BestLightNovel.com

The Hacker Crackdown Part 15

The Hacker Crackdown - BestLightNovel.com

You’re reading novel The Hacker Crackdown Part 15 online at BestLightNovel.com. Please use the follow button to get notification about the latest chapter next time when you visit BestLightNovel.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy

It's quite possible that this entire list refers to as few as a thousand people. It is not a complete list of underground groups--there has never been such a list, and there never will be. Groups rise, flourish, decline, share members.h.i.+p, maintain a cloud of wannabes and casual hangers-on. People pa.s.s in and out, are ostracized, get bored, are busted by police, or are cornered by telco security and presented with huge bills. Many "underground groups" are software pirates, "warez d00dz," who might break copy protection and pirate programs, but likely wouldn't dare to intrude on a computer-system.

It is hard to estimate the true population of the digital underground. There is constant turnover. Most hackers start young, come and go, then drop out at age 22-- the age of college graduation. And a large majority of "hackers" access pirate boards, adopt a handle, swipe software and perhaps abuse a phone-code or two, while never actually joining the elite.

Some professional informants, who make it their business to retail knowledge of the underground to paymasters in private corporate security, have estimated the hacker population at as high as fifty thousand. This is likely highly inflated, unless one counts every single teenage software pirate and petty phone-booth thief. My best guess is about 5,000 people.

Of these, I would guess that as few as a hundred are truly "elite"

--active computer intruders, skilled enough to penetrate sophisticated systems and truly to worry corporate security and law enforcement.

Another interesting speculation is whether this group is growing or not. Young teenage hackers are often convinced that hackers exist in vast swarms and will soon dominate the cybernetic universe. Older and wiser veterans, perhaps as wizened as 24 or 25 years old, are convinced that the glory days are long gone, that the cops have the underground's number now, and that kids these days are dirt-stupid and just want to play Nintendo.

My own a.s.sessment is that computer intrusion, as a non-profit act of intellectual exploration and mastery, is in slow decline, at least in the United States; but that electronic fraud, especially telecommunication crime, is growing by leaps and bounds.

One might find a useful parallel to the digital underground in the drug underground. There was a time, now much-obscured by historical revisionism, when Bohemians freely shared joints at concerts, and hip, small-scale marijuana dealers might turn people on just for the sake of enjoying a long stoned conversation about the Doors and Allen Ginsberg. Now drugs are increasingly verboten, except in a high-stakes, highly-criminal world of highly addictive drugs.

Over years of disenchantment and police hara.s.sment, a vaguely ideological, free-wheeling drug underground has relinquished the business of drug-dealing to a far more savage criminal hard-core. This is not a pleasant prospect to contemplate, but the a.n.a.logy is fairly compelling.

What does an underground board look like? What distinguishes it from a standard board? It isn't necessarily the conversation-- hackers often talk about common board topics, such as hardware, software, s.e.x, science fiction, current events, politics, movies, personal gossip.

Underground boards can best be distinguished by their files, or "philes,"

pre-composed texts which teach the techniques and ethos of the underground.

These are prized reservoirs of forbidden knowledge. Some are anonymous, but most proudly bear the handle of the "hacker" who has created them, and his group affiliation, if he has one.

Here is a partial table-of-contents of philes from an underground board, somewhere in the heart of middle America, circa 1991. The descriptions are mostly self-explanatory.

BANKAMER.ZIP 5406 06-11-91 Hacking Bank America CHHACK.ZIP 4481 06-11-91 Chilton Hacking CITIBANK.ZIP 4118 06-11-91 Hacking Citibank CREDIMTC.ZIP 3241 06-11-91 Hacking Mtc Credit Company DIGEST.ZIP 5159 06-11-91 Hackers Digest HACK.ZIP 14031 06-11-91 How To Hack HACKBAS.ZIP 5073 06-11-91 Basics Of Hacking HACKDICT.ZIP 42774 06-11-91 Hackers Dictionary HACKER.ZIP 57938 06-11-91 Hacker Info HACKERME.ZIP 3148 06-11-91 Hackers Manual HACKHAND.ZIP 4814 06-11-91 Hackers Handbook HACKTHES.ZIP 48290 06-11-91 Hackers Thesis HACKVMS.ZIP 4696 06-11-91 Hacking Vms Systems MCDON.ZIP 3830 06-11-91 Hacking Macdonalds (Home Of The Archs) P500UNIX.ZIP 15525 06-11-91 Phortune 500 Guide To Unix RADHACK.ZIP 8411 06-11-91 Radio Hacking TAOTRASH.DOC 4096 12-25-89 Suggestions For Tras.h.i.+ng TECHHACK.ZIP 5063 06-11-91 Technical Hacking

The files above are do-it-yourself manuals about computer intrusion.

The above is only a small section of a much larger library of hacking and phreaking techniques and history. We now move into a different and perhaps surprising area.

+------------+ |Anarchy| +------------+

ANARC.ZIP 3641 06-11-91 Anarchy Files ANARCHST.ZIP 63703 06-11-91 Anarchist Book ANARCHY.ZIP 2076 06-11-91 Anarchy At Home ANARCHY3.ZIP 6982 06-11-91 Anarchy No 3 ANARCTOY.ZIP 2361 06-11-91 Anarchy Toys ANTIMODM.ZIP 2877 06-11-91 Anti-modem Weapons ATOM.ZIP 4494 06-11-91 How To Make An Atom Bomb BARBITUA.ZIP 3982 06-11-91 Barbiturate Formula BLCKPWDR.ZIP 2810 06-11-91 Black Powder Formulas BOMB.ZIP 3765 06-11-91 How To Make Bombs BOOM.ZIP 2036 06-11-91 Things That Go Boom CHLORINE.ZIP 1926 06-11-91 Chlorine Bomb COOKBOOK.ZIP 1500 06-11-91 Anarchy Cook Book DESTROY.ZIP 3947 06-11-91 Destroy Stuff DUSTBOMB.ZIP 2576 06-11-91 Dust Bomb ELECTERR.ZIP 3230 06-11-91 Electronic Terror EXPLOS1.ZIP 2598 06-11-91 Explosives 1 EXPLOSIV.ZIP 18051 06-11-91 More Explosives EZSTEAL.ZIP 4521 06-11-91 Ez-stealing FLAME.ZIP 2240 06-11-91 Flame Thrower FLASHLT.ZIP 2533 06-11-91 Flashlight Bomb FMBUG.ZIP 2906 06-11-91 How To Make An Fm Bug OMEEXPL.ZIP 2139 06-11-91 Home Explosives HOW2BRK.ZIP 3332 06-11-91 How To Break In LETTER.ZIP 2990 06-11-91 Letter Bomb LOCK.ZIP 2199 06-11-91 How To Pick Locks MRs.h.i.+N.ZIP 3991 06-11-91 Briefcase Locks NAPALM.ZIP 3563 06-11-91 Napalm At Home NITRO.ZIP 3158 06-11-91 Fun With Nitro PARAMIL.ZIP 2962 06-11-91 Paramilitary Info PICKING.ZIP 3398 06-11-91 Picking Locks PIPEBOMB.ZIP 2137 06-11-91 Pipe Bomb POTa.s.s.ZIP 3987 06-11-91 Formulas With Pota.s.sium PRANK.TXT 11074 08-03-90 More Pranks To Pull On Idiots!

REVENGE.ZIP 4447 06-11-91 Revenge Tactics ROCKET.ZIP 2590 06-11-91 Rockets For Fun SMUGGLE.ZIP 3385 06-11-91 How To Smuggle

HOLY COW! The d.a.m.ned thing is full of stuff about bombs!

What are we to make of this?

First, it should be acknowledged that spreading knowledge about demolitions to teenagers is a highly and deliberately antisocial act. It is not, however, illegal.

Second, it should be recognized that most of these philes were in fact WRITTEN by teenagers. Most adult American males who can remember their teenage years will recognize that the notion of building a flamethrower in your garage is an incredibly neat-o idea. ACTUALLY, building a flamethrower in your garage, however, is fraught with discouraging difficulty. Stuffing gunpowder into a b.o.o.by-trapped flashlight, so as to blow the arm off your high-school vice-princ.i.p.al, can be a thing of dark beauty to contemplate. Actually committing a.s.sault by explosives will earn you the sustained attention of the federal Bureau of Alcohol, Tobacco and Firearms.

Some people, however, will actually try these plans.

A determinedly murderous American teenager can probably buy or steal a handgun far more easily than he can brew fake "napalm" in the kitchen sink. Nevertheless, if temptation is spread before people, a certain number will succ.u.mb, and a small minority will actually attempt these stunts. A large minority of that small minority will either fail or, quite likely, maim themselves, since these "philes" have not been checked for accuracy, are not the product of professional experience, and are often highly fanciful. But the gloating menace of these philes is not to be entirely dismissed.

Hackers may not be "serious" about bombing; if they were, we would hear far more about exploding flashlights, homemade bazookas, and gym teachers poisoned by chlorine and pota.s.sium.

However, hackers are VERY serious about forbidden knowledge.

They are possessed not merely by curiosity, but by a positive l.u.s.t TO KNOW. The desire to know what others don't is scarcely new. But the INTENSITY of this desire, as manifested by these young technophilic denizens of the Information Age, may in fact BE new, and may represent some basic s.h.i.+ft in social values-- a harbinger of what the world may come to, as society lays more and more value on the possession, a.s.similation and retailing of INFORMATION as a basic commodity of daily life.

There have always been young men with obsessive interests in these topics. Never before, however, have they been able to network so extensively and easily, and to propagandize their interests with impunity to random pa.s.sers-by.

High-school teachers will recognize that there's always one in a crowd, but when the one in a crowd escapes control by jumping into the phone-lines, and becomes a hundred such kids all together on a board, then trouble is brewing visibly.

The urge of authority to DO SOMETHING, even something drastic, is hard to resist. And in 1990, authority did something.

In fact authority did a great deal.

The process by which boards create hackers goes something like this. A youngster becomes interested in computers-- usually, computer games. He hears from friends that "bulletin boards" exist where games can be obtained for free.

(Many computer games are "freeware," not copyrighted-- invented simply for the love of it and given away to the public; some of these games are quite good.) He bugs his parents for a modem, or quite often, uses his parents' modem.

The world of boards suddenly opens up. Computer games can be quite expensive, real budget-breakers for a kid, but pirated games, stripped of copy protection, are cheap or free.

They are also illegal, but it is very rare, almost unheard of, for a small-scale software pirate to be prosecuted.

Once "cracked" of its copy protection, the program, being digital data, becomes infinitely reproducible.

Even the instructions to the game, any manuals that accompany it, can be reproduced as text files, or photocopied from legitimate sets.

Other users on boards can give many useful hints in game-playing tactics.

And a youngster with an infinite supply of free computer games can certainly cut quite a swath among his modem-less friends.

And boards are pseudonymous. No one need know that you're fourteen years old--with a little practice at subterfuge, you can talk to adults about adult things, and be accepted and taken seriously! You can even pretend to be a girl, or an old man, or anybody you can imagine. If you find this kind of deception gratifying, there is ample opportunity to hone your ability on boards.

But local boards can grow stale. And almost every board maintains a list of phone-numbers to other boards, some in distant, tempting, exotic locales. Who knows what they're up to, in Oregon or Alaska or Florida or California? It's very easy to find out--just order the modem to call through its software--nothing to this, just typing on a keyboard, the same thing you would do for most any computer game.

The machine reacts swiftly and in a few seconds you are talking to a bunch of interesting people on another seaboard.

And yet the BILLS for this trivial action can be staggering!

Just by going tippety-tap with your fingers, you may have saddled your parents with four hundred bucks in long-distance charges, and gotten chewed out but good. That hardly seems fair.

How horrifying to have made friends in another state and to be deprived of their company--and their software-- just because telephone companies demand absurd amounts of money!

How painful, to be restricted to boards in one's own AREA CODE-- what the heck is an "area code" anyway, and what makes it so special?

A few grumbles, complaints, and innocent questions of this sort will often elicit a sympathetic reply from another board user-- someone with some stolen codes to hand. You dither a while, knowing this isn't quite right, then you make up your mind to try them anyhow--AND THEY WORK! Suddenly you're doing something even your parents can't do. Six months ago you were just some kid--now, you're the Crimson Flash of Area Code 512! You're bad--you're nationwide!

Maybe you'll stop at a few abused codes. Maybe you'll decide that boards aren't all that interesting after all, that it's wrong, not worth the risk --but maybe you won't. The next step is to pick up your own repeat-dialling program-- to learn to generate your own stolen codes.

(This was dead easy five years ago, much harder to get away with nowadays, but not yet impossible.) And these dialling programs are not complex or intimidating-- some are as small as twenty lines of software.

Now, you too can share codes. You can trade codes to learn other techniques. If you're smart enough to catch on, and obsessive enough to want to bother, and ruthless enough to start seriously bending rules, then you'll get better, fast.

You start to develop a rep. You move up to a heavier cla.s.s of board--a board with a bad att.i.tude, the kind of board that naive dopes like your cla.s.smates and your former self have never even heard of! You pick up the jargon of phreaking and hacking from the board. You read a few of those anarchy philes-- and man, you never realized you could be a real OUTLAW without ever leaving your bedroom.

You still play other computer games, but now you have a new and bigger game. This one will bring you a different kind of status than destroying even eight zillion lousy s.p.a.ce invaders.

Hacking is perceived by hackers as a "game." This is not an entirely unreasonable or sociopathic perception.

You can win or lose at hacking, succeed or fail, but it never feels "real." It's not simply that imaginative youngsters sometimes have a hard time telling "make-believe" from "real life." Cybers.p.a.ce is NOT REAL! "Real" things are physical objects like trees and shoes and cars. Hacking takes place on a screen. Words aren't physical, numbers (even telephone numbers and credit card numbers) aren't physical. Sticks and stones may break my bones, but data will never hurt me. Computers SIMULATE reality, like computer games that simulate tank battles or dogfights or s.p.a.ces.h.i.+ps. Simulations are just make-believe, and the stuff in computers is NOT REAL.

Consider this: if "hacking" is supposed to be so serious and real-life and dangerous, then how come NINE-YEAR-OLD KIDS have computers and modems? You wouldn't give a nine year old his own car, or his own rifle, or his own chainsaw--those things are "real."

People underground are perfectly aware that the "game"

is frowned upon by the powers that be. Word gets around about busts in the underground. Publicizing busts is one of the primary functions of pirate boards, but they also promulgate an att.i.tude about them, and their own idiosyncratic ideas of justice. The users of underground boards won't complain if some guy is busted for cras.h.i.+ng systems, spreading viruses, or stealing money by wire-fraud. They may shake their heads with a sneaky grin, but they won't openly defend these practices.

But when a kid is charged with some theoretical amount of theft: $233,846.14, for instance, because he sneaked into a computer and copied something, and kept it in his house on a floppy disk-- this is regarded as a sign of near-insanity from prosecutors, a sign that they've drastically mistaken the immaterial game of computing for their real and boring everyday world of fatcat corporate money.

It's as if big companies and their suck-up lawyers think that computing belongs to them, and they can retail it with price stickers, as if it were boxes of laundry soap! But pricing "information" is like trying to price air or price dreams. Well, anybody on a pirate board knows that computing can be, and ought to be, FREE. Pirate boards are little independent worlds in cybers.p.a.ce, and they don't belong to anybody but the underground. Underground boards aren't "brought to you by Procter & Gamble."

To log on to an underground board can mean to experience liberation, to enter a world where, for once, money isn't everything and adults don't have all the answers.

Please click Like and leave more comments to support and keep us alive.

RECENTLY UPDATED MANGA

The Hacker Crackdown Part 15 summary

You're reading The Hacker Crackdown. This manga has been translated by Updating. Author(s): Bruce Sterling. Already has 645 views.

It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.

BestLightNovel.com is a most smartest website for reading manga online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to BestLightNovel.com