[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Game items...

     I have not been paying enough attention to the cyberpunk list,
but I did notice that some of you were concerned with the subject, and
that Tim May was mentioning "pure information" as a better model to
play with, so I thought I would send this in as a sample.  Perhaps
some ideas of where to take the story will come out of using this 
model for another game.  Anyway, this game theme should not push as 
many hot buttons as drugs do (though it should!). 

     This fragment of a tale was written shortly after I came back 
from the first Computers, Freedom and Privacy conference.  It is 
placed in the time period between now and the usual time frame of 
Gibsonian cyberpunk.  It was written to help me think about the social 
& legal responses we might see when encryption is more widely 
available-- and used.  Sorry the story is incomplete, I just got too 
busy to finish it, and ran short of ideas as well.  And sorry for the 
obsolete technology involved.  I am sure something better than MS DOS 
will come along eventually.  :-)

(The usual conditions of posting apply--copyright H. Keith Henson 

                Green Rage  by H. Keith Henson

     "'Nother hour and I can 'crypt and email this mess."  

     Lenny closed the forth of five files: maps, diagrams, schedules, 
assignments, and instructions.  It was a four person monkey wrench 
project for destroying a big piece of a paper mill and (he hoped) making 
it look like an accident.  It was due to take place on the east coast in 
a few weeks.  Lenny had never met any of the people who had scouted out 
the plant, nor the bitter, out-of-work engineer who had figured out how 
to wreck it, and none of the operators who were involved would meet each 
other.  Made for hard-to-crack operations.  Some people on the east coast 
did the same for the covert side of the GreenRage group that paid Lenny. 

     The tofu sandwich he had for breakfast was a dim memory.
     "Lunch first." Lenny thought.
     As he headed out to pick up a vegetarian pizza, he looked through 
the little glass panels in the front door. 
     "Oh, shit, suits outside,"

     Lenny said it with feeling, but kept his voice down.  He turned on 
his heel in the hall leading to the front door and ran back into the 
grubby GreenRage office in the dining room of a rented house in San 
Samon.  He managed to hit the power switch on the PC at Stel's desk 
before the door opened.  Stel was in the bathroom.  Whether she heard the 
warning or not, Lenny could get no help from her, and Marge was out on 
errands.  The door was opening--there was no chance to get to the other 
two computers or to take down the '586 file server in the kitchen--he 
looked up and in his best bright and cheerful voice (which to Lenny 
sounded hollow and rehearsed) said, "May I help you?" 
      The first of the four suits, a beefy dude in a grey outfit spoke up. 

     "Yes, you can.  We're from the CCA.  (The Computer Control Agency):  
We have a court order to copy all the computer files in this building," 
(he held up an official looking piece of paper--more trees destroyed, 
thought Lenny.) "so unless you want to be charged with contempt, you can 
step back from that computer, and don't touch anything till we are done." 

     Lenny stepped back.  He wasn't as terrified as he could have been, 
though his heart rate must have been close to 120 and his mouth was dry. 
He had been through raid drills and a few real confrontations with the 
law at pickets and bleed-ins. 

     "At least it isn't a search warrant, we might keep operating" he 
thought.  Then remembering the drill, spoke up: 

     "Can I see the order?"  

     The beefy one handed it over while his three leaner and younger 
companions fanned out to the computers.  They obviously knew where the 
computers were, but that did not necessarily mean rot in the 
organization.  How well they coped with the 'puters would say something 
about that. 

     The paper was about what he expected, an order signed by a judge to 
copy every storage device in the GreenRage's office to an encrypted WORM 
drive.  The box for paper documents wasn't checked, so they knew they 
wouldn't find anything useful on paper.  Bad sign, it meant they knew 
more about GreenRage than Lenny liked.  "Waste as much time as I can," 
Lenny thought to himself, and in a very polite voice he asked:

     "Can I see some ID for you and your men? 

     The closest of the technoids, as Lenny thought of them looked up in 
disgust after putting his hand on the back of the ancient '386 clone 
Lenny had just killed.  

     "Its been turned off in the last 2 minutes.  Did you do it when we 
came in?" he said this looking right into Lenny's eyes, while digging out 
his badge. Lenny didn't lie with his reply, 

     "Its Stel's, she was about to go out, and we try to save power by 
turning them off when we go out."  He said this as loud as he dared, 
hoping that Stel would hear him in the bathroom, then spoke up even 

     "Stel, we have official visitors, so don't make any sudden moves." 

     At 200+ pounds, and fifty plus years, Stel didn't make many fast 
moves, unless they were on young guys.  In view of the constant water 
shortage, the chances were only about one in four that she would flush 
the toilet, and less than even that Stel would wash her hands.  Without 
any running water sounds, she come out. 

     "Pigs, huh."  Stel had been politically imprinted as an anarchist at 
Madison over thirty years ago in the late '60s and early 70's.  When it 
suited her, she could be one of the most obnoxious people Lenny had ever 
known.  At least it diverted the attention from him, chances were low 
that the cops would grill Stel on who shut off the power on her computer. 

     Beefy, whose' badge claimed to be one Dan Barker, and technoid #1 
(Lenny never did get a name for him, flashed their badges. Lenny grabbed 
a whiteboard marker (almost dry, and the only non computer writing device 
permitted in the office) and scribbled Barker's name and badge number on 
the edge of a badly cluttered whiteboard.  The other two technoids had 
fanned out, one to Lenny's desk, and the other to the kitchen.  The 
kitchen one came back shaking his head. 

     "No damn keyboard or display on the server.  Have to go in through 
the other ones to dump the disk." 

     Technoid #2 moved the mouse on Marge's machine, but thank the green 
mother, thought Lenny, the screensaver program had timed out, and the "I 
NEED A PASSWORD!" message came up.  That meant the password was gone from 
memory on that machine.  Technoid #3 hit paydirt on Lenny's machine: the 
screen was still alive.  He hit the space bar, and pulled out a little 
alarm timer which he set to go off every 3 minutes. "Damn, damnit" 
thought Lenny, "I should have set the timeout shorter, has it really been 
less than 5 minutes since I got up?"  And he was mentally kicking himself 
for not wiping the password when he got up. 

     Technoid #3 noted the directory (ACIDRAIN/TRMINATE) where Lenny had 
been working and went back up, a level at a time to the main directory on 
the file server.  He seemed prepared to deal with a no printer machine, 
pulling out a pad of paper from a little portfolio (more trees!) and 
started making notes on the directory structure. 

     Technoid #2 looked up from Marge's machine and asked Lenny, 

     "I don't suppose you would know the password?" 

     Lenny shook his head and then looked the agent in the eye.

     "No sir! I certainly wouldn't know Marge's password to get into her 
personal machine!" And wouldn't admit it if I did know, he thought. 

     Technoid #2 looked over at Stel frowning at the machine on her desk 
and asked mildly, 

    "I don't suppose you would remember your password?" 

    "Fuck off sharp one," Stel said with a straight face.  Even in a near 
state of panic, Lenny got a flash of amusement as Beefy started to spit 
out a hot reply.  Beefy checked himself as he saw #2 write down 
fuckoff#1.  Stel grinned slightly; she had almost scored one on the 

    Without making a move toward Stel's machine, #2 asked #3, 

    "Shall I try it, Jim?"  Jim was engrossed, paging through directories 
but he mumbled: 

    "No, let's see what I can get before we risk a password given under 
duress." And, half a minute later, 

    "This is going to be a bitch, I can't find any programs to dump 
memory, no debug, no basic, no smalltalk, no turbo, nothing."  Lenny 
grinned, and straightened his face with an effort.  The crypt program had 
come with instructions to delete or encrypt under a special key a long 
list of compilers and interpreters-- not that he understood exactly what 
they were anyway. 

     "Bob, could you have one of the uniformed officers get the camera 
out of the car?  Looks like we are going to have to photograph some of 
this."  Beefy went to the door and tried to get the attention of one of 
the uniformed cops that had come with them.  No luck, they were both out 
back, keeping an eye on the building power switch so no one could turn it 
off.  It was less distance to the car, so he just walked out to the car, 
rummaged around in the back seat and brought back the camera kit.  Jim 
waited for him, typing a space every 3 minutes. 

     "Take it easy on the polaroid, damn film costs two dollars a shot," 
as he handed the camera kit to technoid #3.  Technoid #2 came over to 
help and started clicking shots of the screen as Jim worked his way 
around in the directory tree.  There were *lots* of interesting directory 
and file names.  Stel, Marge, and the three masked visitors from back 
east had spent a whole evening making up provocative names like HIT_LIST 
(Lenny's address book), and $LAUNDRY (data for a spreadsheet program 
Marge used), and a lot of disaster names like HINDENBG, and TEX_CITY.  
Since the crypt program left the directories in the clear, they thought 
they might as well make them amusing.  At the moment, with cold sweat 
dripping down his back, Lenny wished he had made the directories a little 
*less* provocative. 

     Once in a while, technoid #3 or Jim as Lenny was beginning to use to 
identify him--gotta scribble that name on the white board--would give the 
command to type out a file to the screen.  He either got a mess of 
published material from decade-old anarchist newsletters, some of which 
they carefully photographed on the screen, or computer-generated random 
bytes (which, of course, they thought was encrypted material).  One or 
the other of the technoids not sitting at the screen kept themselves 
shielding the power switch and plug.  Stel was sitting on the grubby 
couch waiting for the technoids to either break into the system or screw 
up.  Lenny went over and joined her, feeling miserable about the agents 
getting in through _his_ system and unwilling to watch any more and give 
away by body language when they were about to trip.  He glanced at his 
watch.  The damn cron program should ask for the password in another 20 
minutes.  "Jeez," he thought, "I hope they don't get anything."  

     "There are _10_ copies of something which looks like a word processor 
on the server hard drive--they all have the same byte count and date, and 
there is _NO_ 'path' set," technoid #3 bitched loudly enough for Lenny to 
hear.  (Happened that this was an accident.   Lenny had found that if he 
copied the word processor into each directory he made, it worked fine.)  
The server had an old 700 Mbyte drive, and a few copies more or less of a half 
Meg program made no big difference.  However at the moment, the technoids 
had concluded that this was a clever hack, that the system would wipe the 
password out of memory if they tried to run the wrong word processor 
program.  They outfoxed themselves: any one of them would have worked 
fine.  ("Type" or "copy" to the screen wouldn't work because the WD*11.0 
stored files in compressed binary.) 

     "Well, Bob, it is moment of truth time.  We can take a 1 in 10 
chance of starting up the word processor and looking at the files, or we 
can try to load in a program to extract the key from this thing's 
stinking memory.  What say?" 

     "You guys are the experts, don't ask me." 

     After a short conference, technoid #3 fished a diskette out of his 
pocket, kissed it for luck, and stuck it in the drive on Lenny's machine. 

    "Here goes nothing." and he typed "dir a:".  The crypt program was 
watching for diskette access, and came back with: 

                  "I NEED A PASSWORD! 

     "Shit."  whispered a dejected technoid under his breath.  "Know 
anybody at NSA?" 

     Lenny put the back of his palmtop on the microphone of a payphone 
and hit the dial button. 

     "That will be one dollar for the first minute." 

     Bong, bong, bong, bong. 

     "Thank you for using ESJI, you have one minute."  Buzz-click, 

     "Hello, there is no one here at the moment, but you can record a 

     "Here" was a little module of code in an automated PBX/voice mail 
machine watching for incoming calls after working hours on a line deep in 
the list of numbers assigned to a small corporation.  It was an old 
machine, and unlikely to get another software upgrade.  After taking a 
call, it would not take another for several hours, and it rotated through 
several recorded messages.

     Lenny hit the next button down on the palmtop.

     #-Beep, 4-Beep, 3-Beep, 6-Beep.

     "confirm with password.
     L-beep, E-beep, N-beep.

     "Record message.  End with any key."

     "Nancy, its Murray, just called to say hi.  Get back to me sometime 
when you get a chance."  #-beep. 

    "Message confirmation number 36, repeat 36," and a click.
     The PBX made a local call to a paging company and transmitted what 
looked like a phone number.  The phone number digits added up to 36.

     Lenny punched 36 into his palmtop and hit the enter key.  It came up 
with an address, a description, and a phone number.  It was the phone  
next to the K-mart entrance about a mile away. 

    "K-mart will be closing about the time I get over there," he thought. 
"Could have taken the bike."  He closed the palmtop.  It sensed the 
closing and erased its encryption password. 

     Lenny got back in his tiny 5 year old "B-car," the 60 mpg car some 
rich dude had been force to take in a package deal when he bought a 20 
mpg Lincoln Towncar.  He twisted the key.  The lights dimmed as the 
catalytic convertor came back up to heat on the battery.  There was a few 
seconds' wait to let the battery recover, and the car started.  Lenny 
watched for cops as he drove over to the K-mart, but he didn't drive 
*too* cautiously.  That was one sure way to attract attention.  There 
wasn't much of a mob leaving the closing K-mart on a weekday.  Lenny 
parked near the phones and walked over.  He was about 20 feet away when 
the one on the left rang.  He picked it up and said, 


     "What's the problem?  If you forgot your key, I can't help." 

     The voice on the other end sounded odd.  It was probably going 
through some blind location in Mexico where the automatic number 
identification had not yet been installed.  It also had the quality of 
digital speech.  Original words of the speaker were being converted to 
phonemes and back to words.  Not a hint of the speaker's real voice 
quality came through, though this dodge did not affect word choice and 
rhythm patterns. 

     "Agents," Lenny said.  The CCAs came in early this afternoon.  I 
don't think they got anything, but I needed someone to talk to." 

     "Dumb idea if they are watching you, but tell me what happened 

     Lenny related the events of the afternoon up to the point where the 
agents lost the password on his machine by trying to load a memory dump 
program from a diskette.  And then he went on. 

     "After that, they popped the cover off the server, hooked up their 
gear and copied the 700 Meg disk, a few dozen 60Mbyte SMs, and a few 
dozen 3 meg floppies.  One of them had your crypt package.  They didn't 
mention my palmtop, and Marge keeps the backup tapes at home.  Only 
took them about 2 hours. They put the covers back on and left me with 
what they called a PK encrypted 2.4 Gig WORM cartridge.  They took one 
just like it, and even made me choose which one I got.  The order said I 
was required to take one of them.  It has all kinds of legal seals and 
signatures on it.  They said take it to our lawyer.  One of us took it 
over about 5 pm.  None of us have a way to read it.  Are we in trouble?"  

     There was quite a delay.  Then, the digital voice spoke up. 

     "Even if they were able to track me down, *I* am not in trouble. I 
make a point of posting all the programs I ever give out.  In source code 

     "I don't think you are in trouble from what they took with them.  
The copy they left with you is the data off your disk, encrypted with a 
half-key the judge issued.  Until the hearing they can't read it because 
they lack the other half of the key. The only use for it is to keep them 
from making a copy of data, changing the data and making another one of 
those write-once cartridges.  So, you are ok till the hearing."  

     There was more delay, then the funny sounding voice on the other end 
of the line went on. 

     "Presuming the passwords are not compromised, even getting the other 
half of the key from the judge to look at what they took should not be a 
big problem.  But since they came in at all, I would say you are in big 
time trouble.  That was a piece of dumb luck that they didn't try WD* on 
your files.  Of course they always have the option to give you blanket 
immunity and force the key out of you, but by the time they get around to 
doing that, you can forget the key.  I sure would.  I presume you had the 
machine convert all the files after they came in to a new password?" 

     "Not yet.  I haven't let anyone put a password into any of the 
machines since they showed up.  I'm afraid they will have a camera bug 
looking over my shoulder.  About a month ago, I read in the paper that 
they did that to a bookie in St Paul." 

     "Not likely for you--but possible.  Hmmm, did they leave any 
judicial orders about not moving the machines?" 

     "Not from what I read on the court order.  I can ask our lawyer.  
Our lawyer may be good at filing objections to logging company projects, 
but I think he is out of his depth if they go after us criminally.  I 
can't afford a criminal lawyer.  I called around and the best deal I 
could get was $100k retainer, cash or gold, no checks." 

    "They have already gone after you criminally.  You don't get a data 
search order from a judge without a fairly good reason.  On the other 
hand, it was not a search warrant.  It is arguable that they shouldn't 
have gone looking at stuff in your files, but who needs to argue?  They 
either don't have enough on you for that or they are waiting to see what 
you do and who you talk to after the DSO.  I don't know and don't want to 
know what you are doing, but there must have been something that tipped 
them off." 

     "I can't think of anything--even if the people we are sending email 
to on the east coast had all been turned, I can't see how they could have 
traced it back to us.  Mail to them was going through about 10 blind 
links, sometimes took 3-4 days to get cross country, it was deep 'crypted 
all the way, and somebody donated the digital stamps." 

     "Never like to use digital stamps I haven't bought myself with cash, 
and then only from a reputable Swiss bank.  But I can't see how that 
would have done any harm . . . . is there any chance the stamps might 
have been 'used?'  That would certainly compromise your traffic, though 
not the messages." 

     "Nope, a few of the messages circulate back to us.  They wouldn't if 
the "stamps" were no good."  

     "Not necessarily true.  The mom and pop forwarders often accumulate 
stamps for a week or more before sending them to the bank.  You just 
can't check with a bank on dollar or sub-dollar amounts--connect time 
eats you up. 

     "The first link was Telesis, and I know they are on line to the bank 
that issued the stamps . . . .  Unless they are . . . . in on it. . . ." 
Lenny was looking right at the Telesis logo on the phone. 

     "Yeah, '/Paranoia strikes deep/' . . . .  Did the court order say 
anything about why they were going after you?" 

     "No, there was a note on the order that the supporting affidavits 
were sealed." 

     "You guys rate!  There hasn't been a sealed affidavit for a DSO I 
know about in the last ten years.  The stink around the Steve Jackson 
warrant took years to wear off!  Well, they have to unseal them before 
the hearing.  The hearing has to be within the next three weeks if I 
remember right." 

     "You do, it's on the 9th of next month, 20 days from now." 

     "Well, the first thing you should do is change the password, so you 
can start forgetting the old one.  How much clear stuff was on the disk? 

     "None that I know about . . . . well actually about half the disk 
was filled with the nastiest old published stuff we could find--rabid 
libertarian literature and anarchist newsletters, public domain stuff off 
a CD ROM. The rest was filled with random numbers from a noise card when 
your guy set it up last year, then we deleted about half of it to give us 
working space.  But far as I know, there was nothing to worry about in 
the clear.  Snooper hasn't been complaining about unencrypted files when 
I run it on startup every morning." 

     "There is a hole in that program, but it takes some very special 
circumstances for it to fail.  I kind of doubt you are being watched.  If 
they were going to go to that much trouble, a search warrant instead of a 
digital search order would have been the way to go, but if you are really 
worried about them looking over your shoulder, take your machine and the 
server to a random motel you've never been to before.  Lets see, if you 
had to do the whole disk, it would take maybe two hours.  You shouldn't 
lose anything if you have to interrupt the process in the middle--wait, 
yours is a 3 person office?" 


     "Main password, and then one for each of you?" 


     "Option 4:7 is what you want to use.  It will decrypt only through 
the old main password, and reencrypt through the new password.  Data 
never comes up to clear.  Try that." 

     "Ok.  Should I take it off to a motel?" 

     "Suit yourself.  You know how good or bad you have been.  But do 
keep me informed.  Hasn't been a case this interesting in years.  Random 
route Email by preference, but call if you need to, same method." 


     Lenny and Marge checked into a motel which had definitely seen 
better times, but was happy to take cash.  A lot of people had quit using 
credit cards, especially for checking into a motel on the hourly plan.  
It was just too easy for people to tap into credit card records.  The 
swimming pool was dry in July, but what the heck, they weren't here for 

     "I can't believe this, Marge, this power outlet has only _two_ 

     "Lenny, this place was built before they invented grounding plugs, 
what do you expect." 

     "Well, what the heck are we going to do now?" 

     "First we look around.  No problem, the socket in the bathroom is a 
3 pronger." 

     Lenny plugged in the powerstrip while Marge plugged the pieces of 
the PCs together and connected a short network cable between them.  Lenny 
joked to keep down his nervousness; 

     "Wonder what they thought of us."  Not many couples bring in couple 
of PCs to do perverted things in the dark." 

     "Lenny!" Marge said sharply. 

     "No, Marge, I meant the _PCs_ will be doing things in the dark, not 
us."  Marge picked up on the joke by looking disappointed. She really 
wasn't.  Lenny was one of those rare guys who just did not care about sex 
with anybody.  Her regular boyfriends knew she was not getting any at 


     The 'crypt program rejected the first three passwords Lenny tried as 
too simple.  Which to him meant easy to remember.  He finally got it to 
accept anhtre spelled [email protected]%h7e$r (the password program would drop the 
final r).  Lenny's first password had been sesame.  He had used 
variations on opendoor, opendore, openwindow, enterhere, portculius, 
drawbridge, safedoor, gateway at various times.  If anybody had a list of 
his passwords, they would be a long way up on selecting attacks.  He felt 
he was doing the best he could to make them complex, but still 
rememberable.  He left the duress password (bugout) alone.  It was one he 
had kept using for years, and never had needed.  Lenny wasn't certain he 
would use it if he got a chance.  Even though Marge backed up the disk 
every week, he would lose a lot of work if he used the duress password 
and wiped the disk. 

     They crammed the computers back into the tiny car five hours later.   
Marge dropped the key in the slot by the office and they drove back to 
the GreenRage office where Marge and Lenny set up the machines and Marge 
started the backup program.  The CCA observer made voice and printed 
notes of their return on his palmtop from the stakeout location inside a 
furniture company office about a block down the street. 


     The office never got up to full productivity over the next five 
weeks, but Lenny did finish and email the project--with notes to the 
effect that the enclosed was chapters from a book he was writing, and a 
true-to-life description of the data search order being carried out.  He 
left it up to the folks on the other end.  If they wanted to carry out a 
project which was in the hands of the cops, it was on their heads. 


     The DSO hearing went about as expected.  The judge granted a two 
week extension over the protest of Bruce, the GreenRage's lawyer.  When 
the day came, Lenny, Marge, Stel, and Bruce were all looking more 
respectable than they usually did.  Even Stel was wearing a dress (long 
out of style, but the only decent one she owned).  

     The hearing at the federal building started in open court with a 
request from the US Attorney for the judge to review the CCS's material 
in camera.  

     "Mr. Mulronny, I have already looked over the affidavits you sent 
over, and I can't do it.  I already granted you an extra two weeks, and 
the law can only be stretched so far.  You either have to make a case and 
let these people defend their data, or you have to drop it." 

     Mulronny looked unhappy, but was prepared with the unsealed 
affidavits.  He gave one to Lenny, one to Bruce, and one to the judge.  
The judge looked at Bruce, 

     "Your honor, this is only about 11 pages, I think my client and I 
can review it during a short recess, or you could take up other actions 
while we review this." 

     Court matters were running a little ahead of schedule that morning, 
so the judge had the clerk pencil them in after the next two short 
actions.  They went out in the hall, not worrying about snoops except 
being overheard.  The last time a judge found out that someone was 
bugging the courthouse, the head of the agency that did it spent time in 
the drunk tank for contempt. 

     Lenny had read the affidavit almost through when they reached the 
far end of the hall.  Bruce waited till he finished, and said,  


     Lenny shook his head, 

     "They're after someone else.  I've read about some of the events 
they are citing, but I sure don't know anything about them." 
     That wasn`t entirely true.  One of the "events" was one Lenny had 
put together, but when it didn't come off within a year, he had decided 
they had chickened out.  Since the project he had put together took out 
much of an oil refinery, he was not surprised.  Industrial sabotage on 
that scale took more than a little guts.  When the plant finally blew up, 
Lenny watched the papers for weeks, but never found out if it was ruled 
accidental.  The feds did not seem to be sure either, they only mentioned 
it as a possibility.  The other accusations were split between cases 
where Lenny strongly suspected sister organization had done the deed, or 
industrial accidents where some organization had taken credit for what 
was probably an accident. 

     Back in court Bruce complained to the judge that there was nothing 
substantial in the affidavit supporting the DSO, and that while his 
client did not have anything to hide, the government was asking to break 
into the confidential business records of a public interest group.  And 
if they would not just forget the whole thing, he wanted more time to 

     The US Attorney would have asked for more time to respond if Bruce 
had not, so he was agreeable.  The clerk set a date for 6 weeks off.

     Lenny was paralyzed from the neck down.  The judge was asking him 
for the password, and he could not remember it.  The bailiff, clerk, 
Bruce and Mulroony were all talking in a huddle and he could not make 
sense out of anything they said, no matter how hard he tried.  

    "This will do it!" one of them said, and jammed a furry dead fish 
under his nose. 

    Lenny found he could move as he pushed it away.  He woke up to find 
the cat had been licking his face and smelling of fish flavored cat food. 
    5:14 AM.  "There isn't much point in trying to get back to sleep," he 
thought but Lenny flopped back on the bed.  The cat started to purr and 
kneed the covers.  Lenny absently rubbed its head, and thought about the 
next fundraising letter.  The DSO had had the effect of galvanizing the 
GreenRage membership, so donations were way up, and for the first time in 
several years, there was more than just a little money in the bank 
account of GreenRage.  Of course, it was flowing out almost as fast.  
Even though Bruce charged about half the going lawyer rate to public 
interest organiztions, fighting the DSO was going to cost them a bundle.  
"Just how much of the stuff on the disk is going to cause trouble,"  
Lenny realized he had spoken outloud.  If they asked for a special 
master, the membership list could be declared off limits.  Unlike the old 
days, when the cops could look through outgoing mail at the post office, 
an electronic mail list was fairly secure.  

     There wasn't much of interest in the finantial records either.  Oh, 
a few thousands spent for sabatage material would be hard to account for 
if they really dug into it, but the bulk of the money was spent on 
saleries, office supplies, rent, and telecom charges.  They could always 
claim the money was spent on spray cans and ceramic spikes for trees.  
And we can say we spent it for dope.  Lenny grinned at this one.  He had 
given up smoking dope, made him too paranoid.  But, every fall some 
unknown but appreciated benifactor sent the office a plastic tub of the 
stickyest buds you could imagine. Perhaps one of their above ground 
efforts had saved some trees screening the "crop."   Marge and Stel had 
split the tub the last two years. 

   The problem was not the lastest project.  Nor was it the one or two a 
month Lenny had put together over the last 3 years.  They were long 
perged, and the disk space overwritten.  And he didn't worry about the 
contents of the newletters.  Presumably *somebody* on the list was a 
ringer, and the cops had a collection of *The GreenFlag.*  What woke 
Lenny up in the middle of the night (besides his cat) was the stuff which 
they had on that WORM disk which *had not yet happened*.  He could 
probably get away with claiming that the files on the events which had 
happened were interactive fiction based on news stories.  Or could he?  
Nope, the damn files are dated prior to the "events," he thought.  And, 
even though fewer than half of the projects he had worked on ever came 
off, there were at least three or four of them they could nail me on.  

   Lenny turned the light on and pulled his palmtop out of the charging 
stand next to the bed.  He stretched the keyboard out to full size and 
set there trying to put his thoughts in order.  After entering his 
password, he brought up an organizer program.  It prompted:  State the 

    "I don't want to go to jail for conspiricy.  The only way to stay out 
of jail is to keep the cops from looking through the GreenRage computer 
files.  Or is it?   If they can't convence the judge that they need to 
look through the files, then no problem.  If they can, then they come 
asking me for the password.  Assuming they can't crack the encryption-- 
which seems likely.  If I give it, I go to jail, if I don't, I may get 
jailed for contempt, unless they give me blanket immunity.  In either 
case, my days of managing monkey wrench projects are over." 

    The organizer program came up with: 

    You have used one or more legal terms.  We recommend you submit your 
completed outline to a lawyer. 

    It then proceeded to break the statements into an if-then-else logic 
tree which did not help Lenny much either.