|

#hackers #tech #culture

Metadata

Highlights

“The cDc people were, at least for the most part, up until the later 1990s, more interested in writing, music, art, and that sort of thing,” Paul said. “The technical issues were subsidiary to that.” He embraced the do-it-yourself publishing culture that overlapped with music and zines like Boing Boing, which morphed from paper to electronic form and is one of the few still around from back in the day. — location: 306 ^ref-45030


The political divide in America at the end of the 1960s was the worst until the 2000s, and that helped push phreaking in a radical direction. The phone companies were very clearly part of the establishment, and AT&T was a monopoly to boot. That made it a perfect target for the antiwar left and anyone who thought stealing from some companies was more ethical than stealing from others. — location: 347 ^ref-3463


Even before the Dead had their name, they were a part of Ken Kesey’s Merry Pranksters, the eclectic and idealistic group that drove through America to have fun messing with people and to spread the good news about LSD. Another Prankster, visionary writer and marketer Stewart Brand, would also help spread the good news about the coming age of computing. — location: 393 ^ref-49390


“Humor is one of the great binding things in the world,” Barlow said, and something that cDc shared with the Pranksters was using humor to question the legitimacy of power. As with hackers, Barlow said, “the thing about acidheads is, they think authority is funny.” — location: 404 ^ref-6824


cDc survived those sweeps because it was more of a social space, a refuge for hackers blowing off steam, than a place to plot actual hacks that ran afoul of the law. — location: 434 ^ref-62805


After Stoll complained that hackers should not be free to enter networks to obtain financial histories from the big credit bureaus, Barlow said he was far more bothered that unaccountable corporations had gathered such data in the first place, which he equated with thievery: “Anybody who wants to inhibit that theft with electronic mischief has my complete support.” — location: 465 ^ref-3082


With informants everywhere, it was hard to build trust, especially online. In person, it was easier. “There were a lot of drugs, a lot of people on acid, but you bond through that,” Bednarczyk said. “Now you have someone you’ve met and trust, and that builds relationships that are pretty strong.” In those relationships, people gave information and received it. Everyone learned more about what was doable and how to do it. — location: 507 ^ref-31534


“Our main priority is to create and continuously evolve an environment that fosters an atmosphere of dynamic creativity, coupled with access to information and ideas, that present you with a far greater spectrum of possibility.” — location: 543 ^ref-44602


At least five from cDc were there, including founder Kevin Wheeler and Matt Kelly, all of whom gathered to live-write some of what would be cDc’s two hundredth text file overnight. After slick homages to Phrack, teen girl magazine Tiger Beat, and the Encyclopedia Brown mysteries for kids, the file described the gogo dancers, drugs, and mayhem of the event, as well as telling an absurdist origin story for the cult that involved monster trucks. Not much of that part made sense, yet file #200 would prove the most popular among cDc’s own members. — location: 557 ^ref-19128


Industries. For those handling information as sensitive as unpublished software flaws, twelve or thirteen was too young to trust. So the more experienced hackers would wait until the 2600 meeting wound down and then head off to a nearby bar for what they called 2621—the meeting of the subset old enough to be served alcohol. — location: 762 ^ref-4707


Because cDc wanted maximum impact, it needed maximum press. For that to happen, it had to have a touch of evil, Kevin reasoned, the same way a punk or metal band craved condemnation. “The hip press has to love us and the square press has to hate us for this to work. That’s the eternal conflict in society to play off and ride,” he wrote to the group. “The day [evangelist] Pat Robertson says something positive about cDc is the day we’re over. The conflict, the drama is what makes this interesting and worth writing about.” — location: 1258 ^ref-46132


“If your security is not strong enough to stop script kiddies with publicly available tools, then you have no hope of securing your network from professionals waging war,” he wrote. “Wake up people, it’s going to get much, much worse.” — location: 1310 ^ref-13854


The Chinese government provided the perfect catalyst to push cDc into politics. It hated the free flow of information, a core value of cDc and the hacker movement it helped lead. China also naturally opposed the US government, where some of cDc and many of their friends and relatives worked. And China was doing business with the same companies cDc loved to hate, chief among them Microsoft. — location: 1391 ^ref-14191


“I knew the arrival of the net was liable to be as powerful in a very negative way as it was powerful in a very positive way. If it was possible for everything to be known for everyone curious about it, it was also going to be possible for just about anyone everywhere to devise turnkey totalitarianism, where they could flip a switch and see everything you are up to.” Barlow wanted to “set cultural expectations,” he said, to strengthen the side of righteousness for the battles to come. — location: 1414 ^ref-46453


For all its calculated omissions and excesses of passion, Barlow’s howl resonated with a burgeoning crowd of technologists, aspirants, and consumers who badly wanted the government to do anything other than screw up the greatest invention of their lifetimes. — location: 1420 ^ref-61602


A key idea was citing not just the Universal Declaration of Human Rights, which was nonbinding, but also the International Covenant on Civil and Political Rights, which was less well-known but had the force of a treaty. — location: 1610 ^ref-2182


But the culture of the unkempt rebels in the rank and file clashed with that of the suits making sales pitches and controlling the budget. Sketchy pasts and big personalities abounded. Some employees missed a major customer meeting because they had been up all night doing drugs. — location: 1712 ^ref-45838


The analyst asked for the street address of the café. When Rodriguez told him exactly where he was, the analyst laughed. “No problem, you don’t have to send anything,” he explained. “Back Orifice is on all of those machines.” To signal where he wanted Rodriguez to sit, he remotely ejected the CD tray from one machine. Then he read everything Rodriguez wrote as he typed out the best on-the-ground reporting from Beijing. Rodriguez erased what he had typed and walked out, leaving no record of the writing. — location: 1778 ^ref-38351


“It occurs to me how severely the trajectory of my own career has taken me from idealistic anarchist, to corporate stooge, to ambitious entrepreneur, to military/intelligence/defense/law enforcement adviser,” wrote one. “Many cyber guys started out somewhere completely different and then somehow found themselves in the center of the military-industrial complex in ways they would never have been prepared for.” — location: 1829 ^ref-43595


And when they ran out of ideas, they rented out their botnets to strangers who could try other tricks. On top of all that, international espionage was kicking into higher gear, sometimes with allies in the criminal world aiding officials in their quests. — location: 1871 ^ref-63709


Careful thought went into what tasks they took on and for whom. “We were pirates, not mercenaries,” Beck said. “Pirates have a code.” — location: 1884 ^ref-10950


Going deeper, Snyder argued that criminals would target Apple users less if the company held less data about them. But more data also made for a seamless user experience, a dominant theme at Apple, and executives kept pressing Snyder for evidence that consumers cared. — location: 1894 ^ref-13786


In large part due to Snyder, Apple implemented new techniques that rendered iPhones impenetrable to police and to Apple itself, to the great frustration of the FBI. It was the first major technology company to declare that it had to consider itself a potential adversary to its customers, a real breakthrough in threat modeling. — location: 1897 ^ref-64901


“It was a time of moral reckoning. People realized the power that they had,” Song said. Hundreds of focused tech experts with little socialization, let alone formal ethics training, were suddenly unleashed, with only a few groups and industry rock stars as potential role models and almost no open discussion of the right and wrong ways to behave. — location: 1944 ^ref-17775


He opposed the denial-of-service attacks as censorship, arguing that the cure for bad speech is more speech. — location: 2247 ^ref-45454


Davis explained why he thought LulzSec had so much of the public behind it: “What we did was different from other hacking groups. We had an active Twitter (controlled by me), cute cats in deface messages, and a generally playful, cartoonlike aura to our operations. We knew when to start, we knew when to stop, and most of all we knew how to have fun.” — location: 2260 ^ref-6470


The Russians had the motive to steal US hacking tools, the means to do it, and the opportunity. Russia was also one of the few suspects with so many of its own tools that it could afford to dump those of the US instead of hoarding them for its own use. The timing is particularly interesting, since the NSA dumps began in August 2016, two months after the DNC breach was disclosed. Russia created chaos and distraction inside the agencies best able to find the source of the DNC hack and strike back, helping to paralyze the Obama administration and mute its response. — location: 2553 ^ref-13774


Others were beginning to think more about the meaning of free speech when the immediate problem in many countries was not the inability to speak but the propensity to get drowned out by manufactured voices directed by governments and big economic forces. — location: 2624 ^ref-49628


Others in cDc, looking at the mixed motives as geopolitical priorities ascended, opted to go back to basics on defense. By making the internet safer for everyone, they could chip away at the unfair advantage the net had been giving to attackers since the beginning. — location: 2636 ^ref-7405


the Defending Digital Democracy project at Harvard’s Kennedy School of Government, — location: 3042 ^ref-1976


IN ITS EARLIEST days, the chief moral issues for the teens in the Cult of the Dead Cow were how badly to abuse long-distance calling cards and how offensive their online posts should be. But as they matured, the hackers quickly became critical thinkers in an era when that skill was in short supply. — location: 3177 ^ref-38704


One lesson from the Cult of the Dead Cow’s remarkable story is that those who develop a personal ethical code and stick to it in unfamiliar places can accomplish amazing things. — location: 3184 ^ref-42717


Another is that small groups with shared values can do even more, especially when they are otherwise diverse in their occupations, backgrounds, and perspectives. In the early days of a major change, cross sections of pioneers can have an outsize impact on its trajectory. After that, great work can be done within governments and big companies. Other tasks critical for human progress need to be done elsewhere, including small and mission-driven companies, universities, and nonprofits. — location: 3185 ^ref-18819


“Security is about how you configure power, who has access to what. That is political,” Song said. — location: 3211 ^ref-34586