You cannot go on dueling at modem's length indefinitely. You cannot beat one another senseless with rolled-up press-clippings. Sooner or later you have to come directly to grips. And yet the very act of assembling here has changed the entire situation drastically. John Quarterman, author of *The Matrix,* explains the Internet at his symposium. It is the largest news network in the world, it is growing by leaps and bounds, and yet you cannot measure Internet because you cannot stop it in place. It cannot stop, because there is no one anywhere in the world with the authority to stop Internet. It changes, yes, it grows, it embeds itself across the post-industrial, postmodern world and it generates community wherever it touches, and it is doing this all by itself.

Phiber is different. A very fin de siecle kid, Phiber Optik. Barlow says he looks like an Edwardian dandy. He does rather. Shaven neck, the sides of his skull cropped hip-hop close, unruly tangle of black hair on top that looks pomaded, he stays up till four a.m. and misses all the sessions, then hangs out in payphone booths with his acoustic coupler gutsily CRACKING SYSTEMS RIGHT IN THE MIDST OF THE HEAVIEST LAW ENFORCEMENT DUDES IN THE U.S., or at least *pretending* to.... Unlike "Frank Drake." Drake, who wrote Dorothy Denning out of nowhere, and asked for an interview for his cheapo cyberpunk fanzine, and then started grilling her on her ethics. She was squirmin', too.... Drake, scarecrow-tall with his floppy blond mohawk, rotting tennis shoes and black leather jacket lettered ILLUMINATI in red, gives off an unmistakeable air of the bohemian literatus. Drake is the kind of guy who reads British industrial design magazines and appreciates William Gibson because the quality of the prose is so tasty. Drake could never touch a phone or a keyboard again, and he'd still have the nose- ring and the blurry photocopied fanzines and the sampled industrial music. He's a radical punk with a desktop- publishing rig and an Internet address. Standing next to Drake, the diminutive Phiber looks like he's been physically coagulated out of phone-lines. Born to phreak.

Dorothy Denning approaches Phiber suddenly. The two of them are about the same height and body-build. Denning's blue eyes flash behind the round window- frames of her glasses. "Why did you say I was 'quaint?'" she asks Phiber, quaintly.

It's a perfect description but Phiber is nonplussed... "Well, I uh, you know...."

"I also think you're quaint, Dorothy," I say, novelist to the rescue, the journo gift of gab... She is neat and dapper and yet there's an arcane quality to her, something like a Pilgrim Maiden behind leaded glass; if she were six inches high Dorothy Denning would look great inside a china cabinet... The Cryptographeress.... The Cryptographrix... whatever... Weirdly, Peter Denning looks just like his wife, you could pick this gentleman out of a thousand guys as the soulmate of Dorothy Denning. Wearing tailored slacks, a spotless fuzzy varsity sweater, and a neatly knotted academician's tie.... This fineboned, exquisitely polite, utterly civilized and hyperintelligent couple seem to have emerged from some cleaner and finer parallel universe, where humanity exists to do the Brain Teasers column in Scientific American. Why does this Nice Lady hang out with these unsavory characters?

Because the time has come for it, that's why. Because she's the best there is at what she does.

Donn Parker is here, the Great Bald Eagle of Computer Crime.... With his bald dome, great height, and enormous Lincoln-like hands, the great visionary pioneer of the field plows through the lesser mortals like an icebreaker.... His eyes are fixed on the future with the rigidity of a bronze statue.... Eventually, he tells his audience, all business crime will be computer crime, because businesses will do everything through computers. "Computer crime" as a category will vanish.

In the meantime, passing fads will flourish and fail and evaporate.... Parker's commanding, resonant voice is sphinxlike, everything is viewed from some eldritch valley of deep historical abstraction... Yes, they've come and they've gone, these passing flaps in the world of digital computation.... The radio-frequency emanation scandal... KGB and MI5 and CIA do it every day, it's easy, but nobody else ever has.... The salami-slice fraud, mostly mythical... "Crimoids," he calls them.... Computer viruses are the current crimoid champ, a lot less dangerous than most people let on, but the novelty is fading and there's a crimoid vacuum at the moment, the press is visibly hungering for something more outrageous.... The Great Man shares with us a few speculations on the coming crimoids.... Desktop Forgery! Wow.... Computers stolen just for the sake of the information within them -- data- napping! Happened in Britain a while ago, could be the coming thing.... Phantom nodes in the Internet!

Parker handles his overhead projector sheets with an ecclesiastical air... He wears a grey double-breasted suit, a light blue shirt, and a very quiet tie of understated maroon and blue paisley... Aphorisms emerge from him with slow, leaden emphasis... There is no such thing as an adequately secure computer when one faces a sufficiently powerful adversary.... Deterrence is the most socially useful aspect of security... People are the primary weakness in all information systems... The entire baseline of computer security must be shifted upward.... Don't ever violate your security by publicly describing your security measures...

People in the audience are beginning to squirm, and yet there is something about the elemental purity of this guy's philosophy that compels uneasy respect.... Parker sounds like the only sane guy left in the lifeboat, sometimes. The guy who can prove rigorously, from deep moral principles, that Harvey there, the one with the broken leg and the checkered past, is the one who has to be, err.... that is, Mr. Harvey is best placed to make the necessary sacrifice for the security and indeed the very survival of the rest of this lifeboat's crew.... Computer security, Parker informs us mournfully, is a nasty topic, and we wish we didn't have to have it... The security expert, armed with method and logic, must think -- imagine -- everything that the adversary might do before the adversary might actually do it. It is as if the criminal's dark brain were an extensive subprogram within the shining cranium of Donn Parker. He is a Holmes whose Moriarty does not quite yet exist and so must be perfectly simulated.

CFP is a stellar gathering, with the giddiness of a wedding. It is a happy time, a happy ending, they know their world is changing forever tonight, and they're proud to have been there to see it happen, to talk, to think, to help.

And yet as night falls, a certain elegiac quality manifests itself, as the crowd gathers beneath the chandeliers with their wineglasses and dessert plates. Something is ending here, gone forever, and it takes a while to pinpoint it.

It is the End of the Amateurs.

***********

Afterword: The Hacker Crackdown Three Years Later

Three years in cyberspace is like thirty years anyplace real. It feels as if a generation has passed since I wrote this book. In terms of the generations of computing machinery involved, that's pretty much the case.

The basic shape of cyberspace has changed drastically since 1990. A new U.S. Administration is in power whose personnel are, if anything, only too aware of the nature and potential of electronic networks. It's now clear to all players concerned that the status quo is dead-and-gone in American media and telecommunications, and almost any territory on the electronic frontier is up for grabs. Interactive multimedia, cable-phone alliances, the Information Superhighway, fiber- to-the-curb, laptops and palmtops, the explosive growth of cellular and the Internet -- the earth trembles visibly.