Court files from the teenage Assange’s eventual hacking trial in Melbourne – of which more later – document some of the effects of such a strange life on a gifted teenager with a strong aptitude for mathematics. His lawyer said Assange was deprived of the chance to make friends or associate normally with his peers. “His background is quite tragic in a way.” Underground describes a “dead boring” Melbourne suburb: “merely a stopping point, one of dozens, as his mother shuttled her child around the continent trying to escape from a psychopathic former de facto [spouse]. The house was an emergency refuge for families on the run. It was safe and so, for a time … his exhausted family stopped to rest before tearing off again in search of a new place to hide.”
When Assange was 13 or 14, his mother had rented a house across the street from an electronics shop. Assange began going there and working on a Commodore 64. His mother saved to buy the computer for her older son as a present. Assange began teaching himself code. At 16 he got hold of his first modem. He attended a programme for gifted children in Melbourne, where he acquired “an introverted and emotionally disturbed” girlfriend, as he put it. Assange grew interested in science and roamed around libraries. Soon he discovered hacking. By the age of 17 he suspected Victoria police were about to raid his home. According to Underground: “He wiped his disks, burnt his printouts, and left” to doss temporarily with his girlfriend. The pair joined a squatters’ union, and when Assange was 18 she became pregnant. They married and had a baby boy, Daniel. But as Assange’s anxiety increased, and police finally closed in on his outlaw circle of hackers, his wife moved out, taking their 20-month-old son Daniel with them. Assange was hospitalised with depression. For a period he slept outdoors, rambling around the eucalyptus forests in Dandenong Ranges national park.
*
Human relationships must have seemed unstructured for the teenage Assange, prone to abandonment, confusion and reversals. The world of computers, on the other hand, was predictable. Algorithms – the key to Assange’s later skill as a cryptographer – were reliable. People were not. Assange would later tell the New Yorker the “austerity” of interaction with computers appealed to him. “It is like chess … There is no randomness.” During his 1996 hacking trial his defence lawyer, Paul Galbally, said in mitigation that his computer became “his only friend”. As Assange shifted from school to school he was targeted by bullies as the outsider: “His only real saviour in life or his own bedrock in life was this computer. His mother, in fact, encouraged him to use this computer … It had become an addictive instrument to him at a very early age.” Galbally describes Assange as “super smart”; not a nerdy hacker but someone unusual and flamboyant.
Interestingly, some of the world’s most talented programmers come from broken families. Jacob Appelbaum, who would become WikiLeaks’ representative in the US, says he was the son of a paranoid schizophrenic mother and heroin addict father. He spent much of his boyhood in a children’s home. As a boy, he discovered a woman convulsing in his father’s bathroom with a needle sticking out of her arm. Appelbaum told Rolling Stone magazine that programming and hacking allowed him, however, “to feel like the world is not a lost place. The internet is the only reason I’m alive today.”
Melbourne’s hacking underground in the 1980s, in which Assange became prominent, was a small, almost entirely male group of self-taught teenagers. Many came from educated but poor suburban homes; all were of above average intelligence. They experimented on Commodore 64s, and the Apple IIe. They wrote code and used painfully slow modems. There was no internet yet, but there were computer networks and bulletin board systems, known as BBSs. In his “real” life Assange might have been considered a failure. He failed to complete his Higher School Certificate via a correspondence course. He also studied computers and physics inconclusively at an adult further education college.
But in his electronic life, Assange was a god. These geeky and socially awkward young men could reinvent themselves as swaggering heroes with names like Phoenix, Gandalf or Eric Bloodaxe. Assange used the pseudonym Mendax. Lewis and Short’s Latin dictionary says that means “given to lying” – the root for the English word mendacious. But Assange was more specifically inspired by Horace’s Odes. Assange’s mother had enthusiastically introduced him to the Greek and Latin classics. In book III, xi, Horace tells the story of the 50 daughters of Danaus. Their father is angry that they are being forced to marry their cousins, the sons of Aegyptus. He makes them swear to kill their husbands on their wedding night. Forty-nine carry out his order, but the 50th, Hypermnestra, tips off her husband, Lynceus, and they escape. (In some versions they go on to found a dynasty.) For this Horace calls her splendide mendax or “splendidly deceiving”. Another translation could be “deceitful with glory”. The name was well picked. It evoked what the intensely ambitious Assange would do next, something both deceitful and glorious: hack into the US’s military network.
Underground: tales of hacking, madness & obsession on the electronic frontier appeared in 1997. Published under the byline of Suelette Dreyfus, a Melbourne academic, Assange is credited as researcher, but his imprint his palpable – in parts it reads like an Assange biography. The book depicts the international computer underground of the 90s: “a veiled world populated by characters slipping in and out of the half-darkness. It is not a place where people use their real names.” Assange chose an epigraph from Oscar Wilde: “Man is least himself when he talks in his own person. Give him a mask, and he will tell you the truth.”
“Sometimes Mendax went to school,” runs the story in Underground. “Often he didn’t. The school system didn’t hold much interest for him. It didn’t feed his mind … The Sydney computer system was a far more interesting place to muck around in than the rural high school.”
In 1988, Assange (Mendax) is busy trying to break into Minerva, a system of mainframes in Sydney belonging to the government-owned Overseas Telecommunications Commission, or OTC. For the computer underground, hacking into OTC was a sort of rite of passage.
Mendax phones an OTC official in Perth posing as an operator from Sydney, Underground describes. To add authenticity, he records his home printer chattering in the background, and even mumbles passages from Macbeth to simulate office noise. The official innocently reveals his password – LURCH. Mendax is in! It is one of the dramatic moments in the book. In 2010, recalling his hacker exploits as a teenager, Assange said, “You were young. You hadn’t done anything for criminal gain. You had done this for curiosity, challenge, and some activism. We hadn’t destroyed anything. If you were a teenager in a suburb of Melbourne this was an incredibly intellectually liberating thing.”
In 1989 Melbourne hackers carried out a spectacular stunt, launching a computer worm against Nasa’s website. Bemused Nasa staff read the message: “Your system has been officially WANKed.” The acronym stood for Worms Against Nuclear Killers. Was Assange behind WANK? Possibly. But his involvement was never proved. By 1991 Assange was probably Australia’s most accomplished hacker. He and two others, using the names Prime Suspect and Trax, founded International Subversives magazine, offering tips on “phreaking” – how to break into telephone systems illegally and make free calls. The magazine had an exclusive readership: its circulation was just three, the hackers themselves.