Hacker Crackdown by Bruce Sterling (the reader ebook txt) đ
- Author: Bruce Sterling
- Performer: 055356370X
Book online «Hacker Crackdown by Bruce Sterling (the reader ebook txt) đ». Author Bruce Sterling
How horrifying to have made friends in another state and to be deprived of their companyâand their softwareâjust because telephone companies demand absurd amounts of money! How painful, to be restricted to boards in oneâs own AREA CODEâwhat the heck is an âarea codeâ anyway, and what makes it so special? A few grumbles, complaints, and innocent questions of this sort will often elicit a sympathetic reply from another board userâsomeone with some stolen codes to hand. You dither a while, knowing this isnât quite right, then you make up your mind to try them anyhowâAND THEY WORD! Suddenly youâre doing something even your parents canât do. Six months ago you were just some kidânow, youâre the Crimson Flash of Area Code 512! Youâre badâyouâre nationwide!
Maybe youâll stop at a few abused codes. Maybe youâll decide that boards arenât all that interesting after all, that itâs wrong, not worth the riskâbut maybe you wonât. The next step is to pick up your own repeat-dialling programâto learn to generate your own stolen codes. (This was dead easy five years ago, much harder to get away with nowadays, but not yet impossible.) And these dialling programs are not complex or intimidatingâsome are as small as twenty lines of software.
Now, you too can share codes. You can trade codes to learn other techniques. If youâre smart enough to catch on, and obsessive enough to want to bother, and ruthless enough to start seriously bending rules, then youâll get better, fast. You start to develop a rep. You move up to a heavier class of boardâa board with a bad attitude, the kind of board that naive dopes like your classmates and your former self have never even heard of! You pick up the jargon of phreaking and hacking from the board. You read a few of those anarchy philesâand man, you never realized you could be a real OUTLAW without ever leaving your bedroom.
You still play other computer games, but now you have a new and bigger game. This one will bring you a different kind of status than destroying even eight zillion lousy space invaders.
Hacking is perceived by hackers as a âgame.â This is not an entirely unreasonable or sociopathic perception. You can win or lose at hacking, succeed or fail, but it never feels âreal.â Itâs not simply that imaginative youngsters sometimes have a hard time telling âmake-believeâ from âreal life.â Cyberspace is NOT REAL! âRealâ things are physical objects like trees and shoes and cars. Hacking takes place on a screen. Words arenât physical, numbers (even telephone numbers and credit card numbers) arenât physical. Sticks and stones may break my bones, but data will never hurt me. Computers SIMULATE reality, like computer games that simulate tank battles or dogfights or spaceships. Simulations are just make-believe, and the stuff in computers is NOT REAL.
Consider this: if âhackingâ is supposed to be so serious and real-life and dangerous, then how come NINE-YEAR-OLD KIDS have computers and modems? You wouldnât give a nine year old his own car, or his own rifle, or his own chainsawâthose things are âreal.â
People underground are perfectly aware that the âgameâ is frowned upon by the powers that be. Word gets around about busts in the underground. Publicizing busts is one of the primary functions of pirate boards, but they also promulgate an attitude about them, and their own idiosyncratic ideas of justice. The users of underground boards wonât complain if some guy is busted for crashing systems, spreading viruses, or stealing money by wire-fraud. They may shake their heads with a sneaky grin, but they wonât openly defend these practices. But when a kid is charged with some theoretical amount of theft: $233,846.14, for instance, because he sneaked into a computer and copied something, and kept it in his house on a floppy diskâthis is regarded as a sign of near-insanity from prosecutors, a sign that theyâve drastically mistaken the immaterial game of computing for their real and boring everyday world of fatcat corporate money.
Itâs as if big companies and their suck-up lawyers think that computing belongs to them, and they can retail it with price stickers, as if it were boxes of laundry soap! But pricing âinformationâ is like trying to price air or price dreams. Well, anybody on a pirate board knows that computing can be, and ought to be, FREE. Pirate boards are little independent worlds in cyberspace, and they donât belong to anybody but the underground. Underground boards arenât âbrought to you by Procter & Gamble.â
To log on to an underground board can mean to experience liberation, to enter a world where, for once, money isnât everything and adults donât have all the answers.
Letâs sample another vivid hacker manifesto. Here are some excerpts from âThe Conscience of a Hacker,â by âThe Mentor,â from PHRACK Volume One, Issue 7, Phile 3.
âI made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, itâs because I screwed it up. Not because it doesnât like me.(âŠ)
âAnd then it happened⊠a door opened to a world⊠rushing through the phone line like heroin through an addictâs veins, an electronic pulse is sent out, a refuge from day-to-day incompetencies is sought⊠a board is found. âThis is it⊠this is where I belongâŠâ
âI know everyone here⊠even if Iâve never met them, never talked to them, may never hear from them again⊠I know you allâŠ(âŠ)
âThis is our world nowâŠ. the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasnât run by profiteering gluttons, and you call us criminals. We explore⊠and you call us criminals. We seek after knowledge⊠and you call us criminals. We exist without skin color, without nationality, without religious bias⊠and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat and lie to us and try to make us believe that itâs for our own good, yet weâre the criminals.
âYes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.â
There have been underground boards almost as long as there have been boards. One of the first was 8BBS, which became a stronghold of the West Coast phone-phreak elite. After going on-line in March 1980, 8BBS sponsored âSusan Thunder,â and âTuc,â and, most notoriously, âthe Condor.â âThe Condorâ bore the singular distinction of becoming the most vilified American phreak and hacker ever. Angry underground associates, fed up with Condorâs peevish behavior, turned him in to police, along with a heaping double-helping of outrageous hacker legendry. As a result, Condor was kept in solitary confinement for seven months, for fear that he might start World War Three by triggering missile silos from the prison payphone. (Having served his time, Condor is now walking around loose; WWIII has thus far conspicuously failed to occur.)
The sysop of 8BBS was an ardent free-speech enthusiast who simply felt that ANY attempt to restrict the expression of his users was unconstitutional and immoral. Swarms of the technically curious entered 8BBS and emerged as phreaks and hackers, until, in 1982, a friendly 8BBS alumnus passed the sysop a new modem which had been purchased by credit-card fraud. Police took this opportunity to seize the entire board and remove what they considered an attractive nuisance.
Plovernet was a powerful East Coast pirate board that operated in both New York and Florida. Owned and operated by teenage hacker âQuasi Moto,â Plovernet attracted five hundred eager users in 1983. âEmmanuel Goldsteinâ was one-time co-sysop of Plovernet, along with âLex Luthor,â founder of the âLegion of Doomâ group. Plovernet bore the signal honor of being the original home of the âLegion of Doom,â about which the reader will be hearing a great deal, soon.
âPirate-80,â or âP-80,â run by a sysop known as âScan-Man,â got into the game very early in Charleston, and continued steadily for years. P-80 flourished so flagrantly that even its most hardened users became nervous, and some slanderously speculated that âScan Manâ must have ties to corporate security, a charge he vigorously denied.
â414 Privateâ was the home board for the first GROUP to attract conspicuous trouble, the teenage â414 Gang,â whose intrusions into Sloan-Kettering Cancer Center and Los Alamos military computers were to be a nine-days-wonder in 1982.
At about this time, the first software piracy boards began to open up, trading cracked games for the Atari 800 and the Commodore C64. Naturally these boards were heavily frequented by teenagers. And with the 1983 release of the hacker-thriller movie WAR GAMES, the scene exploded. It seemed that every kid in America had demanded and gotten a modem for Christmas. Most of these dabbler wannabes put their modems in the attic after a few weeks, and most of the remainder minded their Pâs and Qâs and stayed well out of hot water. But some stubborn and talented diehards had this hacker kid in WAR GAMES figured for a happening dude. They simply could not rest until they had contacted the undergroundâor, failing that, created their own.
In the mid-80s, underground boards sprang up like digital fungi. ShadowSpawn Elite. Sherwood Forest I, II, and III. Digital Logic Data Service in Florida, sysoped by no less a man than âDigital Logicâ himself; Lex Luthor of the Legion of Doom was prominent on this board, since it was in his area code. Lexâs own board, âLegion of Doom,â started in 1984. The Neon Knights ran a network of Apple-hacker boards: Neon Knights North, South, East and West. Free World II was run by âMajor Havoc.â Lunatic Labs is still in operation as of this writing. Dr. Ripco in Chicago, an anything-goes anarchist board with an extensive and raucous history, was seized by Secret Service agents in 1990 on Sundevil day, but up again almost immediately, with new machines and scarcely diminished vigor.
The St. Louis scene was not to rank with major centers of American hacking such as New York and L.A. But St. Louis did rejoice in possession of âKnight Lightningâ and âTaran King,â two of the foremost JOURNALISTS native to the underground. Missouri boards like Metal Shop, Metal Shop Private, Metal Shop Brewery, may not have been the heaviest boards around in terms of illicit expertise. But they became boards where hackers could exchange social gossip and try to figure out what the heck was going on nationallyâand internationally. Gossip from Metal Shop was put into the form of news files, then assembled into a general electronic publication, PHRACK, a portmanteau title coined from âphreakâ and âhack.â The PHRACK editors were as obsessively curious about other hackers as hackers were about machines.
PHRACK, being free of charge and lively reading, began to circulate throughout the underground. As Taran King and Knight Lightning left high school for college, PHRACK began to appear on mainframe machines linked to BITNET, and, through BITNET to the âInternet,â that loose but extremely potent not-for-profit network where academic, governmental and corporate machines trade data through the UNIX TCP/IP protocol. (The âInternet Wormâ of November 2-3,1988, created by Cornell grad student Robert Morris, was to be the largest and best-publicized computer-intrusion scandal to date. Morris claimed that his ingenious âwormâ program was meant to harmlessly explore the Internet, but due to bad programming, the Worm replicated out of control and crashed some six thousand Internet computers. Smaller-scale and less ambitious Internet hacking was a standard for the underground
Comments (0)