BestLightNovel.com

The Hacker Crackdown Part 11

The Hacker Crackdown - BestLightNovel.com

You’re reading novel The Hacker Crackdown Part 11 online at BestLightNovel.com. Please use the follow button to get notification about the latest chapter next time when you visit BestLightNovel.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy

Access to technical power acted like catnip on certain of these youngsters. Most of the basic techniques of computer intrusion: pa.s.sword cracking, trapdoors, backdoors, trojan horses--were invented in college environments in the 1960s, in the early days of network computing. Some off-the-cuff experience at computer intrusion was to be in the informal resume of most "hackers" and many future industry giants.

Outside of the tiny cult of computer enthusiasts, few people thought much about the implications of "breaking into"

computers. This sort of activity had not yet been publicized, much less criminalized.

In the 1960s, definitions of "property" and "privacy"

had not yet been extended to cybers.p.a.ce. Computers were not yet indispensable to society. There were no vast databanks of vulnerable, proprietary information stored in computers, which might be accessed, copied without permission, erased, altered, or sabotaged. The stakes were low in the early days--but they grew every year, exponentially, as computers themselves grew.

By the 1990s, commercial and political pressures had become overwhelming, and they broke the social boundaries of the hacking subculture. Hacking had become too important to be left to the hackers.

Society was now forced to tackle the intangible nature of cybers.p.a.ce-as-property, cybers.p.a.ce as privately-owned unreal-estate. In the new, severe, responsible, high-stakes context of the "Information Society" of the 1990s, "hacking" was called into question.

What did it mean to break into a computer without permission and use its computational power, or look around inside its files without hurting anything?

What were computer-intruding hackers, anyway--how should society, and the law, best define their actions?

Were they just BROWSERS, harmless intellectual explorers?

Were they VOYEURS, snoops, invaders of privacy? Should they be sternly treated as potential AGENTS OF ESPIONAGE, or perhaps as INDUSTRIAL SPIES? Or were they best defined as TRESPa.s.sERS, a very common teenage misdemeanor? Was hacking THEFT OF SERVICE?

(After all, intruders were getting someone else's computer to carry out their orders, without permission and without paying). Was hacking FRAUD? Maybe it was best described as IMPERSONATION. The commonest mode of computer intrusion was (and is) to swipe or snoop somebody else's pa.s.sword, and then enter the computer in the guise of another person--who is commonly stuck with the blame and the bills.

Perhaps a medical metaphor was better--hackers should be defined as "sick," as COMPUTER ADDICTS unable to control their irresponsible, compulsive behavior.

But these weighty a.s.sessments meant little to the people who were actually being judged. From inside the underground world of hacking itself, all these perceptions seem quaint, wrongheaded, stupid, or meaningless.

The most important self-perception of underground hackers-- from the 1960s, right through to the present day--is that they are an ELITE. The day-to-day struggle in the underground is not over sociological definitions--who cares?--but for power, knowledge, and status among one's peers.

When you are a hacker, it is your own inner conviction of your elite status that enables you to break, or let us say "transcend," the rules. It is not that ALL rules go by the board. The rules habitually broken by hackers are UNIMPORTANT rules--the rules of dopey greedhead telco bureaucrats and pig-ignorant government pests.

Hackers have their OWN rules, which separate behavior which is cool and elite, from behavior which is rodentlike, stupid and losing. These "rules," however, are mostly unwritten and enforced by peer pressure and tribal feeling. Like all rules that depend on the unspoken conviction that everybody else is a good old boy, these rules are ripe for abuse. The mechanisms of hacker peer- pressure, "teletrials" and ostracism, are rarely used and rarely work. Back-stabbing slander, threats, and electronic hara.s.sment are also freely employed in down-and-dirty intrahacker feuds, but this rarely forces a rival out of the scene entirely. The only real solution for the problem of an utterly losing, treacherous and rodentlike hacker is to TURN HIM IN TO THE POLICE. Unlike the Mafia or Medellin Cartel, the hacker elite cannot simply execute the bigmouths, creeps and troublemakers among their ranks, so they turn one another in with astonis.h.i.+ng frequency.

There is no tradition of silence or OMERTA in the hacker underworld.

Hackers can be shy, even reclusive, but when they do talk, hackers tend to brag, boast and strut. Almost everything hackers do is INVISIBLE; if they don't brag, boast, and strut about it, then n.o.bODY WILL EVER KNOW.

If you don't have something to brag, boast, and strut about, then n.o.body in the underground will recognize you and favor you with vital cooperation and respect.

The way to win a solid reputation in the underground is by telling other hackers things that could only have been learned by exceptional cunning and stealth.

Forbidden knowledge, therefore, is the basic currency of the digital underground, like seash.e.l.ls among Trobriand Islanders. Hackers h.o.a.rd this knowledge, and dwell upon it obsessively, and refine it, and bargain with it, and talk and talk about it.

Many hackers even suffer from a strange obsession to TEACH-- to spread the ethos and the knowledge of the digital underground.

They'll do this even when it gains them no particular advantage and presents a grave personal risk.

And when that risk catches up with them, they will go right on teaching and preaching--to a new audience this time, their interrogators from law enforcement. Almost every hacker arrested tells everything he knows-- all about his friends, his mentors, his disciples--legends, threats, horror stories, dire rumors, gossip, hallucinations. This is, of course, convenient for law enforcement--except when law enforcement begins to believe hacker legendry.

Phone phreaks are unique among criminals in their willingness to call up law enforcement officials--in the office, at their homes-- and give them an extended piece of their mind. It is hard not to interpret this as BEGGING FOR ARREST, and in fact it is an act of incredible foolhardiness. Police are naturally nettled by these acts of chutzpah and will go well out of their way to bust these flaunting idiots. But it can also be interpreted as a product of a world-view so elitist, so closed and hermetic, that electronic police are simply not perceived as "police,"

but rather as ENEMY PHONE PHREAKS who should be scolded into behaving "decently."

Hackers at their most grandiloquent perceive themselves as the elite pioneers of a new electronic world.

Attempts to make them obey the democratically established laws of contemporary American society are seen as repression and persecution. After all, they argue, if Alexander Graham Bell had gone along with the rules of the Western Union telegraph company, there would have been no telephones. If Jobs and Wozniak had believed that IBM was the be-all and end-all, there would have been no personal computers. If Benjamin Franklin and Thomas Jefferson had tried to "work within the system"

there would have been no United States.

Not only do hackers privately believe this as an article of faith, but they have been known to write ardent manifestos about it.

Here are some revealing excerpts from an especially vivid hacker manifesto: "The Techno-Revolution" by "Dr. Crash," which appeared in electronic form in Phrack Volume 1, Issue 6, Phile 3.

"To fully explain the true motives behind hacking, we must first take a quick look into the past. In the 1960s, a group of MIT students built the first modern computer system.

This wild, rebellious group of young men were the first to bear the name 'hackers.' The systems that they developed were intended to be used to solve world problems and to benefit all of mankind.

"As we can see, this has not been the case. The computer system has been solely in the hands of big businesses and the government.

The wonderful device meant to enrich life has become a weapon which dehumanizes people. To the government and large businesses, people are no more than disk s.p.a.ce, and the government doesn't use computers to arrange aid for the poor, but to control nuclear death weapons. The average American can only have access to a small microcomputer which is worth only a fraction of what they pay for it. The businesses keep the true state-of-the-art equipment away from the people behind a steel wall of incredibly high prices and bureaucracy.

It is because of this state of affairs that hacking was born. (. . .) "Of course, the government doesn't want the monopoly of technology broken, so they have outlawed hacking and arrest anyone who is caught. (. . .) The phone company is another example of technology abused and kept from people with high prices. (. . .) "Hackers often find that their existing equipment, due to the monopoly tactics of computer companies, is inefficient for their purposes. Due to the exorbitantly high prices, it is impossible to legally purchase the necessary equipment.

This need has given still another segment of the fight: Credit Carding.

Carding is a way of obtaining the necessary goods without paying for them.

It is again due to the companies' stupidity that Carding is so easy, and shows that the world's businesses are in the hands of those with considerably less technical know-how than we, the hackers. (. . .) "Hacking must continue. We must train newcomers to the art of hacking.

(. . . .) And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. Don't worry, you're on the right side."

The defense of "carding" is rare. Most hackers regard credit-card theft as "poison" to the underground, a sleazy and immoral effort that, worse yet, is hard to get away with. Nevertheless, manifestos advocating credit-card theft, the deliberate cras.h.i.+ng of computer systems, and even acts of violent physical destruction such as vandalism and arson do exist in the underground. These boasts and threats are taken quite seriously by the police. And not every hacker is an abstract, Platonic computer-nerd. Some few are quite experienced at picking locks, robbing phone-trucks, and breaking and entering buildings.

Hackers vary in their degree of hatred for authority and the violence of their rhetoric. But, at a bottom line, they are scofflaws. They don't regard the current rules of electronic behavior as respectable efforts to preserve law and order and protect public safety. They regard these laws as immoral efforts by soulless corporations to protect their profit margins and to crush dissidents. "Stupid" people, including police, businessmen, politicians, and journalists, simply have no right to judge the actions of those possessed of genius, techno-revolutionary intentions, and technical expertise.

Hackers are generally teenagers and college kids not engaged in earning a living. They often come from fairly well-to-do middle-cla.s.s backgrounds, and are markedly anti-materialistic (except, that is, when it comes to computer equipment). Anyone motivated by greed for mere money (as opposed to the greed for power, knowledge and status) is swiftly written-off as a narrow- minded breadhead whose interests can only be corrupt and contemptible. Having grown up in the 1970s and 1980s, the young Bohemians of the digital underground regard straight society as awash in plutocratic corruption, where everyone from the President down is for sale and whoever has the gold makes the rules.

Interestingly, there's a funhouse-mirror image of this att.i.tude on the other side of the conflict. The police are also one of the most markedly anti-materialistic groups in American society, motivated not by mere money but by ideals of service, justice, esprit-de-corps, and, of course, their own brand of specialized knowledge and power. Remarkably, the propaganda war between cops and hackers has always involved angry allegations that the other side is trying to make a sleazy buck.

Hackers consistently sneer that anti-phreak prosecutors are angling for cushy jobs as telco lawyers and that computer-crime police are aiming to cash in later as well-paid computer-security consultants in the private sector.

For their part, police publicly conflate all hacking crimes with robbing payphones with crowbars.

Allegations of "monetary losses" from computer intrusion are notoriously inflated. The act of illicitly copying a doc.u.ment from a computer is morally equated with directly robbing a company of, say, half a million dollars.

The teenage computer intruder in possession of this "proprietary"

doc.u.ment has certainly not sold it for such a sum, would likely have little idea how to sell it at all, and quite probably doesn't even understand what he has. He has not made a cent in profit from his felony but is still morally equated with a thief who has robbed the church poorbox and lit out for Brazil.

Police want to believe that all hackers are thieves.

It is a tortuous and almost unbearable act for the American justice system to put people in jail because they want to learn things which are forbidden for them to know.

In an American context, almost any pretext for punishment is better than jailing people to protect certain restricted kinds of information. Nevertheless, POLICING INFORMATION is part and parcel of the struggle against hackers.

This dilemma is well exemplified by the remarkable activities of "Emmanuel Goldstein," editor and publisher of a print magazine known as 2600: The Hacker Quarterly.

Goldstein was an English major at Long Island's State University of New York in the '70s, when he became involved with the local college radio station. His growing interest in electronics caused him to drift into Yippie TAP circles and thus into the digital underground, where he became a self-described techno-rat. His magazine publishes techniques of computer intrusion and telephone "exploration" as well as gloating exposes of telco misdeeds and governmental failings.

Goldstein lives quietly and very privately in a large, crumbling Victorian mansion in Setauket, New York.

The seaside house is decorated with telco decals, chunks of driftwood, and the basic bric-a-brac of a hippie crash-pad.

He is unmarried, mildly unkempt, and survives mostly on TV dinners and turkey-stuffing eaten straight out of the bag. Goldstein is a man of considerable charm and fluency, with a brief, disarming smile and the kind of pitiless, stubborn, thoroughly recidivist integrity that America's electronic police find genuinely alarming.

Goldstein took his nom-de-plume, or "handle," from a character in Orwell's 1984, which may be taken, correctly, as a symptom of the gravity of his sociopolitical worldview. He is not himself a practicing computer intruder, though he vigorously abets these actions, especially when they are pursued against large corporations or governmental agencies. Nor is he a thief, for he loudly scorns mere theft of phone service, in favor of "exploring and manipulating the system." He is probably best described and understood as a DISSIDENT.

Weirdly, Goldstein is living in modern America under conditions very similar to those of former East European intellectual dissidents. In other words, he flagrantly espouses a value-system that is deeply and irrevocably opposed to the system of those in power and the police. The values in 2600 are generally expressed in terms that are ironic, sarcastic, paradoxical, or just downright confused. But there's no mistaking their radically anti-authoritarian tenor. 2600 holds that technical power and specialized knowledge, of any kind obtainable, belong by right in the hands of those individuals brave and bold enough to discover them--by whatever means necessary.

Devices, laws, or systems that forbid access, and the free spread of knowledge, are provocations that any free and self-respecting hacker should relentlessly attack.

The "privacy" of governments, corporations and other soulless technocratic organizations should never be protected at the expense of the liberty and free initiative of the individual techno-rat.

However, in our contemporary workaday world, both governments and corporations are very anxious indeed to police information which is secret, proprietary, restricted, confidential, copyrighted, patented, hazardous, illegal, unethical, embarra.s.sing, or otherwise sensitive. This makes Goldstein persona non grata, and his philosophy a threat.

Very little about the conditions of Goldstein's daily life would astonish, say, Vaclav Havel. (We may note in pa.s.sing that President Havel once had his word-processor confiscated by the Czechoslovak police.) Goldstein lives by SAMIZDAT, acting semi-openly as a data-center for the underground, while challenging the powers-that-be to abide by their own stated rules: freedom of speech and the First Amendment.

Goldstein thoroughly looks and acts the part of techno-rat, with shoulder-length ringlets and a piratical black fisherman's-cap set at a rakish angle. He often shows up like Banquo's ghost at meetings of computer professionals, where he listens quietly, half-smiling and taking thorough notes.

Computer professionals generally meet publicly, and find it very difficult to rid themselves of Goldstein and his ilk without extralegal and unconst.i.tutional actions.

Sympathizers, many of them quite respectable people with responsible jobs, admire Goldstein's att.i.tude and surrept.i.tiously pa.s.s him information. An unknown but presumably large proportion of Goldstein's 2,000-plus readers.h.i.+p are telco security personnel and police, who are forced to subscribe to 2600 to stay abreast of new developments in hacking. They thus find themselves PAYING THIS GUY'S RENT while grinding their teeth in anguish, a situation that would have delighted Abbie Hoffman (one of Goldstein's few idols).

Please click Like and leave more comments to support and keep us alive.

RECENTLY UPDATED MANGA

The Hacker Crackdown Part 11 summary

You're reading The Hacker Crackdown. This manga has been translated by Updating. Author(s): Bruce Sterling. Already has 661 views.

It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.

BestLightNovel.com is a most smartest website for reading manga online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to BestLightNovel.com