home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
UNDERGRD
/
VOL_1
/
CUD112C.TXT
< prev
next >
Wrap
Text File
|
1994-11-01
|
16KB
|
276 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.12 (June 10, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer
REPLY TO: TK0JUT2@NIU.bitnet
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------
***************************************************************
*** Computer Underground Digest Issue #1.12 / File 3 of 5 ***
***************************************************************
Stoll, Clifford. The Cuckoo's Egg. Doubleday, 1989. 326 pp.
(Reviewed by Charles Stanford)
Stoll's work has received extremely mixed reviews, and most of the
reviews were based on the reviewers' personal attitudes towards computer
use. This review is no exception, but it does attempt to address some of
the literary concerns that should arise in a book review.
Stoll takes us on a "spy hunt" -- it is not a fluke that the book is
located right next to "I Led Three Lives" and other laughable works of
espionage fiction disguised as reporting. His grant money "ran out" and
so, to keep eating, he begins to work for the computer center in Berkeley.
(No explanation of why it "ran out." Did he complete the work? Was his
renewal rejected through the "peer review process?" Did he even try to
renew?) There is a 75 cent shortfall and he is given the task of finding
out where that 75 cents went. He describes his subsequent activity with
remarkable candor, guilty as he may be of committing several crimes
himself. He finally gives information leading to the arrest, but not
necessarily the conviction, of a "hacker." That's about it.
One of the most annoying aspects of the book is not, however, Stoll's
pursuit of the hacker but his interminable self-justification and annoying
self-description.. One has the feeling that Stoll himself knows that his
activity was obsessive and nearly insane because he so often attempts to
justify it, painting himself as a liberal hippie type wearing blue-jeans
and complete with long hair and a "sweetheart" who can beat him at
wrestling. How cool it all is! Like, man, geez, like. We learn of him
putting his tennis shoes in the micro-wave and how he rides a bicycle to
work uphill and how he believes in love and trust and the Grateful Dead and
how he and his "sweetheart" eventually get married and live happily ever
after. He grows up, you see. Not since "Love Story" by Eric Seal have I
seen such a vapid piece of self-indulgence. I was about to say at least
Eric Segal . . . , but really could not think of anything that would
differentiate the two.
Almost at random, we can look at some of his less personal statements
and see this same thread: "As pure scientists, we're encouraged to
research any curious phenomena, and can always publish our results." (P.
15) Unfortunate that this particular "pure scientist" lost his grant. But
what about that curious phenomena? What about a strange computer or a new
computer? Is that not curious phenomena? No, because the "varmit" was a
"hacker" and therefore wearing a "black hat." No, I am not paraphrasing,
these are Stoll's actual words. He really isn't a hippy after all -- he is
a frustrated Hopalong Cassidy, the Lone Ranger with his faithful sidekick
"sweetheart," tracking down the varmits, by gum!
I have also heard that some of the techniques he describes in the book
have been used by "hackers" to gain access to mainframe computers but,
before you run out and buy the book on that account, allow me to present
some of the information Stoll gives. He starts out by trying to monitor
every single call coming into the computer, grabbing P.C.s from offices for
that purpose. He finally applies his expertise. He notices that the calls
come in at 1200 baud and are therefore from outside and would therefore
come in only on certain lines. Amazing bit of deduction, wouldn't you say?
You see, he points out, 1200 baud is a slower rate of transfer than 9600 or
more. And he even explains what "baud" is. With such esoteric information
as this getting out all over the country, I wonder why this book hasn't
been suppressed. We also learn that Kermit is a file transfer protocol.
Of course there are some things in the book that the normal 12 year
old with a Commodore 64 might not have known and this book is conveniently
written on that level. For example, if you want to logon to a Unix system,
try the password "root," logon "root." If that doesn't work, try "guest."
If that doesn't work, try UUCP. If you are 12, perhaps Stoll has sent you
on to a life of crime. On a VAX, try "system" account, password "manager,
"field, "service," and "user," "user." (p.132). And don't forget the
Gnu-Emacs hole (132-133). Of course, one would be much better off in
simply getting hold of a UNIX manual and reading it, but then he would not
have had the fun of learning all about "sweetheart" and her halloween
parties as well. I'd put the money on the manual. Actually, of far more
interest in this area would be the article he published on the subject
which is cited in the book ("Stalking the Wily Hacker," Communications of
the ACM, May, 1988).
More troubling is Stoll's use of the term "hacker." He uses it in its
popular, media, law-enforcement definition which is, loosely put, "varmit."
According to the HACKERS DICTIONARY, available from listserve@uicvm, this
is the definition of a Hacker:
HACKER (originally, someone who makes furniture with an axe n. 1. A person
who enjoys learning the details of programming systems and how to stretch
their capabilities, as opposed to most users who prefer to learn only the
minimum necessary. 2. One who programs enthusiastically, or who enjoys
programming rather than just theorizing about programming. 3. A person
capable of appreciating hack value (q.v.). 4. A person who is good at
programming quickly. Not everything a hacker produces is a hack. 5. An
expert at a particular program, or one who frequently does work using it or
on it . . . . 6. A malicious or inquisitive meddler who tries to discover
information be poking around.
Obviously, only the last, and least used, definition even remotely
approaches the term "varmit." Unfortunately, many hackers, when approached
by law enforcement officers, will readily admit to being hackers when
questioned about it. Don't make that mistake, varmits.
As a self-proclaimed hippie-type, Stoll has his greatest trouble in
explaining why he is so close to the CIA and FBI (which, by the way, had
the most sensible approach to this whole episode). Now what could you
possibly come up with to explain that sort of activity. Unfortunately,
being a hippie by self-definition, he could not use patriotism. He
couldn't say he was in it for the money (which he is, despite his
protestations to the contrary) since that is not hippieish -- it is
"uncool." He comes up with "trust." A nice, honorable, clean sounding
term. Yes, trust it shall be. You see, all the network users trust each
other, now don't they? The proposition is almost laughable to anyone who
has ever been on a network, but Stoll will talk about the community of
trust that has been established, a trust that is being destroyed and eroded
by varmits. His appropriation of that word is almost obscene when one
considers what his self-aggrandizement has done to that very trust he so
val