin's provisional nature, a place where, in the end, allegiance was arbitrary. Just fifteen minutes from the time they set out, they had reached the Friedrichstrasse station in East Berlin. With forty-five minutes to spare, they took a slight detour to Alexanderplatz. Carl produced a fat joint and lit it, muttering that he needed it. Pengo could only laugh and wave his hand at the offering. It was too early in the day to get stoned. Besides, he was nervous. When Sergei greeted them in his office, Pengo already had an inkling that this was not going to be an easy sell. He had to convince the Russian that he was a valuable asset, someone worth investing in. Dob had portrayed Sergei as someone who knew nothing about computers and could only recite from a list of things the Soviets might be interested in: compilers, source code and information from military computers. Pengo could see that he might not get much further that day. But where Dob tended to be passive, letting things happen to him, Pengo was more aggressive and outspoken. He told Sergei that he was well versed in VMS, and that he could bore his way into many different computers. By way of example, he named Mostek, a U.S. semiconductor maker; Teradyne, a Boston high-technology company; Thomson-Brandt; Philips in France; and Genrad in Dallas. He went on to list more conquests: SLAC, Fermilab, MIT, Union Carbide. If Sergei were interested in individual accounts and logins, Pengo said, he would sell them. For an account at the Jet Propulsion Laboratory, for instance, he suggested a price of 150,000 marks. Sergei didn't seem to be responding, so Pengo came out with the rest of his plan. First he suggested that he conduct hacking seminars for the Soviets. An alternative would be that the Soviets set him up to conduct safe hacking from East Berlin. Sergei said that didn't interest him. He took out his order list and read aloud from it. His "customers" back in Moscow, he said, needed UNIX and VMS source code and compilers. VMS version 4.5 alone could bring the West Germans 250,000 marks ($125,000), compilers another 30,000 marks each. As for the thirty or so pages of computer printouts the two young visitors had brought along, 186 a CYBERPUNK Sergei said he had no idea what to do with them. Nonetheless, in addition to the customary 600 marks, Sergei handed Carl an envelope packed with 100-mark notes and invited his two visitors out to a meal. As he and Carl left East Berlin and headed back to Dob's room at the Schweizerhof, they counted the money. It was 3,000 marks, of which Carl gave Pengo 1,000. Pengo felt less discouraged than self-important. He had made progress. A Russian KGB agent had listened to him talk for an hour. The Russian hadn't said yes, but then again he hadn't said no, and when he examined more closely the information Pengo had already provided, Sergei would be ready to deliver the VAX. Project Equalizer was becoming Pengo's own first step toward becoming a paid hacker—not just any hacker, but the best hacker in the world. He knew that he could get what the Russians wanted, if only he had the right equipment. A T A It was Markus Hess, the one who liked to hack alone, who turned out to be Cliff Stoll's intruder. When Markus and Hagbard had first met, Hagbard had told of being in Fermilab and CERN. With a little guid ance, Markus learned to explore around West Germany and Switzerland and the United States. Soon, he found a gateway into the Internet through University College, London. He called Hagbard immediately to have him come over and watch. The London computer was just the kind of springboard into the Internet they were looking for. From there they found a Tymnet node, and from there Hagbard discovered a way into a bank of modems at Mitre Corporation. Neither knew precisely what Mitre was, or even where it was, but it was a rich find. The modems at Mitre, it seemed, saved the last number called, and Hagbard and Hess could easily redial those numbers. That, was how they first happened upon a computer at the Anniston Army Depot and Optimis, a U.S. Defense Department computer data base with information about military studies. Optimis gave access to anyone who typed anonymous as a login and guest as the password. Guest and guest did the trick at Anniston. In the middle of 1986, Hess and Hagbard discovered SLAC in Cali fornia. Hagbard was content to stay there and poke around a bit, engag ing the system managers in occasional on-line conversation and chatting with others who had also found a way into the SLAC computer system. But Markus wanted to see where he could go from there. From SLAC he soon found a path that led to the University of California at Berkeley, and Lawrence Berkeley Laboratory. The Berkeley university computers Pthfie *+J* PwjuX E*j<**Oyt* T 187 foiled Markus's attempts to get in, but LBL was wide open. The labora tory liked to encourage outside researchers to use the LBL computers, and passwords at LBL were often the same as user names. The situation in Berkeley, in fact, seemed too good to be true. Security seemed to be a joke to these laid-back Californians. Hagbard, with his pedestrian approach and his lack of programming skill, didn't fully appreciate what the LBL computers had to offer. Mar kus, however, could spot bugs in programs and exploit holes in the system. He had been playing around with the GNU Emacs umovemailn program on the LBL computers and it dawned on him that the program had been installed to run with superuser privileges. It was a major dis covery. It freed him to wander through the LBL system as much as he liked. He began poking around in people's directories and looked for an account to appropriate that had lain unused for some time. It was always a better idea to use an existing account than raise eyebrows by creating a new one. He found that someone named Joe Sventek hadn't logged on for months and decided to become Sventek for a while. With superuser privileges, he could change his password to anything he pleased. Benson was one choice. Hedges was another. When he noticed that one of the people whose directories he was peeking into was getting suspicious, he logged out at once. From then on, he made certain to check to see who might be on the system whenever he logged on, just in case a real system manager was surveying the system's activities. Sometimes Hess connected straight to America; other times he went via the University of Bremen, another security sieve, where he added a new account for himself called Langmann and used the university's mo dems to dial out to the Datex-P international data network. From there he got to LBL. Others discovered the fuzzy security in Berkeley. In the early summer of 1986, a lot of different hackers broke into LBL, partly because it was easy to get into, and partly because it was so easy to go from LBL into other computers. And from LBL Hess could explore a rich array of other computers. Military sites offered a special thrill. He never logged on without checking a computer for its military informa tion. Before long, Markus had developed an expertise of sorts in U.S. military acronyms. A T A By late 1986, Stoll had settled into a routine based on the hacker's movements. Every time the hacker appeared, Stoll's pocket pager sounded. Whatever the time of day and wherever he was, in the shower, 188 a CYBERPUNK on his bicycle or sitting down to breakfast, Stoll would drop everything, call Tymnet to start a trace, then run to a computer, log on to the LBL system and watch the intrusion. But the hacker wouldn't stay on the line long enough for a trace to be completed. One Saturday in early Decem ber, Stoll came a step closer. A Tymnet trace showed one of the calls coming from a transatlantic satellite, and to the satellite from the DatexP network in West Germany. From somewhere in Germany, it seemed, the hacker called into Datex-P, asked for Tymnet and then connected to U.S. computers. By now, Stoll was locked in a Faustian embrace with the CIA, the National Security Agency, the FBI, the Air Force Office of Special Investigations and the Defense Intelligence Agency. But even as he probed his conscience, he was caught up in the excitement. As far as Stoll was concerned, any international links to the hacker smacked of intrigue. He envisioned spies muttering to one another in darkened alleys. Yet back in Berkeley, there wasn't much he could do. For all his vigilance, he was powerless. His success in tracing the hacking depended entirely on the cooperation he got from those authorized to do the tracing. He kept watching the hacker's every move. The wheels of the Establishment forces turned slowly; all Stoll could do was conjure up his own visions of "the other side"—and try to minimize the damage. If the hacker began to delete files or tamper with a system, Stoll could use the UNIX "kill" command to disconnect him immediately. And when the hacker seemed to be getting into computers containing sensi tive information, or tried to download sensitive files, or what Stoll could only surmise were sensitive files, Stoll employed a low-tech but effective solution: he took his keys from his pocket and dangled them next to the wires connected to the hacker's line, shorting out the circuit for just an instant. To the hacker, it looked as if his connection was being inter rupted by simple line noise and he would try again. Again came the keys. Eventually the hacker would give up. The next step was to trace the call within Germany. Stoll stood by as the network experts at Tymnet negotiated with the Bundespost authori ties to put on a trace. Finally, he got word that the call had been made from the University of Bremen. The German authorities informed the university that its computer systems were being infiltrated by an outsider. Flustered by the news, the university shut down all outside connections for three weeks. But that didn't seem to stop the hacker. The next trace showed he was coming from Hannover. But even that wasn't conclusive proof that he was a German. Who was to say that Hannover wasn't just Pchfc mU Pwjut E Pi*jut E^4**JUyt* t 193 attorney was on the scene, and the police investigators grew discernibly more cordial. As the police searched through every nook in sight, Hess made a pot of coffee and he and his lawyer waited for them to leave. After two hours the search ended, and, since they weren't quite sure what they ought to be looking for, the officers left with Hess's two home computers and dozens of papers tucked under their arms. Markus re turned to Focus, where the search was still in progress, picked up a few of his things and went straight to the Casa Bistro, where the weekly hacker meeting was just getting started. He said nothing about what had just happened. He was back at work the next day. Hess's attorney promptly filed a complaint on behalf of both Focus and Hess, charging that a search had been conducted based on insuffi cient evidence. The surprise visit had been enough to scare Hess away from hacking, but not enough to stop him from supplying Peter Carl with software for Sergei. The money was so easy to get that it was difficult to turn his back on it. Since late 1986, he had received reasonable pocket money— always in cash and always in 100-mark bills—in exchange for the various programs he had handed over to Carl, many of which he had simply copied from Focus computers. That, Hess reasoned, was a completely separate matter from the hacking. Hess was less taken with the conspir atorial, adventurous side that the others seemed to enjoy so much. He knew that Pengo and Dob had accompanied Carl to East Berlin, but he had no desire to go. Aside from a family vacation to Yugoslavia he had made as a child, Hess had never been to an East Bloc country, and he had no intention to go now. He was content in his role as the software provider. A T A It wasn't until Peter Carl produced the UNIX source codes from Hess that Sergei made a first substantial payment of 25,000 marks—about $12,500—in 100-mark notes. Carl noticed that on the lists he kept, Sergei had crossed out "UNIX" and written "25,000" next to it. Carl also noticed that a notation for IBM's VM operating system had been crossed out and "50,000" had been scribbled next to it. Curiously, "VMS" was also scratched out, even though Carl hadn't yet been able to deliver it. Acknowledging Carl's confusion, Sergei remarked, "You have competition." After that, the payments amounted to 3,000 marks here and 5,000 marks there for bits of software that Sergei thought were worth some- 194 a CYBERPUNK thing. Carl's practice was to keep at least half of the money for himself and dispense the balance to the provider of the goods. After all, he figured, why not keep at least half the money when he was doing the dirty work? Carl had lost his job at the Hannover casino in the midst of a highly publicized table-fixing scandal, so the income from the Soviet business was becoming important to him. Still, no one was getting rich from the scheme, and by the time the whole business was over, Sergei would dispense roughly 90y000 marks to the group. After his meeting with Sergei, Pengo was hacking as often as he could. He broke into the Japanese branch of Lotus Development Cor poration, but found nothing. Every time Carl dropped by on his way to see Sergei, Pengo had to tell him he had nothing to offer. His ability to hack uninterrupted was a function of his access to passwords and NUIs, and by the end of 1986, stolen NUIs had a much shorter useful life. The Bundespost had developed far more sophisticated means of tracking down abused NUIs. In fact, once a NUI was discovered, if it was shared, it disappeared with a few days. So hackers had stopped sharing NUIs. Pengo, too, guarded the ones he used closely. With a NUI in hand, he could stay on line for at least two weeks, doing nothing but hacking. Without one, he stayed off line, stoned most of the time, programming here and there, occasionally hitting up Dob for a good meal and some hash. Pengo was beginning to be extremely careful with his work. He tried to maintain as low a profile as possible. When he was breaking into computers on the Easynet, Digital Equipment's internal electronic mail network and the place where he thought he might find VMS source code, he probed only as much as he knew was safe without being de tected. But it was a frustrating exercise. Aside from the source code and compilers, Pengo suspected Sergei wanted not just any military material, but information on sensitive military networks, along with detailed in formation about the logical setup of the U.S. military machine, in order to infiltrate it. But to find that kind of information, he wasn't sure where to begin. He became less and less willing to share information with others, such as those from the Hamburg/Chaos scene. He had already made the mistake of telling Obelix and the others about the Digital computer in Singapore, and within a few days the machine was locked down. Now that he was to make a livelihood from hacking, the stakes seemed higher. It wasn't ideology that made Pengo want to be a paid hacker for the Soviets. Despite what he had said to Sergei, Pengo didn't feel particu- PtA^o **U Project E*>jut E*j«*lty* ▼ 197 and he hadn't produced any source code for the Siemens computers he was so expert in. Carl had even taken Dob to East Berlin a second time so that Sergei could try to get him motivated, but he was increasingly indifferent. Markus Hess was the only one who seemed to have Sergei's respect. Sergei told Carl he was glad that Hess didn't take drugs and pleased that Hess had come up with the source code to Berkeley UNIX. Most im pressive to Sergei was Hess's expertise in U.S. military computers. Indeed, Hess was the only one who came through with any regularity. Gradually, it seemed, the scheme had deteriorated from the great hope of the million-mark coup to just seeing what they could get away with. Some of Sergei's more gullible purchases, in fact, originated with Hess. As soon as Minix, an operating system with the look and feel of UNIX, came into the Focus office in late 1987, Hess copied it and handed the copy to Carl. Sergei handed Carl 4,000 marks ($2,000) for the software. When Sergei later discovered, apparently from reading an American computer magazine, that Minix source code normally sold for 120 marks, he was furious. But that didn't stop Hess. A few months later, Hess filled a disk with UNIX software, freely distributed at the last European UNIX User Group meeting, and Carl sold it to Sergei for 2,000 marks. When Sergei found out that it was all public-domain software, he warned Carl never again to sell him something like that. Carl's reaction was indiffer ent. At least Hess was producing. Pengo couldn't even come up with a list of passwords. Dob, too, was losing his patience with Pengo. More than anything, Pengo just seemed irresponsible and self-absorbed. For months, Pengo had been using Dob's Rainbow computer, a Digital computer similar to an IBM Personal Computer. When Dob left for a vacation in Nairobi in the summer of 1987, he asked Pengo to retrieve from the computer a bill for work Dob had done and send it on to his employer. Despite profuse promises, the matter slipped Pengo's mind and the bill remained un touched in the computer. Dob flew to Kenya via Amsterdam, but on his way back from Kenya the flight made a stop in Hannover. He was arrested almost immediately at the airport on charges of evading his military obligation. Dob sat for weeks in prison in Hannover and it wasn't until he saw his funds dwindle to nothing that he discovered Pengo hadn't done the small favor he had asked of him. It translated to a loss of nearly 10,000 marks for Dob. To further erode their friendship, when the Rainbow broke, Pengo neglected to have it fixed. Then, in the late summer of 1987, the hack that was to focus world 198 a CYBERPUNK attention on the Chaos Club happened. The NASA hack, as it came to be called, had been started innocently enough by a group of Chaos hackers as a simple, if all-consuming game of seeing how many comput ers could be reached on the space agency's vast SPAN computer net work. The NASA hackers did it by inserting an ingenious piece of software of their own invention into VMS version 4.5. VMS 4.5 was approximately the twenty-eighth iteration of Digital's operating system. Each time an operating system is updated and new features are added, new security flaws almost inevitably arise. Often, they go unnoticed. When a small group of Chaos hackers discovered a flaw in VMS 4.5, they seized on it and wrote what they called "the Loginout patch." It was a clever little Trojan horse program embedded in the VMS source code designed to collect passwords on any computer they entered. And it was the very piece of code that Kevin Mitnick and Lenny DiCicco would independently discover a year later and use to infiltrate scores of Digital's own computers. In two computers named Castor and Pollux at NASA headquarters in Washington, the group had found shuttle proposals and reports on booster rockets. This was not particularly sensitive information, but NASA didn't necessarily want its files opened up to a pack of curious West German computer hackers. Obelix, who was part of the group, had been keeping a list of all the computers they penetrated. But there came a time when the hackers lost count of the machines they had infected with their loginout patch—it could have been 150, or it could have been 500. They began to fear that the Trojan horse could run out of control. Someone more malicious than curious could find it, copy it, install it in another computer and cause some real damage. It was time to notify someone official. Their first idea was to inform Digital itself and leave the problem in the company's hands. But after thinking it through, they decided that it might not be the best idea: Digital was likely to respond with a call to the police. Their next thought was to alert the American ambassador, but they rejected that idea because, they decided, he probably wouldn't under stand what they were talking about. The NASA hackers decided to tell Wau Holland and Steffen Wernery. The two Chaos leaders weren't sure how to react, so they called two television journalists, Thomas Ammann and Matthias Lehnhardt. At thirty-one, Thomas Ammann was well established as a free-lance television journalist who did most of his work for "Panorama," a West German television magazine. Ammann specialized in technology and, Pt+$e mJ- Pi*jut Ey*d«p\ T 199 of course, the German hacking scene. The thirty-seven-year-old Lehnhardt was Ammann's terse and cynical partner. The journalists sat down with the Chaos leaders, who told them the story and said they were planning to inform the authorities. Eager to save the story for them selves, the journalists tried to discourage them. They argued that it would just bring an unwelcome investigation and put Chaos in a bad light. But Wau and Steffen thought the material they were sitting on was too sensitive to withhold. Eventually, they reasoned, it would come out anyway. A few days later, they called a contact who, they believed, might know whom to call at the Bundesamt fur Verfassungsschutz, a West German agency roughly equivalent to a domestic CIA, and they asked their contact to inform the agency. As it turned out, the agency itself wasn't sure what to do with this odd, indirect confession. Without informing DEC or NASA of the problem, the Verfassungsschutz simply sat on the matter, Ammann and Lehnhardt decided to force the matter into the open and rushed to put together a program for "Panorama" about the hack. NASA refused to comment. Digital public relations, holding firmly to a policy of refusing comment on sensitive matters, didn't return the journalists' telephone calls. After a dozen attempts to rouse someone at the Digital office in Munich, Lehnhardt finally spoke with a public relations woman and challenged her directly. "This doesn't look very good for DEC," he said, hoping to chisel loose a response. "I know, but we can't say anything," came the answer. On September 15 the show aired, declaring that NASA's top-secret network had been violated. File footage of the shuttle hurtling into space filled television screens throughout the Federal Republic, as if to imply that as a result of their wanderings inside the NASA computers, the hackers could manipulate a shuttle launch. The journalists even inter viewed Obelix, citing him as an outside computer security expert. Obelix commented on the hackers as if he had no idea who they were. The program threw Digital's Munich office into some disarray. West German hackers discovering a gaping hole in Digital's operating system was hu miliating enough. The fact that they were romping undetected for months was even worse. Finally, NASA confirmed that hackers had been in the SPAN network but insisted that they had only browsed through insignificant information. For his part, Pengo had kept his distance from the NASA incident. A year had passed since his trip to East Berlin and he had stopped trying to hack for Sergei. He had gotten no response whatever from his first 200 a CYBERPUNK delivery, none of the feedback he was hoping to see. It was a big disap pointment, especially for someone whose ambition had been to become the world's greatest hacker. Moreover, Carl's visits and phone calls had tapered off, a signal that he wasn't placing much stock in Pengo's con tributions any longer. There had been no formal ouster, but Pengo figured he was no longer part of the group. It appeared that the whole espionage affair was dying down. It even looked as if the hackers weren't going to get caught. Pengo's attention had turned to other things. He was looking for a way to go straight. He had just started his own small company with a friend in Berlin named Clemens. Called NetMBX, the small firm would write networking soft ware, do some consulting and run an electronic bulletin board. Starting out with Clemens's equipment and the merest whiff of start-up capital, . the two budding entrepreneurs set up shop in a cramped little office on the outskirts of West Berlin. Pengo was still enrolled at the technical university, but he neglected his studies to flirt with the possibilities of capitalism. He joked that he was becoming a "yoopie." A T A Stoll's frustration was mounting. Five months had gone by since the first successful trace and the authorities were as reluctant as ever to let him in on their side of the investigation. Finally, in late June, Stoll got a call from the FBI telling him that the hacker had been apprehended, and his home and office searched. But Stoll still couldn't pry loose a name. With the hacker caught, LBL no longer had to lure him in with its flimsy security. That day, Stoll's lab changed its passwords and tightened security. The attempts at the LBL system stopped. Stoll was able to pat himself on the back and at the same time expound to his colleagues on what he considered to be the moral questions raised by this act of illegal computer joyriding. These computer networks, Stoll argued, which scientific researchers, computer scientists and students depend on for sharing information and for coop erative work and even for sending electronic love letters, assume a cer tain level of trust. And as the reach of the networks grows, so too must the trust. How, then, can computer scientists expect to build and main tain open networks such as the Internet if someone like the Hannover hacker is going to abuse the networks? For Stoll, the incident high lighted an insoluble dilemma: security versus information exchange. Stoll began to think about publishing the story of how he chased the West German hacker. In early 1988 he sent out a book proposal and Pchge toJ- P^ojut E^i^JU^ T 201 prepared a technical paper for a computer journal on the various entrap ment methods he had used. But in April, a few weeks before his techni cal article was to appear, he was preempted when a story about the Hannover hacker came out in Quick magazine, a West German hybrid of People and Vanity Fair. The magazine identified the hacker as Matthias Speer, a play on Markus Hess's name based on the fact that both names —Speer and Hess—were also those of prominent Nazis. Mysteriously enough, the story relied heavily on Stoll's logbook, the very logbook that he had turned over to the FBI and the CIA months before. Some one, Cliff decided, most likely the authorities in Bremen, must have leaked the contents of his logbook to Quick. Shortly after the Quick story appeared, The New York Times put the story of the West German hacker on its front page, mentioning espionage and the Pittsburgh letter for the first time. The laboratory then held a hurried press conference. Within a few days, the story of the hacker who had roamed freely inside sensitive U.S. computers was everywhere. One diligent reporter even managed to root out Hess himself and journalists began to call his house. Hess took cover from the press. After his bust the previous June, he had stopped hacking entirely. But he hadn't stopped supplying Peter Carl with software to take to Sergei. In early 1988, Hess sent over a magnetic tape containing a copy of X Windows, an advanced software program, with the GNU Emacs program—the very software he had used to gain superuser status at LBL—as an extra bonus. He was rewarded with 2,000 marks. During his June interrogations, he figured out that his LBL excursions had been traced. But he was taken completely by surprise to learn that he had been monitored so closely. And he was shocked to see his photograph in Quick, a picture that had been taken through the window of his apartment while he sat at the computer. The Balogh letter, in particular, created quite a stir in Germany. A T A As it turned out, Laszlo Balogh was another strange character. Howard Hartmann's wife had long since decided that Laszlo Balogh was a "charming snake." But Hartmann was more understanding. After all, he had known Balogh for nearly twenty years, and had even hired the Hungarian emigre at his small geological surveying firm in Pitts burgh. The thirty-seven-year-old Balogh had immigrated to the United States in 1959, settled with his family in Pittsburgh, attended local technical schools and, through the sixties and seventies, worked at local 202 a CYBERPUNK firms as an engineering technician. The attributes Mrs. Hartmann thought unsavory Hartmann decided had more to do with Laszlo's "other" life. Laszlo Janos Balogh had always cultivated an aura of mystery. When Hartmann hired Balogh as an $8-an-hour technician in 1984, the tall and dark-haired Hungarian, who bore a slight resemblance to Omar Sharif, told Hartmann that there would be periods when, because of his work for the U.S. government, he would have to leave town for two or three weeks at a time. Laszlo's resume stated that from 1966 to 1985, he worked for the FBI and the CIA "as a consultant on counter intelli gence." Hartmann already knew a little bit about Laszlo's other life. A year earlier, Laszlo had been in the Pittsburgh newspapers when he blew the whistle on former associates who had been planning to sell millions of dollars' worth of stolen computer parts to Soviet agents in Mexico. The suspects' defense attorneys had disputed Balogh's credibility and accused him in turn of stealing diamonds. The three defendants in the illegal exports case said Balogh had boasted to them of being a CIA hit man, a black belt in karate and a bodyguard for two Kuwaiti princesses. Laszlo also had his own small firm, called Triam International, which provided security and surveillance services. Triam had European connec tions, Laszlo told Hartmann, so he would be making occasional calls overseas from Hartmann's business telephone, but he would promptly pay the firm's bookkeeper for the calls. Laszlo also hired Hartmann's daughter, Linda, to type occasional letters for Triam. Laszlo promised that he would conduct all of his own work outside of normal office hours. The arrangement seemed perfectly acceptable to Hartmann. Balogh was a hard worker and a competent technician. As long as Laszlo was working in the interests of the U.S. government, Hartmann saw no reason to object to the unconventional arrangement. Hartmann had only one stipulation for Balogh. "I don't want anything that would bring any discredit to my firm," Hartmann warned. "Oh, that's no problem at all," Balogh responded. Hartmann had trouble figuring this complex character out. Why would he work for so little pay when his other life offered so much excitement and material reward? "There's only so much excitement I can take," Laszlo responded. He told Hartmann that he didn't care much about the money, and he just wanted to keep a low profile. P(4^c *+J. Pwjut E