Copy Link
Add to Bookmark
Report

Center of Intelligent Anarchists 03

  

/\###############/\/\/###################/\/\/\/\/\/\/\/####/\/\/\/\/\/\/\/\/
/###############/\/\/\/#################/\/\/\/\/\/\/\/######/\/\/\/\/\/\/\/\
###############/\/\/\/\/###############/\/\/\/\/\/\/\/########/\/\/\/\/\/\/\/
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/\#####/\#####/\/\/\/\/\/\/
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/#####/\/\#####/\/\/\/\/\/\
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\#####/\/\/\#####/\/\/\/\/\/
#####enter of/\/\/\/\/\/\/\/\#####ntelligent/\/\/#####/\/\/\/\#####narchists/
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\/\/\/\/
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\/\/\/\/
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\/\/\/\/
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\/\/\/\/
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\/\/\/\/
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\/\/\/\/
###############/\/\/\/\/###############/\/\/\/\/#####/\/\/\/\/\#####/\/\/\/\/
/###############/\/\/\/#################/\/\/\/\#####/\/\/\/\/\#####/\/\/\/\/
/\###############/\/\/###################/\/\/\/#####/\/\/\/\/\#####/\/\/\/\/
Center of Intelligent Anarchists

Issue #3 Release Date: 05/02/94
--------------------------------------------------
/## Editor: Totally Destroyed Prodigy:GSTD79B ####/
/########################## (Not Permanent) #####/
/ Center of Intelligent Anarchists ##############/
/# c/o Totally Destroyed ###########################/
/## 2400 Derby Drive ############################/
/### Fallston, MD 21047 #######################/
-------------------------------------------------

<><><><><><><><><>
Table of Contents>>>>>>>>>>
<><><><><><><><><>
Introduction by Totally Destroyed
Subscription Information by Totally Destroyed
Writing for CIA by Totally Destroyed
Tips for the New Hacker &&& by Totally Destroyed
Credit Card Fraud Busts by Totally Destroyed
Mortar by Totally Destroyed
Classified Ads by Totally Destroyed
Where to Get Information by Totally Destroyed
Hacking and Hackers by Mark Hittinger
Tribute to Kurt Kobain by Totally Destroyed

&&&-password list found in the Internet Worm of 1988 by
Robert T. Morris Jr.

><><><><><><>
Introduction>>>>>>
><><><><><><>
Well, this is the third issue. I am doing well with putting one out
each month (First Two, No Problem). I don't know how many of you have
actually downloaded a single copy. If you have, how about dropping me a
message (email) on one of the local boards to me that I am on. Such as:
Terminal Addiction: 410-527-9549*Anarchy
Outside the Wall: 410-665-1855*Anarchy (CD-ROM)
The Underground Ice Kingdom: 410-823-4125*Anarchy
The Dog House BBS: 410-692-5792
The Whore House: 410-296-3205

Most of those offer anarchy files. Outside the Wall has no ratios, neither
does Terminal Addiction. T.U.I.K. has ratios, but they have great files.
Give them a call any time. The ones with a "*" I log on daily, the others
I get on maybe once every two weeks. My Handle is "Totally Destroyed" send
me a message. On TUIK I don't have a handle, send it to "Totally Destroyed".
Just to let me know you actually read the last issues. Then
I'll know if I'm wasting my time or not. Well, on with Issue #3.

><><><><><><><><><><><><>
Subscription Information>>>>>>>>>
><><><><><><><><><><><><>
To receive the Center of Intelligent Anarchist's publication monthly
by mail then send me a letter including Name, Address, and Where you get
your copies of CIA (BBS name, Person, etc.). Prices are as follows:
Hard Copy $15.00 12 issues
Soft Copy Disks Supplied (specify size) $25.00 12 issues
Soft Copy, you supply disks $20.00 12 issues

Sample copies are available at $2.00 for hard copy and $3.50 for soft copy
with the disk supplied (specify size). Send your name, address, phone number (Optional),
and check, money order, or cash (Not Responisble for Lost Mail).

Mail orders to:
Center of Intelligent Anarchist's
c/o Totally Destroyed
2400 Derby Drive
Fallston, MD 21047

<><><><><><><><>
Writing for CIA>>>>>>>>>
<><><><><><><><>
If you wish to write for the Center of Intelligent Anarchist's publication
submit article to:
Center of Intelligent Anarchist's
c/o Totally Destroyed
2400 Derby Drive
Fallston, MD 21047
Include your address, name, where I can get in touch with you (Mailing
address U.S. Mail is fine), and the article. If you wish to become a
regular writer tell me that as well. If you want to remain anonymous in the
article that's ok, just let me know. I would like your address so I can send
you information on writing regularly and so I can reach you if I have any
questions on your article or want you to write again.

<><><><><><><><><><><><>
Tips for the New Hacker>>>>>>>>>>
<><><><><><><><><><><><>
This month we will be dealing with guessing passwords. Let's say
that you have someone's valid user name and would like to guess their pass-
word. Well, first try their first name, last name, any combinations. First
or last names with a numeric or special character in it somewhere. Nicknames,
and combinations. Then you could try their street name if you know it, and
the city they live in, if you know it. Then try all of those backwards. Then
you proceed to this list of more popular passwords. This is the list used in
the Internet Worm Virus a few years ago. A few have been added.

aaa cornelius guntis noxious simon
academia couscous hacker nutrition simple
aerobics creation hamlet nyquist singer
airplane creosote handily oceanography smile
albany cretin happening ocelot smiles
alatross daemon harmony olivetti smooch
albert dancer harold olivia smother
alex daniel harvey oracle snatch
alexander danny hebrides orca snoopy
algebra dave heinlein orwell soap
aliases december hello osiris socrates
alphabet defoe help outlaw sossina
ama deluge herbert oxford single
amporphous desperate hiawatha pacific sparrows
analog develop hibernia painless spit
anchor dieter honey pakistan spring
andromache digital horse pam springer
animals discovery horus papers squires
answer disney hutchins password strangle
anthropogenic dog imbroglio patricia stratford
anvils drought imperial penguin stuttgart
anything duncan include peoria subway
aria eager ingres percolate success
ariadne easier inna persimmon summer
arrow edges innocuous persona super
arthur edinburgh irishman pete superstage
athena edwin isis peter support
atmosphere edwina japan philip supported
aztecs egghead jessica phoenix surfer
azure eiderdown jester pierre suzanne
bacchus eileen jixian pizza swearer
balley einstein johnny plover symmetry
banana elephant joseph plymouth tangerine
bandit ellen judith pondering target
banks emerald juggle pork tarragon
barber engine julia poster taylor
baritone engineer kathleen praise telephone
bass enterprise kermit precious temptation
bassoon enzyme kernel prelude thailand
batman ersatz kirkland prince tiger
beater establish knight princeton toggle
beauty estate lagle protect tomato
beethoven euclid lambda protozoa topography
beloved evelyn lamination pumpkin tortoise
benz extension larkin puneet toyota
beowulf fairway larry puppet trails
berkeley felicia lazarous rabbit trivial
berliner fender lebesgue rachmaninoff trombone
beryl fermat lee rainbow tubas
beverly fidelity leland raindrop tuttle
bicameral finite leroy raleigh umesh
bob fishers leris random unhappy
brenda flakes light rascal unicorn
brian float lisa really unknown
bridget flower louis rebecca urchin
broadway flowers lynne remote utility
bumbling foolproof macintosh rick vasant
burgess football mack ripple vertigo
campanile foresight maggot rochester village
cardinal forsythe malcolm rolex virginia
carmen fourier mark romano warren
carolina fred markus ronald water
caroline friend marty rosebud weenie
cascades frighten marvin rosemary whatnot
castle fun master roses whiting
cat fungible maurice ruben whitney
cayuga gabriel mellon rules will
celtics gardner merlin ruth wiliam
cerulean garfield mets sal williamsburg
change gauss michael saxon willie
charles george michelle scamper winston
charming gertrude mike scheme wisconsin
charon ginger minimum scott wizard
chester glacier minsky scotty wombat
cigar gnu moguls secret woodwind
classic golfer moose sensor wormwood
clusters gorgeous morley serenity yaco
coffee gorges mozart sharks yang
coke gosling nancy sharon yellowstone
commrades graham nepenthe sheldon zap
computer gryphon ness shiva zimmerman
condo guest network shivers
cookie guitar newton shuttle
cooper gumption next signature

These can all be tried with a special character (!,@,#,$,%,^,&,*,(,),etc.)
at the end of the word, the beginning of the word, or any place in the middle.
Try the following substitutions:
S----------$ ex. PA$$WORD
I----------! ex. S!GNATURE
C----------( ex. (ATTLE
A----------@ ex. @SSOCIATES

Also, try the User Name "Anonymous" or "Guest" or "Friend" or "New User".
Then try the following passwords with each:
Anonymous
Guest
Friend
New User
New
Test
Password

When all that fails, start at page one of the Dictionary and work your way
through. If all that fails start over and use each word backwards. If all
that fails find a new account (if you were dumb enough to try that one for
that long.) If you continue hacking that account for very long, you WILL get
busted.

<><><><><><><><><>
Credit Card Busts>>>>>>>>>>>
<><><><><><><><><>
Sometime last year two asian men traveled throughout Miami, Florida
and spent over $260,000. They used well over 20 credit cards they had
manufactured. These two men were part of a large credit card fraud group
that in the past year has carded over $260,000,000. These men as well as
the ringleader of the group were arrested by the secret service sometime last
month. The ringleader will be serving 4 years in a federal prison. The
funny thing is the lack of observation on the clerks part. The video tapes
were reviewed, and the clerks had handed the card back before the man using
it even signed the transaction slip. The clerk had no way to check the
signatures. The clerk also didn't look at the name of he/she would have
noticed that the names on the cards were not asian. This is inexcusable
says fomer Visa Employee. The cards should have been checked better.


><><><>
Mortar>>>>>>
><><><>
This handy weapon can be made to shoot scrap metal and/or glass.

Materials Needed for Construction:
Iron Pipe 3 feet long and 2 inches to 4 inches in diameter. If you
will be shooting tennis balls or oranges make sure that your
ammo will fit in the pipe snugly
Threaded cap to fit pipe
Battery and Wire

Tools Needed for Contruction:
None

First screw the cap on the end of the pipe. The cannon is now
completed. Burry the pipe in the ground. Make sure the pipe is angled in the
desired direction. The end should be almost flush with the ground. Place
about 1/2 pound of gunpowder or similar propellant on a cloth. Wrap this up
into a package and insert an ignitor (ESTES Model Rocket) into the powder with
the leads connected to about ten feet of wire. Put this in the pipe with the
insulated wires hanging out the open end. Tamp another piece of cloth in the
pipe for wadding. Then pour in the screws, nuts, nails, broken glass, or
small stones as your projectiles. BB's or shotgun shot work well also.
You then get behind the tube and connect the wires to a 9-volt battery. If
there is a clean connection between the igniter and the wires, then it will
go off.


><><><><><><><>
Classified Ads>>>>>>
><><><><><><><>
I know this really isn't anarchy related, but if you have anything
you wish to sell, then send me an ad and I will post it in the next issue of
CIA. Don't forget to include your phone number or address in the ad. Send
ads to:
CIA Classified Ads
c/o Totally Destroyed
2400 Derby Drive
Fallston, MD 21047

******************************************************
* I have the following AD&D books for sale: *
* Players Handbook $15.00 *
* Tome of Magic $12.00 *
* Monsterous Compendium Vol. 1 *
* $18.00 *
* Contact Totally Destroyed at 2400 Derby Drive *
* Fallston, MD 21047. If you wish to make an*
* offer of less than the above than *
* write me and I'll get back to you. *
******************************************************

Skateboard wanted. Preferably in fairly good condition. Completes
only. Contact Doug Haller........410-893-0785


That's all the ads this month.



><><><><><><><><><><><><>
Where to Get Information>>>>>>
><><><><><><><><><><><><>
Here's the address of some Magazine's that I thought you might be
interested.
2600 Subscription Department
P.O. Box 752
Middle Island, NY 11953-0752
-the ultimate hacker/phreak/computer enthusiast magazine
(Subscription: $22.00 per four issues.)

Mondo 2000
P.O. Box 10171
Berkeley, CA 94709-5171
Phone: 1-510-845-9018
Fax: 1-510-649-9630
-hacking

CIA Magazine Archives
c/o Totally Destroyed
2400 Derby Drive
Fallston, MD 21047
-collection of "Anarchy Files" commonly found on BBS
also has some of the phrack files and Computer Underground
Digest, write for catalog ($1.00)

You can write any of the above for pricing and other assorted
information. CIA's catalog is $1.00 due to shipping costs.


<><><><><><><><><><><>
Beige Boxes Revisited>>>>>>
<><><><><><><><><><><>
Yes, I know that their are many, many plans for beige boxes floating
and these plans are nothing new, but I will cover more ways to use the beige
box than the other files I have seen floating around.

Materials:
Phone cord (To plug into the wall)
or
Cheap one piece phone, touch tone
Wire stripper
2 Alligator Clips
Few hundred feet of thin wire
Sodder
Soddering Iron

First you need to decide if you wish to hook up a phone in your house
to the box you are doing this to. If not you won't need the thin wire,
sodder, or soddering iron. Now take the phone cord, or the cord coming out
of the cheap one piece phone. And cut off the plug that goes in the wall.
Then strip off the insulation. You should see four wires inside of this.
One is Green, one is Red, one is Black, and one is Yellow. If they are not
color coded, then you want the two middle ones. Cut off the yellow and black
ones. They are not needed. Strip off the red and green ones though. Then
attach the alligator clips to these wires (might require sodder). If you
used a cheap phone, you're pretty much done, if not the plug the other end of
the wire into a phone and you're done. Now go find a junction box. Bring
your beige box and a 7/16 inch hex driver. Open up the box with the driver.
Then look inside (make sure this is not the box on your porperty). Find the
green wire and the red wire. Hook them up appropriately. When I did it,
the box had two of each and I hooked up my red to red and my green to the
other red. I don't know why, but if green to green and red to red don't work,
fool around with it. Sooner or later you'll hit a combination that works.
Don'w mess with the yellow and black though, they aren't used. When you
finally get a dial tone (on the phone), dial your own phone number. If it
is busy then you're tapped in on your on line, if not then you have someone
elses line. I wouldn't do this when they might get on the phone, because
what you're on is just like another extension in their house. You could
bring your laptop and call long distance bbs. Anyway, this is a great way
to get someones parents wondering about them. Find a house where it is the
parents and only male children (atleast 11 yrs. + old). Run up huge charges
on gay porno lines. This is all billed to their line. If you want this to be
more permanent. Run the long wire from the red and from the green on your
phone wire (beige box) and then run it all the way to the box from your house.
hook up the alligator clips and close the box. Hide the wire. Now you have
an extension in your house, yet it's their number. Don't leave it their for
too long, someone might notice it. Well, that's it.

<><><><><><><><><><>
Hacking and Hackers>>>>>>.
<><><><><><><><><><>

Hacking and Hackers: The Rise, Stagnation, and Renaissance.

Copyright(C) 1991 By Mark Hittinger
(an288@freenet.cleveland.edu, #60 on Blitzkrieg)

This document may be freely reproduced so long as credit to
the author is maintained.

It doesn't take a rocket scientist to figure out that the publicity
afforded to hacking has risen to peak levels within the last year. As
one would expect, the political attention being paid to the subject of
hackers has also risen to peak levels. We are hearing more about
hackers each day. The newspapers have articles about alleged computer
crime and phone fraud almost weekly. The legal system is issuing
indictments, the secret service is running around with wildcard search
warrants, and captured naive hackers are turning on each other. Some
well known computer people have formed a lobby called the "Electronic
Frontier Foundation". Fox TV has news people on the scene during a
bust of an alleged "hacker" who was invading their own doofus system!
Non-computer "lay" people have been asking me a lot of questions.

So who am I? I'm just another computer bum. I got into computers in
the early seventies during high school. I've witnessed computing's
rise as something social outcasts did to something everybody wanted to
be a part of. Babes looked at us with disgust as we grabbed our data
on 110 baud teletypes and paper tape. Rolls of paper tape and access
to timeshared basic was so great that we didn't even think that it
could get better. Well guess what? Computers and our social position
kept getting better. It got so good that pretty soon everybody wanted
to ask us questions.

These days we are like doctors at a cocktail party, we are always
getting hit on for free computer consulting! Even from the babes!
You've come a long way baby! Later I got into the professional side,
that is, systems programming, systems management, and software
development. I've worked with GE, Xerox, IBM, Digital, CDC, HP,
Prime, anything I could get my hands on. I dearly loved the DEC-10,
learned to live with VAX/VMS, and now grit my teeth when I work with
Unix/MS-DOS. My hobby became my career, and they paid me money for
it. My chosen hacking name is "bugs bunny" and you can find me on some
bulletin boards as user "bugs". Bugs was always creating virtual
rabbit holes out of thin air and dodging in and out of them. True
hackers love to find and fix software "bugs". Yea!! I'm 34 now and a
dad.

Being involved in computers for a long time gives me a better
perspective than most. Over the years there would sometimes be a major
media coverage of some computer crime event. As a local computer
"heavy", there were always questions coming my way about what these
things were all about. Lately, the questions are more frequent and
more sophisticated. All these big highly publicized busts are opening
a lot of issues. I didn't have answers to some of these questions so
I sat down and did some thinking. Writing this article is an
outgrowth of that. I am not a writer so grant me some journalistic
slack.

Back in the early seventies hacking was quite free. Most of the
important stuff was running on batch mainframes that had no connection
to the outside world. The systems that we played with were not really
considered critical by anyone. We were allowed to play to our hearts
content, and nobody really worried about it at all. This period is
what I like to think of as the "rise of hacking". You can read about
some of it in the first section of Levy's book, "HACKERS". I love
that section and read it when current events depress me. In those
days the definition of hacker was clear and clean. It was fun, it was
hi-tech, it was a blast, and it was not a threat. There were no big
busts, very few people understood computing, and the public had no
interest in it.

We hacked for the sheer love of it. How can I describe the depth of
interest that we had? We were not concerned with our image or our
"identity". We wrote games, wrote neat hacks, and learned the
strengths or weaknesses of each system. We were able to obtain access
to a broad range of systems. Consider teenage boys comparing and
contrasting the systems designed by older engineers! We eventually
reached a point where we decided how a system should be set up. At
this point we began to make an annoyance of ourselves. In all
instances the various administrations considered us minor annoyances.
They had much more pressing problems!

New users began to show up in the labs. They reluctantly wanted to
get something done that absolutely had to be done on the computer. In
many cases they had no idea how to start, and were left to their own
devices. Centralized data processing management (MIS) didn't want to
deal with them. Often, they saw us playing around, joking, laughing,
carefree, and not at all intimidated by the computer. They, on the
other hand, were quite intimidated. We helped these people get
started, showed them were the documentation was, and explained
various error conditions to them. We quickly developed reputations as
knowing how to get something to work.

One of the people I helped made a remark to me that has stuck with me
for a long time. He said, "I am trained as a civil engineer, so I
don't have a feel for this. But you, you are pure bred. You've
gotten into this fresh and taught yourself from the ground up. You
haven't been trained into any set doctrine." Phar out man! This is
an important point. There were no rules, guidelines, or doctrines.
We made our own up as our experiences dictated.

As time wore on, the new user pool began to grow more rapidly. The
computers began to creak and groan under the work loads that were
being placed upon them. During the day time, we came to the computer
area to find it packed. We could no longer access the computers
during the day. After all, we were just playing! That was OK with
us. Soon we were there at night and on weekends. We obtained the
off-hour non-prime time access, but this put us further away from the
mainstream. These new guys liked the timeshared computers much more
than their mainframe batch machines. They started to move their darn
*important* crud from the mainframe machines to "our" timesharing
computers. Pretty soon the administrations started to think about
what it meant to have payroll or grades on the same computers that had
"star-trek version 8", "adventure", or "DECWAR version 2.2". They
were concerned about security on the timesharing systems, but due to
their budget constraints, most of the centralized MIS shops still had
to give priority to their batch mainframes. We continued to play, but
we cursed at the slow systems when the important stuff was running. I
got off "tuning" systems to make them run faster or more efficiently.
Interactive response time became the holy grail.

The "rise of hacking" was beginning to run out of steam. The
timesharing systems had been expanded as much as technology and
budgets would allow. We had learned the various systems internals
inside and out. We now knew much more about the systems than the
"official" maintainers did, and these maintainers perceived us as a
threat to their positions. The computers were still overloaded. The
nasty politics of access and resources began to rear their head. A
convenient scapegoat was to eliminate access to games. Eliminate the
people that were just playing. Examine all computing activity and bill
for it. This didn't solve any of the problems (we all knew payroll
and grades wouldn't fit in!) but it did raise the issue of the hackers
to the surface. All of a sudden we became defined as a problem! We
were soon getting shut out of various systems. New kids began to show
up and pretend to be hackers. They would do anything to show off, and
created large problems for "us".

At this point the "stagnation" period was beginning. These were hard
days for us. Many of my friends quit what they were doing. Many of
us got real jobs on the computers we played with as a dodge.
Centralized MIS departments began to be placed between the rock and
hard place of limited budgets and unlimited customers. The new kids,
the overloaded systems, the security concerns for the important
applications, and the political situation all resulted in the
stagnation of hacking.

"Hacker" took on a bad connotation. I saw all kind of debates over
what "hacker" meant. Some claimed it was a compliment, and should
only be awarded to those bit twiddlers that were truly awesome. Many
claimed that hackers were the scum of the earth and should be totally
decimated! What could you do but stay out of the way and let things
take their course? I realize now that it was in the MIS departments'
*VESTED INTEREST* to define the term "hacker". Centralized MIS did
not have the courage to fight for larger budgets. Upper level
administrators who just approved the budget would freak out when they
saw kids playing games on the computers in the library. MIS had to
define this as bad, had to say they would put a stop to it. MIS had
to look like they were managing the computer resources responsibly.
Any unusual or politically unacceptable computer event that couldn't
be covered up was caused by "hackers". It was a dodge for MIS! I am
not saying that some questionable stuff didn't go down, I am just
saying that it was logical to call anything "bad" by some sort of
easily accepted label - "hackers".

Of course, when the unusual computing event took place your budding
journalists were johnny on the spot. You don't climb that journalist
ladder by writing about boring stories. Wild computer stories about
hacking captured the public interest. I suppose the public liked to
hear that somebody could "beat" the system somehow. Journalists
picked up on this and wrote stories that even I found hard to believe.
The new kids, even when not asked, would blab all day long about the
great things that they were doing. And don't you know, they would blab
all day long about great hacks they heard that you pulled! Stories
get wilder with each re-telling. I realize now that it was in the
journalists' *VESTED INTEREST* to define the term "hacker". The public
loves robin hood, the journalists went out and found lots of
pseudo-robin hoods.

More and more stories began to hit the public. We heard stories of
military computers getting penetrated. We heard stories of big
financial rip-offs. We heard cute stories about guys who paid
themselves the round-off of millions of computer generated checks. We
heard stories of kids moving space satellites! We heard stories of old
ladies getting their phone bills in a heavy parcel box! As an old
timer, I found a lot of these stories far fetched. It was all
national inquirer type stuff to me. The public loved it, the
bureaucrats used it, and the politicians began to see an opportunity!

The end of the "stagnation" period coincides the arrival of the
politicians. Was it in the *VESTED INTEREST* of the politicians to
define the term "hacker"? You bet! Here was a safe and easy issue!
Who would stand up and say they were FOR hackers? What is more
politically esthetic than to be able to define a bad guy and then say
you are opposed to it? More resources began to flow into law
enforcement activities. When actual busts were made, the legal system
had problems coming up with charges. The legal system has never really
felt comfortable with the punishment side of hacking, however, they
LOVE the chase. We didn't have guns, we were not very dangerous, but
it is *neat* to tap lines and grab headlines!

What a dangerous time this was. It was like a feedback loop, getting
worse every week. When centralized MIS was unable to cover up a
hacking event, they exaggerated it instead. Shoddy design or poor
software workmanship was never an issue. Normally "skeptical"
journalists did not ask for proof, and thrilled at the claims of
multi-million dollar damages. Agents loved to be seen on TV (vote for
me when I run!) wheeling out junior's Christmas present from last
year, to be used as "evidence". The politicians were able to pass new
laws without constitutional considerations. New kids, when caught,
would rabidly turn on each other in their desperation to escape.
Worried older hackers learned to shut up and not give their side for
fear of the feeding frenzy. Hackers were socked with an identity
crisis and an image problem. Hackers debated the meaning of hacker
versus the meaning of cracker. We all considered the fundamental
question, "What is a true hacker?". Cool administrators tried to walk
the fine line of satisfying upper level security concerns without
squelching creativity and curiosity.

So what is this "renaissance" business? Am I expecting to see major
hacker attacks on important systems? No way, and by the way, if you
thought that, you would be using a definition created by someone with
a vested interest in it. When did we start to realize that hacker was
defined by somebody else and not us? I don't know, but it has only
been lately. Was it when people started to ask us about these
multi-million dollar damage claims? I really think this is an
important point in time. We saw BellSouth claim an electronically
published duplicate of an electronic document was worth nearly
$100,000 dollars!

We later saw reports that you could have called a 1-800 number and
purchased the same document for under twenty bucks. Regular
non-computer people began to express suspicion about the corporate
claims. They expressed suspicion about the government's position. And
generally, began to question the information the media gave them.
Just last month an article appear in the Wall Street Journal about
some hackers breaking in to electronic voice mail boxes (fancy
answering machines). They quoted some secret service agent as saying
the damages could run to the tens of millions of dollars. Somebody
asked me how in the world could screwing around with peoples answering
machines cause over 10 million dollars in damages? I responded, "I
don't know dude! Do you believe what you read?"

And when did the secret service get into this business? People say
to me, "I thought the secret service was supposed to protect the
president. How come the secret service is busting kids when the FBI
should be doing the busting?" What can I do but shrug? Maybe all the
Abu-Nidals are gone and the president is safe. Maybe the FBI is all
tied up with some new AB-SCAM or the S&L thing. Maybe the FBI is
damn tired of hackers and hacking!

In any event, the secret service showed it's heavy hand with the big
series of busts that was widely publicized recently. They even came
up with *NEAT* code names for it. "Operation SUNDEVIL", WOW! I
shoulda joined the secret service!!! Were they serious or was this
their own version of dungeons and dragons? In a very significant way,
they blew it. A lot of those old nasty constitutional issues surfaced.

They really should define clearly what they are looking for when they
get a search warrant. They shouldn't just show up, clean the place
out, haul it back to some warehouse, and let it sit for months while
they figure out if they got anything. This event freaked a lot of
lay people out. The creation of the Electronic Frontier Foundation is
a direct result of the blatantly illegal search and seizure by the
secret service. People are worried about what appears to be a police
state mentality, and generally feel that the state has gone to far. I
think the average American has a gut level feel for how far the state
should go, and the SS clearly went past that point. To be fair, there
aren't any good guidelines to go by in a technical electronic world,
so the secret service dudes had to decide what to do on their own. It
just turned out to be a significant mistake.

I saw Clifford Stoll, the author of the popular book "Cuckoos Egg"
testify on national C-SPAN TV before congress. His book is a very
good read, and entertaining as well. A lot of lay people have read
the book, and perceive the chaos within the legal system. Stoll's
book reveals that many systems are not properly designed or
maintained. He reveals that many well known "holes" in computer
security go unfixed due to the negligence of the owners. This book
generated two pervasive questions. One, why were there so many
different law enforcement agencies that could claim jurisdiction? Lay
people found it amazing that there were so many and that they could
not coordinate their efforts. Two, why were organizations that
publicly claimed to be worried about hackers not updating their
computer security to fix stale old well known problems? If indeed a
hacker were able to cause damage by exploiting such a well known
unfixed "hole", could the owner of the computer be somehow held
responsible for part of the damage? Should they?

We all watched in amazement as the media reported the progress of
Robert Morris's "internet worm". Does that sound neat or what?
Imagine all these lay people hearing about this and trying to judge if
it is a problem. The media did not do a very good job of covering
this, and the computing profession stayed away from it publicly. A
couple of guys wrote academic style papers on the worm, which says
something about how important it really was. This is the first time
that I can remember anyone examining a hacking event in such fine
detail. We started to hear about military interest in "worms" and
"viruses" that could be stuck into enemy computers. WOW! The media
accepted the damage estimates that were obviously inflated. Morris's
sentence got a lot of publicity, but his fine was very low compared to
the damage estimates. People began to see the official damage
estimates as not be%9g very credible.

We are in the first stages of the hacking renaissance. This period
will allow the hackers to assess themselves and to re-define the term
"hacker". We know what it means, and it fits in with the cycle of
apprentice, journeyman, and master. Its also got a little artist,
intuition, and humor mixed in. Hackers have the chance to repudiate
the MISs', the journalists', and the politicians' definition! Average
people are questioning the government's role in this and fundamental
rights. Just exactly how far should the government go to protect
companies and their data? Exactly what are the responsibilities of a
company with sensitive, valuable data on their computer systems?
There is a distinct feeling that private sector companies should be
doing more to protect themselves. Hackers can give an important
viewpoint on these issues, and all of a sudden there are people
willing to listen.

What are the implications of the renaissance? There is a new public
awareness of the weakness in past and existing systems. People are
concerned about the privacy of their electronic mail or records on the
popular services. People are worried a little about hackers reading
their mail, but more profoundly worried about the services or the
government reading their stuff. I expect to see a very distinct public
interest in encrypted e-mail and electronic privacy. One of my
personal projects is an easy to use e-mail encrypter that is
compatible with all the major e-mail networks. I hope to have it
ready when the wave hits!

Personal computers are so darn powerful now. The centralized MIS
department is essentially dead. Companies are moving away from the
big data center and just letting the various departments role their
own with PCs. It is the wild west again! The new users are on their
own again! The guys who started the stagnation are going out of
business! The only thing they can cling to is the centralized data
base of information that a bunch of PCs might need to access. This
data will often be too expensive or out-of-date to justify, so even
that will die off. Scratch one of the vested definers! Without
centralized multi-million dollar computing there can't be any credible
claims for massive multi-million dollar damages.

Everyone will have their own machine that they can walk around with.
It is a vision that has been around for awhile, but only recently have
the prices, technology, and power brought decent implementations
available. Users can plug it into the e-mail network, and unplug it.
What is more safe than something you can pick up and lock up? It is
yours, and it is in your care. You are responsible for it. Without
the massive damage claims, and with clear responsibility, there will
no longer be any interest from the journalists. Everybody has a
computer, everybody knows how much the true costs of damage are. It
will be very difficult for the journalists to sensationalize about
hackers. Scratch the second tier of the vested definers! Without
media coverage, the hackers and their exploits will fade away from the
headlines.

Without public interest, the politicians will have to move on to
greener pastures. In fact, instead of public fear of hackers, we now
are seeing a public fear of police state mentality and abuse of power.
No politician is going to want to get involved with that! I expect to
see the politicians fade away from the "hacker" scene rapidly.
Scratch the third tier of the vested definers! The FBI and the secret
service will be pressured to spend time on some other "hot" political
issue.

So where the heck are we? We are now entering the era of truly
affordable REAL systems. What does REAL mean? Ask a hacker dude!
These boxes are popping up all over the place. People are buying them,
buying software, and trying to get their work done. More often than
not, they run into problems, and eventually find out that they can ask
some computer heavy about them. Its sort of come full circle, these
guys are like the new users of the old timesharing systems. They had
an idea of what they wanted to do, but didn't know how to get there.
There wasn't a very clear source of guidance, and sometimes they had
to ask for help. So it went!

The hackers are needed again. We can solve problems, get it done,
make it fun. The general public has the vested interest in this! The
public has a vested interest in electronic privacy, in secure personal
systems, and in secure e-mail. As everyone learns more, the glamour
and glitz of the mysterious hackers will fade. Lay people are getting
a clearer idea of whats going on. They are less willing to pay for
inferior products, and aren't keen about relying on centralized
organizations for support. Many know that the four digit passcode
some company gave them doesn't cut the mustard.

What should we hackers do during this renaissance? First we have to
discard and destroy the definition of "hacker" that was foisted upon
us. We need to come to grips with the fact that there were
individuals and groups with a self interest in creating a hysteria
and/or a bogeyman. The witch hunts are over and poorly designed
systems are going to become extinct. We have cheap personal portable
compatible powerful systems, but they do lack some security, and
definitely need to be more fun. We have fast and cheap e-mail, and
this needs to be made more secure. We have the concept of electronic
free speech, and electronic free press. I think about what I was able
to do with the limited systems of yesterday, and feel very positive
about what we can accomplish with the powerful personal systems of
today.

On the software side we do need to get our operating system house in
order. The Unix version wars need to be stopped. Bill Gates must
give us a DOS that will make an old operating system guy like me
smile, and soon! We need to stop creating and destroying languages
every three years and we need to avoid software fads (I won't mention
names due to personal safety concerns). Ken Olsen must overcome and
give us the cheap, fast, and elegantly unconstrained hardware platform
we've waited for all our lives. What we have now is workable (terrific
in terms of history), but it is a moral imperative to get it right.
What we have now just doesn't have the "spark" (I am not doing a pun
on sun either!!!). The hackers will know what I mean.

If we are able to deal with the challenges of the hacking
renaissance, then history will be able to record the hackers as
pioneers and not as vandals. This is the way I feel about it, and
frankly, I've been feeling pretty good lately. The stagnation has
been a rough time for a lot of us. The stock market guys always talk
about having a contrarian view of the market. When some company gets
in the news as a really hot stock, it is usually time to sell it.
When you hear about how terrible some investment is, by some perverse
and wonderful force it is time to buy it. So it may be for the
"hackers". We are hearing how terrible "hackers" are and the millions
of dollars of vandalism that is being perpetrated. At this historic
low are we in for a reversal in trend? Will the stock in "hackers"
rise during this hacking renaissance? I think so, and I'm bullish on
the 90's also! Party on d00des!


><><><><><><><><><><><>
Tribute to Kurt Kobain>>>>>>>>
><><><><><><><><><><><>
Kurt Kobain, the former lead singer of Nirvana, commited suicide
sometime between Thursday, April 7, 1994 and Friday April 8, 1994 with a
sawed off shotgun. He put the barel to his face and pulled the trigger.
He did leave a suicide note, and although I don't have access to the exact
letter, I can summarize the reading of the note for you. Courtney Love, now
widowed wife of the late Kurt Kobain, sent a tape to the organizer's of a
candle tribute to Kurt Kobain on April 11, 1994. On the tape she read the
parts of the letters she said were directed to the fans, but the parts that
were "None Of Your Damn Buisiness" she left unknown. The main theme behind
his letter is that he hates the band Nirvana, hated his life, hated his music,
and was living a lie. Well, in our daily activities lets all remember one of
the greatest men in punk rock today. A man who wanted to entertain and make
music. Let's not forget him, "Kurt Kobain, we will never forget you and the
music that you have made for the past five or so."


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT