PROBLEMS IN CYBERSPACE

"...IS THE BIGGEST LOAD OF HORSESHI....is this being
recorded? Are we live?!! ...ON CNN?!!!!"
— Philip Cassini, professional cynic




Although I'm a big fan of both Cyberpunk2020 and Shadowrun, I'm also a big critic. One of the biggest screw-ups in the creation of both systems was the cyberspace section. In CP2020 cyberspace is some bizarre Gibsonesque deadspace based upon strange concepts (such as spatial distance and travel time) that just don't exist on a network. In Shadowrun cyberspace is an overpainted cyberdungeon/maze populated by nasty 10HD monsters with THACOs of 12, -oops- , wrong system. This essay is an attempt to correct the fallacies in computing as defined by FASA and Talsorian.



Interface

On a conceptual level, both systems rely too much on interface and pretty iconography, and almost completely ignore the 'guts' of the system, which would always be the primary concern of any hacker. Interface and GUIs are for lame users; command lines and source-code are the bread-and-butter of real hackers, and I surmise that despite the amazing neural connections prevalent in 20xx, the average hacker still has to write, compile and hack code. There's no way around it. Computer systems cannot be penetrated without corrupting/altering existing programs (which necessitates code-crunching); introducing your own source code programs (which then compile on the host); or finding loopholes within the OS or the applications. This would be done manually to minimize effort, processor time, and compile time. For those who argue that in future all programming, even that done by hackers, will be done using coloured object-blocks, I would like to point out that someone had to have built those code-blocks in the first place, and that Object Oriented Programming may be fast but it's not very efficient or sophisticated, both traits vital to hacking.



Geography

Several erroneous concepts in the games require closer examination. The idea of 'travelling' through datalines/pathways/links along a defined geographic netspace is completely wrong. There is no space in cyberspace, counter-intuitve though that sentence may be. Think about it. When you type in a web address, does your computer show you a series of pictures as you travel through the network? No, for several reasons. First, it's a waste of both your time and the computer's processor. Second, in a distributed packet-switching network, there is no single pathway between you and the host computer. Each packet travels a different route, so which route should the computer show? Also, the connection functions of the network are transparent; if each packet had to travel down datalines at the perceived speed described in both games, we'd be running at 1200 baud. Travel (data transfer) speeds in 20xx are amazingly fast (think something like 1000 Terabytes/second) so -boom!- you're either there staring at the front-end of a server, or network lag prevents access and you don't see anything.



Graphics

The description of the Ihara-Grubb Transformations is ridiculous and completely outdated. FASA's copycat idea of Universal Matrix Specifications was eventually watered-down after the idea of Sculpted Systems caught on. Shadowrun got one thing right in the form of Filters. Why should I look at the net as some other schmoe designed it? I want my network to look like an exotic zoo, not some blurry neon polyhedrons! Why do you think Win95 had all those customizable icons and backgrounds and shit? Except for the office drones who must work within a standardized (though not necessarily boring) graphical environment, personal home users and hackers can see the net through any desired filter. Matter of fact, selling filters is a business like selling gourmet coffee. Of course, filters can be customized to leave interesting foreign sculptures as they are, but users often customize the more mundane aspects to suit their tastes. If your hacker doesn't have the imagination to describe a filter, tell him he sees everything in shades of grey. That'll get him going.



Tracing

Tracing illegitimate entities in a distributed network is devilishly difficult even today, doubly so in the future when ~3 billion people will be using a network that will be populated by additional billions of travelling software entities. Some people respond by saying that today Microsoft can 'connect' to your computer and determine what kind of software/hardware you have. Indeed, but that's because network traffic is all unencrypted and provided with big labels such as USER, LOCATION, NAME, etc which can be read by hosts to get information about you. Each computer connected (even by slow modem) to the net receives an address which is stored in universal registries known as the DNS (Domain Name System). However, it's ridiculously easy to forge such things as packet headers and DNS entries - just witness the proliferation of 'anonymous' posters to Usenet, or the great number of bizarre emails from 'clinton@blackhouse.gov', 'madonna@biteme.com', etc. Not convinced yet? The first thing a hacker learns is how to forge an identity, and all hackers are proficient in altering the headers of emails or packets to hide their source destination or other details. If you don't have a big label saying where a packet originated, it becomes next to impossible to trace it back because of the nature of the network. The net has billions of branches and pathways, any one of which could have spewed the forged packet. Once (not If) network packets become encrypted using new standards and 10k-byte keys, they become unbreakable even in theory, even on superfuturistic computers. Without getting into the details of cryptology here, suffice it to say that within the next twenty years we will see unbreakable encryption become a standard that just cannot be broken. This is why the US government fears such encryption and attempts to cripple it using mediocre systems such as Clipper.



Long-Distance Fees

A big booboo that Shadowrun thankfully missed (doubtless by accident). Long-distance prices have been dropping geometrically for the last 80 years, and will continue to do so because of new advances in telecoms technology, global competition, a huge rise in bandwidth, and network activity. As phone, television cable, and networks merge into a digital datastream, the impetus to reduce prices will mean that eventually long-distance charges will be replaced by content-based user fees, much as cable is piped into your home irrespective of the distance it has to travel (eg: from Hollywood to you). Users of the network will pay either by the load they introduce into the network, or by the services they subscribe to, such as various 'television' channels or news programmes. Since hackers hide their 'signature' and location, they cannot be billed, and so don't have to pay. CP2020 seems to have forgotten that if a netrunner can be billed for an illegal penetration (a dubious legal practise at best), he can also be easily traced (see above). If tracing netrunners is so easy, why can't every corporation do it? Answer: drop all billing schemes. To spice things up, you may wish to introduce a special form of 'Accountant' ICE that drains a hacker's bank accounts if he loses against it.



Copyright & Piracy

Why would someone from North America pay $15 for a music CD when he could get the same music from a Hongkong dealer for 15 cents? Copyright and piracy have already lead to international brawls between America and China, and they will continue to be thorn in the sides of advanced information economies until copyrighted creative products can be technically (as opposed to legally) protected. Such protection has been theoretically developed in the concept of watermarks. Watermarks are mathematically-embedded patterns hidden within creative works in such a way as to make them invisible to the average user, but instantly recognizable by an inspector. Watermarks can be embedded in such a way that removing them would seriously distort the product that they are protecting.



Cybercombat

Today's computers can perform billions of operations per second. How many operations per second can you do? This should amply illustrate the futility of trying to defeat a computer system in real-time, or of 'writing programs on the fly' to defeat ICE. Attacking AIs becomes even more brainless. In a situation where a hacker has to personally fight the defences of a system in real-time, he will always lose. Unfortunately for those of us who like fast action, hacking is a slow and painstaking process of micromanagement and skill, not a flashy encounter between a lone cyberwarrior and hordes of ICE monsters. Hackers rely on powerful program tools, loopholes, and planning to penetrate a system. The first usually take at least several days (or weeks) to code, but do not automatically confer any advantage from outside the system. A hacker has to weasel his way into a system to execute said programs to get any benefit from them.

It must also be pointed out that the integration of communication devices into a single global network will make the use of separate satlinks (Virtual Realities, Page xx), microwave relays, and cellular communicators obsolete because the network will utilise each and every one of these systems to transmit data seamlessly. Dedicated direct-line transmissions will be rare and disconnected from the global net - and who, after all, would want to do that in 20xx?




Having SEX, or The Programmer Mentality

"At Group L, Stoffel oversees six first-rate programmers, a managerial challenge roughly comparable to herding cats."
— The Washington Post Magazine, 9 June, 1985

Computer systems and programs are not the logical, orderly, scientific things the public imagines them to be. They are absolutely riddled with loopholes, bugs, mistakes, rips, flaws, misconceptions, and intentional weirdness. Fixing/exploiting these is what provides both computer consultants and hackers with jobs. Operating systems and programs are rife with bizarre commands, hidden messages, obscure references and inside jokes, and forgotten back doors. An amusing example comes from the Digital development team in Armonk who, when asked to create a rudimentary software exchange protocol, named it SEX. When ordered by management to remove that name, they 'sabotaged' two other commands for AND and OR logic gates, calling them ANL and ORL respectively. The injoke/high mischievous nature of programmers makes netrunning much more fun, and helps to explain why hackers can break into the most sophisticated and secure military systems - those systems were designed ten years beforehand by MIT freshmen graduates (or other pranksters).

Well, that's all the ranting I can handle for today. I'll need to restock on my reserves of bile if I want to continue this discussion. Cheers for now.


NEON

TWILIGHT