Hacker Crackdown by Bruce Sterling (the reader ebook txt) đ
- Author: Bruce Sterling
- Performer: 055356370X
Book online «Hacker Crackdown by Bruce Sterling (the reader ebook txt) đ». Author Bruce Sterling
This clash of values has been fraught with controversy. Many hackers of the 1960s remember their professional apprenticeship as a long guerilla war against the uptight mainframe-computer âinformation priesthood.â These computer-hungry youngsters had to struggle hard for access to computing power, and many of them were not above certain, er, shortcuts. But, over the years, this practice freed computing from the sterile reserve of lab-coated technocrats and was largely responsible for the explosive growth of computing in general societyâespecially PERSONAL computing.
Access to technical power acted like catnip on certain of these youngsters. Most of the basic techniques of computer intrusion: password cracking, trapdoors, backdoors, trojan horsesâwere invented in college environments in the 1960s, in the early days of network computing. Some off-the-cuff experience at computer intrusion was to be in the informal resume of most âhackersâ and many future industry giants. Outside of the tiny cult of computer enthusiasts, few people thought much about the implications of âbreaking intoâ computers. This sort of activity had not yet been publicized, much less criminalized.
In the 1960s, definitions of âpropertyâ and âprivacyâ had not yet been extended to cyberspace. Computers were not yet indispensable to society. There were no vast databanks of vulnerable, proprietary information stored in computers, which might be accessed, copied without permission, erased, altered, or sabotaged. The stakes were low in the early daysâbut they grew every year, exponentially, as computers themselves grew.
By the 1990s, commercial and political pressures had become overwhelming, and they broke the social boundaries of the hacking subculture. Hacking had become too important to be left to the hackers. Society was now forced to tackle the intangible nature of cyberspace-as-property, cyberspace as privately-owned unreal-estate. In the new, severe, responsible, high-stakes context of the âInformation Societyâ of the 1990s, âhackingâ was called into question.
What did it mean to break into a computer without permission and use its computational power, or look around inside its files without hurting anything? What were computer-intruding hackers, anywayâhow should society, and the law, best define their actions? Were they just BROWSERS, harmless intellectual explorers? Were they VOYEURS, snoops, invaders of privacy? Should they be sternly treated as potential AGENTS OF ESPIONAGE, or perhaps as INDUSTRIAL SPIES? Or were they best defined as TRESPASSERS, a very common teenage misdemeanor? Was hacking THEFT OF SERVICE? (After all, intruders were getting someone elseâs computer to carry out their orders, without permission and without paying). Was hacking FRAUD? Maybe it was best described as IMPERSONATION. The commonest mode of computer intrusion was (and is) to swipe or snoop somebody elseâs password, and then enter the computer in the guise of another personâwho is commonly stuck with the blame and the bills.
Perhaps a medical metaphor was betterâhackers should be defined as âsick,â as COMPUTER ADDICTS unable to control their irresponsible, compulsive behavior.
But these weighty assessments meant little to the people who were actually being judged. From inside the underground world of hacking itself, all these perceptions seem quaint, wrongheaded, stupid, or meaningless. The most important self-perception of underground hackersâfrom the 1960s, right through to the present dayâis that they are an ELITE. The day-to-day struggle in the underground is not over sociological definitionsâwho cares?âbut for power, knowledge, and status among oneâs peers.
When you are a hacker, it is your own inner conviction of your elite status that enables you to break, or let us say âtranscend,â the rules. It is not that ALL rules go by the board. The rules habitually broken by hackers are UNIMPORTANT rulesâthe rules of dopey greedhead telco bureaucrats and pig-ignorant government pests.
Hackers have their OWN rules, which separate behavior which is cool and elite, from behavior which is rodentlike, stupid and losing. These ârules,â however, are mostly unwritten and enforced by peer pressure and tribal feeling. Like all rules that depend on the unspoken conviction that everybody else is a good old boy, these rules are ripe for abuse. The mechanisms of hacker peer-pressure, âteletrialsâ and ostracism, are rarely used and rarely work. Back-stabbing slander, threats, and electronic harassment are also freely employed in down-and- dirty intrahacker feuds, but this rarely forces a rival out of the scene entirely. The only real solution for the problem of an utterly losing, treacherous and rodentlike hacker is to TURN HIM IN TO THE POLICE. Unlike the Mafia or Medellin Cartel, the hacker elite cannot simply execute the bigmouths, creeps and troublemakers among their ranks, so they turn one another in with astonishing frequency.
There is no tradition of silence or OMERTA in the hacker underworld. Hackers can be shy, even reclusive, but when they do talk, hackers tend to brag, boast and strut. Almost everything hackers do is INVISIBLE; if they donât brag, boast, and strut about it, then NOBODY WILL EVER KNOW. If you donât have something to brag, boast, and strut about, then nobody in the underground will recognize you and favor you with vital cooperation and respect.
The way to win a solid reputation in the underground is by telling other hackers things that could only have been learned by exceptional cunning and stealth. Forbidden knowledge, therefore, is the basic currency of the digital underground, like seashells among Trobriand Islanders. Hackers hoard this knowledge, and dwell upon it obsessively, and refine it, and bargain with it, and talk and talk about it.
Many hackers even suffer from a strange obsession to TEACHâto spread the ethos and the knowledge of the digital underground. Theyâll do this even when it gains them no particular advantage and presents a grave personal risk.
And when that risk catches up with them, they will go right on teaching and preachingâto a new audience this time, their interrogators from law enforcement. Almost every hacker arrested tells everything he knowsâall about his friends, his mentors, his disciplesâlegends, threats, horror stories, dire rumors, gossip, hallucinations. This is, of course, convenient for law enforcementâexcept when law enforcement begins to believe hacker legendry.
Phone phreaks are unique among criminals in their willingness to call up law enforcement officialsâin the office, at their homesâand give them an extended piece of their mind. It is hard not to interpret this as BEGGING FOR ARREST, and in fact it is an act of incredible foolhardiness. Police are naturally nettled by these acts of chutzpah and will go well out of their way to bust these flaunting idiots. But it can also be interpreted as a product of a worldview so elitist, so closed and hermetic, that electronic police are simply not perceived as âpolice,â but rather as ENEMY PHONE PHREAKS who should be scolded into behaving âdecently.â
Hackers at their most grandiloquent perceive themselves as the elite pioneers of a new electronic world. Attempts to make them obey the democratically established laws of contemporary American society are seen as repression and persecution. After all, they argue, if Alexander Graham Bell had gone along with the rules of the Western Union telegraph company, there would have been no telephones. If Jobs and Wozniak had believed that IBM was the be-all and end-all, there would have been no personal computers. If Benjamin Franklin and Thomas Jefferson had tried to âwork within the systemâ there would have been no United States.
Not only do hackers privately believe this as an article of faith, but they have been known to write ardent manifestos about it. Here are some revealing excerpts from an especially vivid hacker manifesto: âThe Techno-Revolutionâ by âDr. Crash,â which appeared in electronic form in PHRACK Volume 1, Issue 6, Phile 3.
âTo fully explain the true motives behind hacking, we must first take a quick look into the past. In the 1960s, a group of MIT students built the first modern computer system. This wild, rebellious group of young men were the first to bear the name âhackers.â The systems that they developed were intended to be used to solve world problems and to benefit all of mankind.
âAs we can see, this has not been the case. The computer system has been solely in the hands of big businesses and the government. The wonderful device meant to enrich life has become a weapon which dehumanizes people. To the government and large businesses, people are no more than disk space, and the government doesnât use computers to arrange aid for the poor, but to control nuclear death weapons. The average American can only have access to a small microcomputer which is worth only a fraction of what they pay for it. The businesses keep the true state-of-the-art equipment away from the people behind a steel wall of incredibly high prices and bureaucracy. It is because of this state of affairs that hacking was born.(âŠ)
âOf course, the government doesnât want the monopoly of technology broken, so they have outlawed hacking and arrest anyone who is caught.(âŠ) The phone company is another example of technology abused and kept from people with high prices.(âŠ)
âHackers often find that their existing equipment, due to the monopoly tactics of computer companies, is inefficient for their purposes. Due to the exorbitantly high prices, it is impossible to legally purchase the necessary equipment. This need has given still another segment of the fight: Credit Carding. Carding is a way of obtaining the necessary goods without paying for them. It is again due to the companiesâ stupidity that Carding is so easy, and shows that the worldâs businesses are in the hands of those with considerably less technical know-how than we, the hackers. (âŠ)
âHacking must continue. We must train newcomers to the art of hacking.(âŠ) And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. Donât worry, youâre on the right side.â
The defense of âcardingâ is rare. Most hackers regard credit-card theft as âpoisonâ to the underground, a sleazy and immoral effort that, worse yet, is hard to get away with. Nevertheless, manifestos advocating credit-card theft, the deliberate crashing of computer systems, and even acts of violent physical destruction such as vandalism and arson do exist in the underground. These boasts and threats are taken quite seriously by the police. And not every hacker is an abstract, Platonic computer-nerd. Some few are quite experienced at picking locks, robbing phone-trucks, and breaking and entering buildings.
Hackers vary in their degree of hatred for authority and the violence of their rhetoric. But, at a bottom line, they are scofflaws. They donât regard the current rules of electronic behavior as respectable efforts to preserve law and order and protect public safety. They regard these laws as immoral efforts by soulless corporations to protect their profit margins and to crush dissidents. âStupidâ people, including police, businessmen, politicians, and journalists, simply have no right to judge the actions of those possessed of genius, techno-revolutionary intentions, and technical expertise.
Hackers are generally teenagers and college kids not engaged in earning a living. They often come from fairly well-to-do middle-class backgrounds, and are markedly anti-materialistic (except, that is, when it comes to computer equipment). Anyone motivated by greed for mere money (as opposed to the greed for power, knowledge and status) is swiftly written-off as a narrow-minded breadhead whose interests can only be corrupt and contemptible. Having grown up in the 1970s and 1980s, the young Bohemians of the digital underground regard straight society as awash in plutocratic corruption,
Comments (0)