Hacker Crackdown by Bruce Sterling (the reader ebook txt) đź“–
- Author: Bruce Sterling
- Performer: 055356370X
Book online «Hacker Crackdown by Bruce Sterling (the reader ebook txt) 📖». Author Bruce Sterling
Specialized orthography, especially the use of “ph” for “f” and “z” for the plural “s,” are instant recognition symbols. So is the use of the numeral “0” for the letter “O”—computer-software orthography generally features a slash through the zero, making the distinction obvious.
Some terms are poetically descriptive of computer intrusion: the Stowaways, the Hitchhikers, the PhoneLine Phantoms, Coast-to-Coast. Others are simple bravado and vainglorious puffery. (Note the insistent use of the terms “elite” and “master.”) Some terms are blasphemous, some obscene, others merely cryptic—anything to puzzle, offend, confuse, and keep the straights at bay.
Many hacker groups further re-encrypt their names by the use of acronyms: United Technical Underground becomes UTU, Farmers of Doom become FoD, the United SoftWareZ Force becomes, at its own insistence, “TuSwF,” and woe to the ignorant rodent who capitalizes the wrong letters.
It should be further recognized that the members of these groups are themselves pseudonymous. If you did, in fact, run across the “PhoneLine Phantoms,” you would find them to consist of “Carrier Culprit,” “The Executioner,” “Black Majik,” “Egyptian Lover,” “Solid State,” and “Mr Icom.” “Carrier Culprit” will likely be referred to by his friends as “CC,” as in, “I got these dialups from CC of PLP.”
It’s quite possible that this entire list refers to as few as a thousand people. It is not a complete list of underground groups—there has never been such a list, and there never will be. Groups rise, flourish, decline, share membership, maintain a cloud of wannabes and casual hangers-on. People pass in and out, are ostracized, get bored, are busted by police, or are cornered by telco security and presented with huge bills. Many “underground groups” are software pirates, “warez d00dz,” who might break copy protection and pirate programs, but likely wouldn’t dare to intrude on a computer-system.
It is hard to estimate the true population of the digital underground. There is constant turnover. Most hackers start young, come and go, then drop out at age 22—the age of college graduation. And a large majority of “hackers” access pirate boards, adopt a handle, swipe software and perhaps abuse a phone-code or two, while never actually joining the elite.
Some professional informants, who make it their business to retail knowledge of the underground to paymasters in private corporate security, have estimated the hacker population at as high as fifty thousand. This is likely highly inflated, unless one counts every single teenage software pirate and petty phone-booth thief. My best guess is about 5,000 people. Of these, I would guess that as few as a hundred are truly “elite”—active computer intruders, skilled enough to penetrate sophisticated systems and truly to worry corporate security and law enforcement.
Another interesting speculation is whether this group is growing or not. Young teenage hackers are often convinced that hackers exist in vast swarms and will soon dominate the cybernetic universe. Older and wiser veterans, perhaps as wizened as 24 or 25 years old, are convinced that the glory days are long gone, that the cops have the underground’s number now, and that kids these days are dirt-stupid and just want to play Nintendo.
My own assessment is that computer intrusion, as a nonprofit act of intellectual exploration and mastery, is in slow decline, at least in the United States; but that electronic fraud, especially telecommunication crime, is growing by leaps and bounds.
One might find a useful parallel to the digital underground in the drug underground. There was a time, now much-obscured by historical revisionism, when Bohemians freely shared joints at concerts, and hip, small-scale marijuana dealers might turn people on just for the sake of enjoying a long stoned conversation about the Doors and Allen Ginsberg. Now drugs are increasingly verboten, except in a high-stakes, highly-criminal world of highly addictive drugs. Over years of disenchantment and police harassment, a vaguely ideological, freewheeling drug underground has relinquished the business of drug-dealing to a far more savage criminal hard-core. This is not a pleasant prospect to contemplate, but the analogy is fairly compelling.
What does an underground board look like? What distinguishes it from a standard board? It isn’t necessarily the conversation—hackers often talk about common board topics, such as hardware, software, sex, science fiction, current events, politics, movies, personal gossip. Underground boards can best be distinguished by their files, or “philes,” pre-composed texts which teach the techniques and ethos of the underground. These are prized reservoirs of forbidden knowledge. Some are anonymous, but most proudly bear the handle of the “hacker” who has created them, and his group affiliation, if he has one.
Here is a partial table-of-contents of philes from an underground board, somewhere in the heart of middle America, circa 1991. The descriptions are mostly self-explanatory.
BANKAMER.ZIP 5406 06-11-91 Hacking Bank America CHHACK.ZIP 4481 06-11-91 Chilton Hacking CITIBANK.ZIP 4118 06-11-91 Hacking Citibank CREDIMTC.ZIP 3241 06-11-91 Hacking Mtc Credit Company DIGEST.ZIP 5159 06-11-91 Hackers Digest HACK.ZIP 14031 06-11-91 How To Hack HACKBAS.ZIP 5073 06-11-91 Basics Of Hacking HACKDICT.ZIP 42774 06-11-91 Hackers Dictionary HACKER.ZIP 57938 06-11-91 Hacker Info HACKERME.ZIP 3148 06-11-91 Hackers Manual HACKHAND.ZIP 4814 06-11-91 Hackers Handbook HACKTHES.ZIP 48290 06-11-91 Hackers Thesis HACKVMS.ZIP 4696 06-11-91 Hacking Vms Systems MCDON.ZIP 3830 06-11-91 Hacking Macdonalds (Home Of The Archs) P500UNIX.ZIP 15525 06-11-91 Phortune 500 Guide To Unix RADHACK.ZIP 8411 06-11-91 Radio Hacking TAOTRASH.DOC 4096 12-25-89 Suggestions For Trashing TECHHACK.ZIP 5063 06-11-91 Technical Hacking
The files above are do-it-yourself manuals about computer intrusion. The above is only a small section of a much larger library of hacking and phreaking techniques and history. We now move into a different and perhaps surprising area.
+––––+
| Anarchy |
+––––+
ANARC.ZIP 3641 06-11-91 Anarchy Files ANARCHST.ZIP 63703 06-11-91 Anarchist Book ANARCHY.ZIP 2076 06-11-91 Anarchy At Home ANARCHY3.ZIP 6982 06-11-91 Anarchy No 3 ANARCTOY.ZIP 2361 06-11-91 Anarchy Toys ANTIMODM.ZIP 2877 06-11-91 Anti-modem Weapons ATOM.ZIP 4494 06-11-91 How To Make An Atom Bomb BARBITUA.ZIP 3982 06-11-91 Barbiturate Formula BLCKPWDR.ZIP 2810 06-11-91 Black Powder Formulas BOMB.ZIP 3765 06-11-91 How To Make Bombs BOOM.ZIP 2036 06-11-91 Things That Go Boom CHLORINE.ZIP 1926 06-11-91 Chlorine Bomb COOKBOOK.ZIP 1500 06-11-91 Anarchy Cook Book DESTROY.ZIP 3947 06-11-91 Destroy Stuff DUSTBOMB.ZIP 2576 06-11-91 Dust Bomb ELECTERR.ZIP 3230 06-11-91 Electronic Terror EXPLOS1.ZIP 2598 06-11-91 Explosives 1 EXPLOSIV.ZIP 18051 06-11-91 More Explosives EZSTEAL.ZIP 4521 06-11-91 Ez-stealing FLAME.ZIP 2240 06-11-91 Flame Thrower FLASHLT.ZIP 2533 06-11-91 Flashlight Bomb FMBUG.ZIP 2906 06-11-91 How To Make An Fm Bug OMEEXPL.ZIP 2139 06-11-91 Home Explosives HOW2BRK.ZIP 3332 06-11-91 How To Break In LETTER.ZIP 2990 06-11-91 Letter Bomb LOCK.ZIP 2199 06-11-91 How To Pick Locks MRSHIN.ZIP 3991 06-11-91 Briefcase Locks NAPALM.ZIP 3563 06-11-91 Napalm At Home NITRO.ZIP 3158 06-11-91 Fun With Nitro PARAMIL.ZIP 2962 06-11-91 Paramilitary Info PICKING.ZIP 3398 06-11-91 Picking Locks PIPEBOMB.ZIP 2137 06-11-91 Pipe Bomb POTASS.ZIP 3987 06-11-91 Formulas With Potassium PRANK.TXT 11074 08-03-90 More Pranks To Pull On Idiots! REVENGE.ZIP 4447 06-11-91 Revenge Tactics ROCKET.ZIP 2590 06-11-91 Rockets For Fun SMUGGLE.ZIP 3385 06-11-91 How To Smuggle
HOLY COW! The damned thing is full of stuff about bombs!
What are we to make of this?
First, it should be acknowledged that spreading knowledge about demolitions to teenagers is a highly and deliberately antisocial act. It is not, however, illegal.
Second, it should be recognized that most of these philes were in fact WRITTEN by teenagers. Most adult American males who can remember their teenage years will recognize that the notion of building a flamethrower in your garage is an incredibly neat-o idea. ACTUALLY building a flamethrower in your garage, however, is fraught with discouraging difficulty. Stuffing gunpowder into a booby-trapped flashlight, so as to blow the arm off your high-school vice-principal, can be a thing of dark beauty to contemplate. Actually committing assault by explosives will earn you the sustained attention of the federal Bureau of Alcohol, Tobacco and Firearms.
Some people, however, will actually try these plans. A determinedly murderous American teenager can probably buy or steal a handgun far more easily than he can brew fake “napalm” in the kitchen sink. Nevertheless, if temptation is spread before people a certain number will succumb, and a small minority will actually attempt these stunts. A large minority of that small minority will either fail or, quite likely, maim themselves, since these “philes” have not been checked for accuracy, are not the product of professional experience, and are often highly fanciful. But the gloating menace of these philes is not to be entirely dismissed.
Hackers may not be “serious” about bombing; if they were, we would hear far more about exploding flashlights, homemade bazookas, and gym teachers poisoned by chlorine and potassium. However, hackers are VERY serious about forbidden knowledge. They are possessed not merely by curiosity, but by a positive LUST TO KNOW. The desire to know what others don’t is scarcely new. But the INTENSITY of this desire, as manifested by these young technophilic denizens of the Information Age, may in fact BE new, and may represent some basic shift in social values—a harbinger of what the world may come to, as society lays more and more value on the possession, assimilation and retailing of INFORMATION as a basic commodity of daily life.
There have always been young men with obsessive interests in these topics. Never before, however, have they been able to network so extensively and easily, and to propagandize their interests with impunity to random passers-by. High-school teachers will recognize that there’s always one in a crowd, but when the one in a crowd escapes control by jumping into the phonelines, and becomes a hundred such kids all together on a board, then trouble is brewing visibly. The urge of authority to DO SOMETHING, even something drastic, is hard to resist. And in 1990, authority did something. In fact authority did a great deal.
The process by which boards create hackers goes something like this. A youngster becomes interested in computers—usually, computer games. He hears from friends that “bulletin boards” exist where games can be obtained for free. (Many computer games are “freeware,” not copyrighted—invented simply for the love of it and given away to the public; some of these games are quite good.) He bugs his parents for a modem, or quite often, uses his parents’ modem.
The world of boards suddenly opens up. Computer games can be quite expensive, real budget-breakers for a kid, but pirated games, stripped of copy protection, are cheap or free. They are also illegal, but it is very rare, almost unheard of, for a small-scale software pirate to be prosecuted. Once “cracked” of its copy protection, the program, being digital data, becomes infinitely reproducible. Even the instructions to the game, any manuals that accompany it, can be reproduced as text files, or photocopied from legitimate sets. Other users on boards can give many useful hints in game-playing tactics. And a youngster with an infinite supply of free computer games can certainly cut quite a swath among his modem-less friends.
And boards are pseudonymous. No one need know that you’re fourteen years old—with a little practice at subterfuge, you can talk to adults about adult things, and be accepted and taken seriously! You can even pretend to be a girl, or an old man, or anybody you can imagine. If you find this kind of deception gratifying, there is ample opportunity to hone your ability on boards.
But local boards can grow stale. And almost every board maintains a list of phone-numbers to other boards, some in distant, tempting, exotic locales. Who knows what they’re up to, in Oregon or Alaska or Florida or California? It’s very easy to find out—just order the modem to call through its software— nothing to this, just typing on a keyboard, the same thing you would do for most any computer game. The machine reacts swiftly and in a few seconds you are talking to a bunch of interesting people on another seaboard.
And yet the BILLS for this trivial action can be staggering! Just
Comments (0)