Выбрать главу

''I really don't remember how he got in; I was sitting there while he typed. But to see these other systems were out there was sort of interesting. I saw things like shopping malls – there were heating computers you could actually call up and look at what their temperature settings were. There were several of these linked together. One company ran the thermostat for a set of different subscribers, so if it was projected to be 82 degrees outside, they'd adjust it to a certain setting. So, back when we were thirteen or so, we talked about how it might be neat to change the settings one day, and make it too hot or too cold. But we never did.''

But they could have, and that's what matters. They gained access. In Cyberia, this is funhouse exploration. Neidorf sees it as ''like when you're eight and you know your brother and his friends have a little tree house or clubhouse somewhere down in the woods, and you and your friends go and check it out even though you know your brother would basically kill you if he found you in there.'' Most of these kids get into hacking the same way as children of previous generations daringly wandered through the hidden corridors of their school basements or took apart their parents' TV sets. But with computers they hit the jackpot: There's a whole world there – a whole new reality, which they can enter and even change. Cyberia. Each new opening leads to the discovery of an entirely new world, each connected to countless other new worlds. You don't just get in somewhere, look around, find out it's a dead end, and leave. Tom Sawyer and Becky Thatcher were fascinated by a few winding caves; cyberkids have broken through to an infinitely more complex and rewarding network. Each new screen takes them into a new company, institution, city, government, or nation. They can pop out almost anywhere. It's an endless ride.

As well as being one of the most valuable techniques for navigating cyberspace, hacking the vast computer net is the first and most important metaphor in Cyberia. For the first time, there is a technical arena in which to manifest the cyberian impulses, which range from pure sport to spiritual ecstasy and from redesigning reality to downright subversion.

Crashing the System

David Troup gained his fame in the computer underground for a program he wrote called The Bodyguard, which helps hackers maintain their chain of connections through a long series of systems breaches. Through another ingeniously exploited communications system glitch, we spoke as he relaxed on his living room couch in Minnesota. From the sound of his voice I knew he was using a speaker phone, and I heard several of his friends milling about the room, popping open beers, and muttering in agreement with Troup, their local hero.

''The fun of hacking lies in the puzzle solving. Finding out what lies around that next corner, around the next menu or password. Finding out just how twisted you can get. Popping out of a computer-based network into a phone-based network and back again. Mapping networks that go worldwide. We watched a system in Milwaukee grow from just two systems into a huge network. We went with them. By the end, we probably had a more detailed map of their network than they did. ''

The Bodyguard has become an indispensable part of the hacker's daytrip survival kit. ''It's kind of a worm [a tunnelling computer virus] that hacks along with you. Say I'm cruising through fifteen Unixes [computers that run Unix software] to get at some engineering firm. Every time I go onto a Unix, I will upload my Bodyguard program. What it does is watch me and watch the system. It's got the names of the system operators. If a system operator [''sysop,'' the watchdog for illegal penetrants] or somebody else who has the ability to check the system logs on [enters the network through his own computer], the Bodyguard will flash an error flag [warning! danger!] and terminate you at that point. It also will send you a number corresponding to the next place down the hierarchy of machines that you've penetrated. You'll have your last connection previous to the one where you got canned. It will then reconnect you to where you were, without using the system that knocked you off. It'll recreate the network for you. It takes about four or five minutes. It's nice because when you're deep in a group of systems, you can't watch everything. Your Bodyguard gets you off as soon as a sysop signs on, before he even knows you're there. Even if they just log in, you hit the road. No need to take any chances.''

While the true hacker ethic is not to destroy anything, most young people who find themselves in a position where it' possible to inflict damage find it hard to resist doing so. As Troup explains, ''Most kids will do the most destructive thing they know how to do. There's nothing in there that they need, or want, or even understand how to use. Everybody's crashed a system now or then.''

Someone at Troup's end coughs in disagreement and paranoia. David corrects himself. No need to admit he's ever done anything illegal, now, is there? ''I'd say 90 percent of everybody. Everybody's got that urge, you know? `God, I've got full system control – I could just do a recursive rm [a repeated cycle to begin removing things] and kiss this system goodbye.' More likely, someone will create a small bug like putting a space before everyone's password [making it impossible for anyone to log on] and see how long it takes the system operator to figure it out.'' The passwords will appear correct when the system operator lists them – except that each one will have a tiny space before it. When the sysop matches the user's password with the one that the computer says the user should have, the operator won't notice the extra space before the computer's version.

This is the ''phony phone call'' to the nth power. Instead of pranking one person on the other end, the hacker incapacitates a big company run by "nasty suits.'' Hard to resist, especially when it's a company known to keep tabs on us. The events that frightened Troup out of hacking for a while concerned just such a company. ''TRW is the Holy Grail target for hackers. They're into everything, which is why everyone wants to get into them. They claimed to be impenetrable, which is half the reason why everyone wants to get in. The more you look into it, the more security holes they have. They aren't so bad.'' One of Troup's friends in the background chortles with pride. "It's difficult, because you have to cover your tracks, but it's not impossible. Just time-consuming,'' Troup explains.

''I remember TRW used to have those commercials that just said `TRW, making the world a better tomorrow.' That's all they did. They were getting us used to seeing them. Because they were into everything. They sent Tiger Teams [specialized computer commando squads who establish security protocol in a system] into every system the government has, either to improve the system's security or to build it in the first place. They have back doors into everything they've ever worked on. They can assume control over anything they want to. They're big. They're bad. And they've got more power than they should have, which is why we were after them. They had Tiger Teams into airport security, aerospace security. And the government gets software from TRW, upgrades from TRW [also, potentially, with back doors].

''When we got all the way up to the keyhole satellite, we said `That's enough.' We have really good resources. We have people that can pose as nonpeople – they have Social Security numbers, tax IDs, everything. But we all got kind of spooked by all this. We had a continuation of our plan mapped out, but we decided not to go through with it. We ditched all the TRW stuff we had. I gave it to a friend who buried it underwater somewhere along the Atlantic shelf. If I tell him to get it back, he will, but if I tell him to get it back using a slightly different phrase, he will disappear ... for obvious reasons.''

Most purposeful hacking is far less romantic, and done simply to gain access to systems for their computing power. If someone is working on a complex program or set of computations, it's more convenient to use some corporation's huge system to carry out the procedure in a few minutes or hours than to tie up one's own tiny personal computer for days. The skill comes in getting the work done before the sysop discovers the intrusion. As one hacker explains to me through an encrypted electronic mail message, ''They might be on to you, but you're not done with them yet – you're still working on the thing for some company or another. But if you've got access to, say, twenty or thirty Unix systems, you can pop in and out of as many as you like, and change the order of them. You'll always appear to be coming from a different location. They'll be shooting in the dark. You're untraceable.''