On The Road To Chaos In East Berlin (published MONDO 2000 1991)

by Morgan Russell

 

In honor of former MONDO editor and co-publisher Morgan Russell’s ashes finding their way back from Austria to his home state of Wisconsin, we present this marvelous unfinished piece he sent us about a Chaos Computer Club gathering in what was once East Berlin. The piece ended suddenly when Morgan didn’t send us the ending, but the fun is more in getting to the conference and getting in the conference than in the conference itself… or at least that’s what one would imagine.

 

“Chaos. It’s more than just a name. It’s our way of doing business!”

Germany’s Chaos Computer Club is known in the US primarily for its incursions into U.S. military and NASA computers (see Clifford Stoll’s The Cuckoo’s Egg). Then there was the well-publicized information-for-money deal with the KGB that got busted. The latter was perpetrated by persons who, while not official club members, are at least within the Chaos Computer Club’s ambit. Little more is known about the Chaos group outside Germany.

Chaos members who might enlighten the rest of the world as to the nature of their organization seem to be nonexportable. One of their better-known members, Steffen Wernery, was arrested on charges of computer vandalism on his arrival in Paris where he had a speaking engagement. He was imprisoned for months. Other well-known members are understandably loathe to leave Germany.

Contact between the Chaos Computer Club and the East Berlin Computer Club was established at the CCC’s Christmastime ’89 Kongress in Hamburg. When I received calls from Hamburg and Amsterdam alerting me that the next CCC Kongress was imminent and to be held in the “East Zone,” as the West German computer security journal Daterschutz-Berate quaintly termed it, I immediately left for Europe.

Arriving in Amsterdam, I learned that I was a full month early. I suspect my informant was a bit hazy on the exact dates simply because he wanted an Amerikan around to talk to. No matter. I purposefully occupied my time doing preliminary fieldwork in Amsterdam, checking out its hacker underground, squatters’ movement, pirate radio and TV, and the newly identified Anti- Media Movement

 

“Destroy Media!”

Battle-cry of the Anti-Media Movement

I got my first glimmer of the Anti-Media Movement talking to a member of a group known as ADILKNO (The Foundation for the Advancement of Illegal Knowledge). ADILKNO publishes manifestoes in a hyperintellectual art and media journal, Mediamatic. A magazine for the well-read polyglot, its matter is well-nigh impenetrable without a thorough knowledge of Baudrillard, Virilio, Bataille, and Eco, for starters. Its motto is, “We watch media like others watch TV.”

ADILKNO first proposed its attack on media in a Squatters’ Movement document: “By isolating the media, we will reach many more people! Within the movement, many feel we must give our opinions to the press.

The time in which we can reach our goals through public opinion has long been over!”

ADILKNO believes a “massive defection to reality” is occurring now that everything seems to be covered by the media. “The increasing need to make history in a hobby or tourist atmosphere, away from work, is consciously placing the media in the shadow of the event. For the moment, people have no more time for the media. . . Beyond the media traps, people clear the way tor themselves to do the right thing elsewhere. In Western museum cities, an avant-garde has formed the anti-media movement, which puts an end to all connections under the slogan, ‘Let’s pull down another media!’ With disappearing acts, it creates temporary and local media-free spaces. . . It is a pre-eminently secret movement because it carefully keeps itself out of the press and makes its existence known only through jamming and sabotage. All events that don’t appear in the media are claimed as a victory by the movement. . . The survival strategy of the media is to remain more interesting than reality.” Like that.

In the newly published Movement Teachings:Squatting Beyond the Media (as yet available only in Dutch), Geert Lovink and Arjen Mulder describe the “outer-medial experience” as “making history on the streets through ‘immediate’ (i.e. ‘media-free’) contact.”

The Anti-Media Movement is contentless. It can only be discerned, in Lovink and Mulder’s formulation, as “curious cuts in the data stream.” It is a question of “how we should read the gaps. Is it an accident or the Anti-Media Movement?” One needs “an eye for it.”

Hoping to catch traces of the meaningful gaps of the “AMM” at the CCC Kongress, I mobilize Special Forces: DFM Radio-Televisie.

Read more “On The Road To Chaos In East Berlin (published MONDO 2000 1991)”

Do G-Men Dream Of Electric Sheep? (Flashback Friday MONDO 2000 Issue #3)

 

by R. U. Sirius & George Gleason

It’s no secret that mischievous young computer hackers get into trouble with the law. Occasionally, as in the case of the original legendary phone phreak John Draper aka Cap’n Crunch, they wind up in jail, although for the most part, their cyber-joyriding pranks are merely wrist-slapped. Suspended sentences. Probation. Charges dropped along with promises not to hang with the wrong crowd. Law enforcement quickly learned that it is not in their best interests to lock the hacker—and all that tricky expertise—in with a bunch of hardcore criminals. Indeed, the unmasked hacker may end up working as a security agent—for the phone company, a bank, or even some federal agency. Computer “crime” can be seen as the bush league, training for the Security Industry.

This relatively benign view of phreaking held through the first years of the personal computer industry. After all, Steve Wozniak and Steve Jobs gave birth to the PC partly through funds gathered by selling the “blue box,” a device for phone phreaking. And back before the digital revolution was taken over by the marketing departments, it was common knowledge that hackers were the backbone of the industry. Hacking is about exploration and access—exploring the limits of systems, finding what you need, whether to satisfy your curiosity or to complete some useful work. Proprietary concerns are not always treated with the utmost respect. Since hackers also tend to be pranksters, they can at times tend to be downright disrespectful towards authority. But a revolutionary conspiracy of self-conscious anarchists, this subculture has never been. Not quite.

Cut to 1990. A year that will live in infamy. For some unfathomable reason, agents of the law decided that this is the time to get busy stomping on self-expression. Just briefly: we had the bust of an art gallery in Cincinnati for showing Robert Mapplethorpe’s infamous photos, we had police agents entering a music shop in Florida and seizing dangerous CDs, records and cassettes, we had the 2 Live Crew busts, we had Jock Sturges —a reputable photographer—busted and all of his everything seized for daring to process photos of the young nude body, and we had the US Armed Forces invasion of Humboldt County, uprooting a fistful of the killer weed to impress the president of Colombia.

It is in this context that we come upon Operation Sun Devil and the concerted crackdown against young computer hackers by the US Secret Service.

Think of this calendar of events as a kind of scorecard that you can refer hack to as you read this section’s interviews with such Dramatis personae as Craig Neidorf, Steve Jackson , John Barlow , Mitch Kay or, et al.

Summer 1988: Hackers’ Convention 4.0. CBS News shows up with prepared script intending to depict hackers as dangerous criminals. This was particularly bizarre given that this Hackers gathering, formed by Steven Levy (author of the book Hackers) and Stewart Brand with the Whole Earth Institute, is frequented primarily by older, comfortable, relatively law-abiding computer fiends. Many of the people who were portrayed as “high in the Santa Cruz mountains plotting the downfall of the computer industry” were actually CEOs in that industry. Many more were, at the very least, major stockholders and well-paid executives in mainline companies. The dangerous-looking longhaired man seen looking at violent computer games while playing with a yoyo by millions of newswatching Americans was none other than Clifford Stoll, National Security Agency collaborator and author of The Cuckoo’s Egg. The CBS coverage was probably the first inkling for the older 60’s-generation hacker set that something might be amiss in their world.

Many who were portrayed as “high in the Santa Cruz mountains plotting the downfall of the computer industry” were actually CEOs in that industry

November 1988: The Internet Worm runs wild across many of the nations’ computer networks, shutting down an estimated 6,600 computers tied to the Internet and causing an estimated loss of 40 to 90 million dollars. The code, written by Robert Morris, was intended to map the net. In the words of John Barlow, “It was going to go around to every node on the net and report back in and tell just how big this sucker is.” But, due to faulty code, it winds up reproducing itself at a phenomenal clip, eating up all the cyberspace in its path and closing many systems. Within a day of Morris’ arrest, it is revealed that his father, also Robert Morris, is the chief computer security expert at the National Security Agency. Those who wish to conjecture about the possible meaning of this may proceed at their own risk.

December 1988: Legion of Doom member “The Prophet” downloads a Bell South document on the administration of E-911 systems, and then posts it around bulletin board systems (BBSs) such as Jolnet. It reaches Knight Lightening, aka Craig Neidorf. Knight republishes it in his electronic magazine, Phrack.

Read more “Do G-Men Dream Of Electric Sheep? (Flashback Friday MONDO 2000 Issue #3)”