Do G-Men Dream Of Electric Sheep? (Flashback Friday MONDO 2000 Issue #3)

 

by R. U. Sirius & George Gleason

It’s no secret that mischievous young computer hackers get into trouble with the law. Occasionally, as in the case of the original legendary phone phreak John Draper aka Cap’n Crunch, they wind up in jail, although for the most part, their cyber-joyriding pranks are merely wrist-slapped. Suspended sentences. Probation. Charges dropped along with promises not to hang with the wrong crowd. Law enforcement quickly learned that it is not in their best interests to lock the hacker—and all that tricky expertise—in with a bunch of hardcore criminals. Indeed, the unmasked hacker may end up working as a security agent—for the phone company, a bank, or even some federal agency. Computer “crime” can be seen as the bush league, training for the Security Industry.

This relatively benign view of phreaking held through the first years of the personal computer industry. After all, Steve Wozniak and Steve Jobs gave birth to the PC partly through funds gathered by selling the “blue box,” a device for phone phreaking. And back before the digital revolution was taken over by the marketing departments, it was common knowledge that hackers were the backbone of the industry. Hacking is about exploration and access—exploring the limits of systems, finding what you need, whether to satisfy your curiosity or to complete some useful work. Proprietary concerns are not always treated with the utmost respect. Since hackers also tend to be pranksters, they can at times tend to be downright disrespectful towards authority. But a revolutionary conspiracy of self-conscious anarchists, this subculture has never been. Not quite.

Cut to 1990. A year that will live in infamy. For some unfathomable reason, agents of the law decided that this is the time to get busy stomping on self-expression. Just briefly: we had the bust of an art gallery in Cincinnati for showing Robert Mapplethorpe’s infamous photos, we had police agents entering a music shop in Florida and seizing dangerous CDs, records and cassettes, we had the 2 Live Crew busts, we had Jock Sturges —a reputable photographer—busted and all of his everything seized for daring to process photos of the young nude body, and we had the US Armed Forces invasion of Humboldt County, uprooting a fistful of the killer weed to impress the president of Colombia.

It is in this context that we come upon Operation Sun Devil and the concerted crackdown against young computer hackers by the US Secret Service.

Think of this calendar of events as a kind of scorecard that you can refer hack to as you read this section’s interviews with such Dramatis personae as Craig Neidorf, Steve Jackson , John Barlow , Mitch Kay or, et al.

Summer 1988: Hackers’ Convention 4.0. CBS News shows up with prepared script intending to depict hackers as dangerous criminals. This was particularly bizarre given that this Hackers gathering, formed by Steven Levy (author of the book Hackers) and Stewart Brand with the Whole Earth Institute, is frequented primarily by older, comfortable, relatively law-abiding computer fiends. Many of the people who were portrayed as “high in the Santa Cruz mountains plotting the downfall of the computer industry” were actually CEOs in that industry. Many more were, at the very least, major stockholders and well-paid executives in mainline companies. The dangerous-looking longhaired man seen looking at violent computer games while playing with a yoyo by millions of newswatching Americans was none other than Clifford Stoll, National Security Agency collaborator and author of The Cuckoo’s Egg. The CBS coverage was probably the first inkling for the older 60’s-generation hacker set that something might be amiss in their world.

Many who were portrayed as “high in the Santa Cruz mountains plotting the downfall of the computer industry” were actually CEOs in that industry

November 1988: The Internet Worm runs wild across many of the nations’ computer networks, shutting down an estimated 6,600 computers tied to the Internet and causing an estimated loss of 40 to 90 million dollars. The code, written by Robert Morris, was intended to map the net. In the words of John Barlow, “It was going to go around to every node on the net and report back in and tell just how big this sucker is.” But, due to faulty code, it winds up reproducing itself at a phenomenal clip, eating up all the cyberspace in its path and closing many systems. Within a day of Morris’ arrest, it is revealed that his father, also Robert Morris, is the chief computer security expert at the National Security Agency. Those who wish to conjecture about the possible meaning of this may proceed at their own risk.

December 1988: Legion of Doom member “The Prophet” downloads a Bell South document on the administration of E-911 systems, and then posts it around bulletin board systems (BBSs) such as Jolnet. It reaches Knight Lightening, aka Craig Neidorf. Knight republishes it in his electronic magazine, Phrack.

Read more “Do G-Men Dream Of Electric Sheep? (Flashback Friday MONDO 2000 Issue #3)”

Becoming “Reality Hackers”

 

His (Sterling’s) famous introduction for that book (Mirrorshades), describing what cyberpunk was doing in fiction — seemed to express precisely what a truly contemporary transmutational magazine should be about.

the transition from MONDO 2000 to Reality Hackers — excerpt from Freaks in the Machine MONDO 2000 in late 20th Century Technoculture (yes… still in progress)

R.U. Sirius

Some time in 1988, we made a rash decision. Despite High Frontiers relatively successful rise within the ‘zine scene (where 15,000 in sales was solid), we decided to change the name of the magazine itself to Reality Hackers.

It was my idea.

We’d been hipped to cyberpunk SF and I’d read Gibson’s Neuromancer and Sterling’s Mirrorshades collection. His famous introduction for that book, describing what cyberpunk was doing in fiction — seemed to express precisely what a truly contemporary transmutational magazine should be about.

Here are some parts of it: “The term, (cyberpunk) captures something crucial to the work of these writers, something crucial to the decade as a whole: a new kind of integration. The overlapping of worlds that were formerly separate: the realm of high tech, and the modern pop underground.

“This integration has become our decade’s crucial source of cultural energy. The work of the cyberpunks is paralleled throughout the Eighties pop culture: in rock video; in the hacker underground; in the jarring street tech of hip hop and scratch music; in the synthesizer rock of London and Tokyo. This phenomenon, this dynamic, has a global range; cyberpunk is its literary incarnation…

An unholy alliance of the technical world and the world of organized dissent — the underground world of pop culture, visionary fluidity, and street-level anarchy…

For the cyberpunks… technology is visceral. It is not the bottled genie of remote Big Science boffins; it is pervasive, utterly intimate. Not outside us, but next to us. Under our skin; often, inside our minds.

Certain central themes spring up repeatedly in cyberpunk. The theme of body invasion: prosthetic limbs, implanted circuitry, cosmetic surgery, genetic alteration. The even more powerful theme of mind invasion: brain-computer interfaces, artificial intelligence, neurochemistry — techniques radically redefining — the nature of humanity, the nature of the self. The Eighties are an era of reassessment, of integration, of hybridized influences, of old notions shaken loose and reinterpreted with a new sophistication.

Cyberpunk favors “crammed” loose: rapid, dizzying bursts of novel information, sensory overIoad that submerges the reader in the literary equivalent of the hard-rock “wall of sound.” Well, then… Read more “Becoming “Reality Hackers””

Steal This Singularity – The Yippies Started The Digital Revolution

 Steal This Singularity 1: The notion that the current and future extreme technological society should not be dominated by Big Capital, Authoritarian States or the combination thereof. Also related, a play on the title of a book by 1960s counterculture radical Abbie Hoffman. 2: The notion that in our robotized future, human beings shouldn’t behave robotically. The well-rounded posthuman — if any — should be able to wail like a banshee, dance like James Brown, party like Dionysus, revolt like Joan of Arc and illuminate the irrational like Salvador Dali. 3: The title for a website in which R.U. Sirius says and does as he pleases.

Addendum: Steal This Singularity has almost nothing to do with the notion that we will develop Artificial Intelligences that are smarter than us or that if such a thing were to happen it would be a “singularity.” I just like the name.

In 1971, a revolutionary prankster/celebrity named Abbie Hoffman, who had started the radical group the Yippies (Youth International Party) released Steal This Book, a manual for living on the fringes of a wealthy society by grabbing up some free shit from corporate powers while committing some Blows Against the Empire.

See, 1971 was the last year that the vanguard of the counterculture thought that they were going to make a total cultural and political psychedelic/anarchistic/left wing revolution before realizing… fuck it. Let’s campaign for McGovern.

But more to my point here and the milieu it attempts to speak to… true story… the Yippies started the phreakin’ “digital revolution!” To wit: The hacker culture started as the phone phreak culture. The phone phreak culture came out of the Steal This Book attitude about getting free shit from the detritus of corporate culture, in this case, the phone company. The first legendary phone phreak, John Draper aka Captain Crunch, who built the blue boxes, used to hang out at 9 Bleeker Street, NYC, Yippie headquarters. The first magazine that focused primarily on phone phreaking was YIPL (Youth International Party Line), which was started by Hoffman and “Al Bell.” In 1973, it transmorgified into TAP, which is more broadly remembered as the initiatory phone phreak periodical.

Phone phreaks were computer hackers. Draper famously noted that the phone system “is a computer.” From this milieu, the personal computer arose. Famously, Steve Jobs and Steve Wozniak funded the birth of the Apple by selling Blue Boxes So, you see, I stand on solid-if-hallucinatory historical ground today as I sound a Hoffmanesque note towards The Singularity Or Something Like It.

See Also Did It! From Yippie To Yuppie: Jerry Rubin, An American Revolutionary (Excerpt)

 

The Invention of Reality Hackers – A “Mutazine” (1988)

Something was starting to surface. Several small subcultures were drifting together, and some of these esoteric groupings included those who were creating the next economy. Clearly, we were positioned to become the magazine of a slow baking gestalt.

 

From Freaks In The Machine: MONDO 2000 in Late 20th Century Tech Culture

by R.U. Sirius

Some time in 1988, we made a rash decision. Despite High Frontiers relatively successful rise within the ‘zine scene (where 18,000 in sales was solid), we decided to change the name of the magazine itself to Reality Hackers.

It was my idea.

We’d been hipped to cyberpunk SF and I’d read Gibson’s Neuromancer and Sterling’s Mirrorshades collection. Sterling’s famous introduction for that book, describing what cyberpunk was doing in fiction — seemed to express precisely what a truly contemporary transmutational magazine should be about. Here are some parts of it:

“The term, (cyberpunk) captures something crucial to the work of these writers, something crucial to the decade as a whole: a new kind of integration. The overlapping of worlds that were formerly separate: the realm of high tech, and the modern pop underground.

“This integration has become our decade’s crucial source of cultural energy. The work of the cyberpunks is paralleled throughout the Eighties pop culture: in rock video; in the hacker underground; in the jarring street tech of hip hop and scratch music; in the synthesizer rock of London and Tokyo. This phenomenon, this dynamic, has a global range; cyberpunk is its literary incarnation…

An unholy alliance of the technical world and the world of organized dissent — the underground world of pop culture, visionary fluidity, and street-level anarchy…

For the cyberpunks… technology is visceral. It is not the bottled genie of remote Big Science boffins; it is pervasive, utterly intimate. Not outside us, but next to us. Under our skin; often, inside our minds.

Certain central themes spring up repeatedly in cyberpunk. The theme of body invasion: prosthetic limbs, implanted circuitry, cosmetic surgery, genetic alteration. The even more powerful theme of mind invasion: brain-computer interfaces, artificial intelligence, neurochemistry — techniques radically redefining — the nature of humanity, the nature of the self. Read more “The Invention of Reality Hackers – A “Mutazine” (1988)”