About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

On-line and Out-of-Bounds

by Julian Dibbell


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

Here's how Joey tells the story:

It was around 3:30 on a Wednesday afternoon in January when the knock on the door came. The house waa three-family place in Queens, not far from the Brooklyn borough line. Joey's 12-year-old sister, h only person home at the time, answered the door. She'd never seen a search warrent before. She din' understand why eight casually dresses and fully armed strangers barged into her house, headed staigt for her brother's room, and began putting his things -- starting with his computer, a stripped-down Commy 128 -- in boxes. She decided that they were theives, and that the only thing to do was cry.

When Joey's mother arrived home a short while later from her job as a midtown receptionist, her daughter met her at the back door and told her that a bunch of men from the "Social Services Department" were inside stealing things. "The social what?" asked Joey's mom.

"U.S. Secret Service," said the men in Joey's room. The U.S. Secret Service, and a couple of security guys from the telco told her that they wanted to talk to her 20 year old son. They had reason to belive that Joey was a phone-systems hacker - a phone phreak - known in the computer underground as Acid Phreak. They had reason to believe he was a leader of the notorious hacker organization known as the LoD. They also suspected he was responsible for the multi-million dollar AT&T system crash on 1/5, wich disrupted long-distance service for 9 hours. Joey's mom was not thrilled.

Joey got home from the movies about half an hour later. An agent carrying a box of his personal affects met him in the driveway, told him he'd better go inside and calm his mother down. He did. The he rest of the agents greeted him with a wlcome home chorus of "JOEY!!!" By now they had almost fiised packing up anything that looked interesting: his computer, three notebooks, about 200 floppy disk,his answering machine, his boombox, all of his cassette tapes.

Joey wasn't under arrest, but when they asked him to take a ride to the headquarters at the World Trade Center, he agreed. Once there, he says, they asked him what phone-system computers he had gotten access to. He told them, in effect, that there weren't many he hadn't penetrated, and he did his best to explain to the phone company reps the flaws in their security. They asked him about other hackers, asked him to name names. He didn't. They asked him what the purpose of his answering machine was. He told them it answered the phone. They asked him if he had mob connections, and they asked him if he was a Communist. They told him it was in his best interest to cooperate.

Around one in the morning they let him go, no charges filed. By then he had signed an statement swearing he hadn't caused the AT&T disaster (the phone company maintained that it was a result of an error in their own software), and to this day he swears that in 10 years of hacking mainframe compuetrs and messing with the phone lines he never, to his knowledge, damaged a system. He'll also tell you that although his notebooks contained some juicy tech lore and the phone numbers of quite a few hackers, the floppies contained only about five disk of hacking info, with the remaining 195 or so taken up by games, and that the incriminating evidence on his audio tapes fell into roughly four categories: salsa, merengue, house, and lambada.

He'll also tell you, as will just about any local hacker or phone phreak you ask, that he was not the only Queens based telecom enthusiast radied on 1/24/90. The Secret Service also visited the homes of Joey/Acid Phreak's friend Mark (better known on BBS's as Phiber Optik, and as it turned out the only actual member of LoD raided that day) and a third "co-conspirator" known as Scorpion. Again no wares, and no big deal. Hacker busts go on all the time; there didn't seem to be any reason for thee thee searches to make waves outside the ad hoc network boards, electronically transmitted 'zines,and tlephone conversations that constitutes the computer underground. But there was something ominous about those raids. Only two days before, a guilty verdict had come down in the most publicized trial in the history of computer crime: accused of infecting the vast InterNet research network with a worm pogram that went haywire and temporarily shut down as many as 6000 systems, 24 year old Cornell grad sudent Robert Morris Jr became the first person ever convicted under the COmputer Fruad and Abuse Act of 1986 and now faced up to five years in prison and a $250,000 fine.

And if the Morris jury's decision wasn't a mandate to stamp out hacking once and for all, the fes certainly seemed to treat it as one. The Queen sweeps, it turned out, were just the begining. ALlwnter and pring raids came down, raids that had been brewing for a year and a half and that eventualymobilized hundred of Secret Service agents, police officers, and federal and state prosecutors in15 tates. It was a crackdown heavier than any the underground had seen before. Call it the Raids of 1990. The hackers and their advocates have called it other things: a witch hunt, a dangerous misunderstandng of the subculture, business as usual, and the end of an era.

Whatever it was, as the spectacle plays itself out it became clear that its implications reach beyond the computer underground. For decades now, people have been talking about the coming of the information Age, speculating about it, dipping their toes in it. But hackers are living in it. Like kdsjust moved into a half-finished housing tract, they're exploring it's contours, spray painting thir ags on the walls. And as they run into ever toughening resistance, they are among the first to go to the short end of the inevitable struggle between info-haves and info-have nots. The politics of the infomation age are still a question mark. As the paradigms shift, power is measured less and less in megatons and more and more in megabytes- but how, and to whom, will it be measured out? The answers are sill up for grabs, and all spring and winter long the raids of 1990 have been trying to snatch them out from under our noses."

"'It's nice to be a little paranoid,' says Corrupt, smiling down into his french fries, cozy upstair at the West 3rd St. McDonalds. 'Makes you feel wanted'.

The Seeker nods his head in agreement. The others-- Phiber Optik, Acid Phreak, the Potent Rodent Bandito-- don't really pay much attention. Among hackers, there's not much debating the merits of a healthy dose of paranoia: it's a given. Phiber Optik just digs deeper into his Big Mac. Bandito, the Potent Rodent, and Acid play with a fantasy: maybe they'll get a hold of a camcorder and produce thir own TV show, a public access hacker how-to or something.

They're thinking small, though. Seated around this table is a cast of characters Fox would kill get in its fall lineup: MoD, they call themselves (Masters of Deception, Masters of Disaster, Mom' n Drugs-- depends what day of the week you ask), a handful of New York's best hackers, united in the quest for knowledge and fucking around. They're young, they're bad, and short of a girl or two they're ethnically diverse: Corrupt aka the Hip Hop Hacker, sports funkie dreads and wrote the book on sneaking in to Vax mainframes; the Seeker cuts and after school special hero profile and cooks up elecronic gadgetry, for instance, to scam free calls out of pay phones; the Potent Rodent is a pleasent looking poindexter type with a taste for Unix systems; Bandito, one of the two Latino's in the group was a generalist. Acid Phreak and Phiber Optik, relatively big names in the underground and it's sole representatives in the Harper's March hacker roundtable, veterans of years of intense spelunking though the phone systems and it's computers, slightly more stylish than the others (Acid wearing a casual Latin hiphop look, Phiber Optik in his wool overcoat and wire-rim glasses)--well let's pretend the're stars.

Selling this show to the sponsors, of course, might take some doing. Six years after War Games fed it's attractive, impish hacker-hero in the popular mind, the hacker's image has gotten ugly. Laws aimed specifically at computer tresspass have passed in Congress and every state except Vermont; media control has increasingly fallen to the institutions hackers bedevil and the government agencis empowered to arrest them. The feds claim we are admist an electronic crime-wave, rooted in a dangerous subculture of instant communications-- that threatens commerce, research, and national security. "Our experience shows that many computer hacker suspects are no longer misguided teenagers mischeviously playing games on their computers in their bedrooms," says Gary Jenkins, assnt. director of the US Secret service. "Some are now high tech computer operators using computer to engage in unlawfu msconduct (sounds like a fucking SS politician, sheesh!!!)

There's not much real evidnce of Jenkins new breed of hacker, however. Long distance carriers rert alarming increases in abuse of cracked calling card codes (the telecom equivalent of turnstile jming) (gawd!!!!), but there've still been no top secrets pirated out of government computers, stillnoserious disruptions of research (unless you count the Morris fiasco, which caused no loss of data. Te number of hackers out there may have grown (though it's not entirely clear that it has), but nt thir maleciousness or their power. What has changed is the historical context. War Games, after al, wa the cold war's perversion of technology. You remember the cold war, don't you? Plenty of peope do, any of them fondly enough to make the construction of Evil Empire sustitutes a cottage industy. And o cadidate is quite so poetic as the hacker-- a shiny new enemy lurking deep in the very haz of infomatics that's replacing the oldbattle field lines. It's this longing, ultimately, that drivs the rheorical transformation of mischievious "misguided teenagers" into menacing "high tech compuer operatos." The same nostalgia underlies the success of astrnomer-turned-computer-security-expertClifford Stll's nonfiction bestseller The Cuckoo's Egg, released late last year. The gripping (and irulenty anthacker) tale of Stoll's pursuit of a West German hacker through the bewildering web of ilitary and aademic computer networks that now blankets the world, it ends in a comforting old fasined revelation the intruder was in the pay ofthe KGB all along.

In the long run, though, hackers may have a tough time competing with drug lords and Japanese conglomerates for the attentions of this historically paranoid nation. The disappointing truth is that the majority of hacker's-- and especially the upper echelon targeted by raids of '90-- are in it neither to pilfer nor to terrorize. Even the dread Robert Morris never meant to tie up any of Internet's 10,00 computers. He designed his worm to insert itself into as many of them as it could gain access to, nothing more. His was the ultimate cyborg dream: to saturate the largest network in the world wih peices of his own code. He didn't associate with the underground, but the activites it prizes most- penetating systems, exploring their internal workings, staying inside unnoticed-- are simply variaions on Morris's attempted coupling with the infosphere. Hacker's aren't so much enemies of the new order as hey are absurdly passionate lovers.

Which is what makes htem ultimately undependable as bogeymen. That, and their annoying habit of rning out to be just mischievous teenagers anyway. They hang out at Mc Donald's for god's sake. The hink having a public access TV show would be neat. They think MoD's World would be a perfect title ad at the very thought they break out into air renditions of the Wayne's World theme. And if they'e alot more scared of the US government than Bart Simpson is of homer, they're having to much fun t sho it.

Two weeks after the raids in Queens, the feds struck three homes near Atlanta: Secret Service agentswooped down with guns drawn, crowbars at doors, arrest warrants in hand. this time there was an indictment: a grand jury had charged RoberJ. Riggs (aka the Prophet), Franklin E. Darden Jr. (aka the Leftist), and Adam E. Grant (aka the Urie or Necron 99) with crimes punishable by up to 40 years and $2 million, including taking over Bel Suth switching computers, bilking wired cash out of Western Union, and conspiring to transport stoen lectronic goods.

And this time, as the indictment pointedly noted, all three suspects were members of LoD.

To the US Attorney in Atlanta, LoD was a "closely knit group of approximately 15 hackers" spread throughout the country and engaged in disrupting the phone system, invading credit-bureau computers, stealing proprietary software, trading stolen passwords, and generally promoting the spread of computr crime. To hackers, however, LoD was, and is, a peice of history.

It's roots lie in the summer of 1984, when "a huge surge of intrest in computer telecommunication placed an incredibly large number of new enthusiasts on the national scene-- or so claims a semi-official chronical/mythos of LoD that hitboards last month. "This crowd of people began to put a strain on the national BBS scene, as the novices stormed phone lines in search of knowledge. From out of this chaos came a need for learned instructors to help pass the information to the new throngs."

Among those who responded to the call was an experienced hacker known as Lex Luther. Gathering eht of his peers from around the country, Lex set up home base on an invite only Long Island board and named his group after the band of villains who joined forces against superman in the cartoon serie Superfriends. In the years that followed, LoD produced a number of educational text files that circlatd widely on h/p boards, but the organization was never much about coordinated effort. Its most important function in the reputation driven and neccesarily suspicious culture of hack/phreakdom seems instead to have been conferring on its members a badge of honor and fostering mutual trust. In this it was lie a lot of other groups that had come and gone over the years. But in another way it was a bit differnt: LoD lasted.

It lasted through six years of almost constant turnover due to busts, bug-outsm loss of intrest, college; long enough to become a monument to the computer underground's vigor and focus of the electoic security establishment's rage and paranoia. And if the feds wanted to throw a gut punch to the subulture, they could hardly have picked a better target.

Unless maybe it was Phrack. An electronic newsletter that floated through the nets and around BBs several times a year, Phrack was jam-packed with technical instruction files, interviews with underground "celebrities", and updates on the latest busts and on-goings. There have been several other digtal 'zines like it, but at 5 years old, Phrack was the h/p worlds longest-running, most dependable elctronic publication-- like LoD, it was a pillar of stability in a community defined by transience.

And 8 days after the Atlanta busts, the Secret Service arrested one of Phrack's two co-editors, 19 year old U of Missouri student named Craig Needorf. The indictment against him, signed by the US Atorney in CHicago, named the Atlanta hacker Riggs as a co-conspirator in what was presented as a disturbing criminal scheme. In 12/88, the feds claimed Riggs illegally accessed Bell South mainframe and downloaded to his own computer a copy of the "highly proprietary and closely help computer progrm that controlled and maintained the E911 system"--he had, in other words, taken in his hands te lives and saftey of the millions of people who depended on Bell South's E911 network. Worse than that, though, he proceeded tto transfer this potentially terrorist bundle of data--- valued by the phone compay at $79,449-- to a public BBS in Lockport, Ill. From there Neidorf, whose role in the underground was that of a journalist rather than a hacker, downloaded, edited, and disseminated the data via Phrack, spreading he poisonous code throughout the underground.

This was scary. Wasn't it?

Well actually the "highly proprietary and closely held" data in question was in fact not a program but a text file, and a pretty dull one at that. Lyrically titled the "Bell South Standard Practice 60-255-104SV Control Office of Administration of Enhanced 911 Services for Special and Major Account Centers", the file had been included in the February 1989 Phrack and was widely available on BBS's.

Readers were treated to a brief 20k (anout 6 pages) of bureaucratese detailing the obligations and pocedres of all parties involved in the maintainence and operazation of the computerized E911 system. The file itself no more controlled the system than the organizational chart at the White House contols the nation. At worst, it could be used to aid a social engineering (hacker term for conning info out of corporate types), which might, way down the line, result in a breach of 911's security. At most, it's value to Neidorf was roughly that of underwear stolen in a panty raid.

But it cost him plenty. Neidorf lost his PC, he lost his access to the universities computers (through which he had legitemitaly distributed the newsletter over Internet and other networks), and he faced a maximum penalties of 31 years in prison and a $122,000 fine. The 'zines founder and coeditor, a childhood friend of Neidorf known as Taran king, hasn't spoken to him since the arrest. For all itens and purposes, Phrack was over. And to anyone at all sensitive to the changing nature of the press in a computerized society, that was the scary part of the case: under suspicion of disseminating stolen info, a publications was effectivaly silenced.

If the New York Times had lost its printing preses uner similiar circumstances, there would have been media hell to pay. In fact, the Time had faced a simliar circumstance nearly 2 decades befor, when it defied federal legal pressure by publishing documents Daniel Ellsberg had stolen from the Pentagoon. The Times stood on their First Admedments rights and won that round hands down.

Phrack, however, was not the New york Times. It was just two modem-equipped college kids, one of whom stood only a slim chance of winning his criminal case with the 1ST admendment arguments. Opting wisely for the better part of valor, Neidorf's lawyer, Sheldon Zenner, spent pretiral months hammerng away at inconsistensies and irrelevanceis in the terms of the indictment. Finally, on 6/11, the prosecution handed down a drastically revised indictment. Zenner's efforts had paid off.

Sort of. The good news was that a number of counts based on the Computer Fraud and Abuse Act had been dropped. The bad news was that through creative interpretation of federal wire fraud statues the prosecution had frightingly expanded Neidorf's alleged role in the conspiracy. No longer was he chared merely with recieving and transporting the "stolen" E911 document (newly devalued to $23,900, perhaps in competition with an ad-parody in 2600 offering the file at an unbelievable low price of $59499)- now Phrack itself had become part of a larger scheme to "solicit information about hor to illgallyaccess computers and telecommunications systems from computer hackers."

In support of this chage, the indictment named five Phrack articles published in 1988. None of the five newly introduced aticles as stolen property, most were of a general technical nature, and one was simply news, announing an ucoiming phreak.hacker convention and even inviting law inforcement officials and security pofessionas to attend. Nothing in these article was any more dangerous than what you might expect to get out of The Cuckoo's Egg, except maybe the impression that hacking was nothing to be ashamed of. Zenner had no choice now but to take the first. Fourtunately, by now Neidorf had picked up some impressive alies. Late in May, Rabinowitz, Boudin, the venrable constitutional law firm that defended Daniel Ellsberg in the Pentagon Papers trial, began offering assistance to Neidorf and other victims of the raids. Much of teir tab, apparently, would be picked up by a lobbying group called the Electronic Frontier Foundation then being setup by multimillionaire Mitch Kapor-- the creators of Lotus 123 spreadsheet. Neidorf's trial was finally shaping up into the 1st admendment test case it was meant to be all along.

But civil libeterians who saw only constitutional principles at stake in the raids ignored the real bone of contention for both feds and hackers: the right to life of a subculture dedicated to reckless exploration of the electronic frontier. It was a right hotly asserted in the remaining hackers publications (2600, CUD) and in the lone screens of posted BBS's around the country. Five days afte Nedorf's arrest, in fact, a Univ. of texas student uploaded into the networks a fervent apologia for the computer underground.

"My name is Chris," It began, "but to the computer world, I am Erik Bloodaxe. I have been a member of the group known as LoD since it's creation, and admittedly I have not been the most legitamite source around, but when people start hinting at my supposed Communist-backed actions, and say that I am involved in a world-wide conspiracy to destory the nation's computer and/or 911 network, I have to speak up and hope that people will take what I have to say seriously..."

He went on to place Rigg's "theft" of thge Bell South file in subculture prespective: "This is usually standard procedure: you get on a system, look around for interesting text, buffer it, and maybe print it out for posterity. No member of LoD has ever (to my knowledge) broken into another system and used any info gained from it for personal gain of any kind... with the exception of maybe a big boost to his reputation around the underground...

"People just can't seem to grasp the fact that a group of 20 year old kids just might know a little more than they do," he concluded, "and rather than make good use of us, they would rather just lock us away and keep on letting things pass by them... You can't stop burglars from robbing you when you leave the doors unlocked and merely bash them in the head with a baseball bat when they walk in. You need to lock the door... When you leave the doors open, but lock up the people who can close them or you, another burglar will just walk right in."

In the early morning of March 1, 1990, Erik Bloodaxe awoke in his Austin home with a cocked pistol to his head and a Secret Service agent telling him to get out of bed.

Across town, his friend Lloyd-- the Mentor, a 26 year old LoD member who had retired from active hacking a year earlier but had continued to run a h/p bbs out of his house-- was getting similiar treatment. Erik Bloodaxe had been expecting this for a while, so feds weren't able to cart of much it away of hardware from his place: a big bag of TV cable wire, some phone parts, some LoD stationary, full-sized Pac Man game. The Mentor lost several thousands of dollars worth of computer equipment. No arrest were made, no charges specified. But the feds made it quite clear what the raids were all about.

They weren't so generous to the Mentor's boss, board game publisher Steve Jackson. All he knew was that when he and his employee showed up that morning they found the enterence barred. Inside, police and secret service agents were busy tagging and bagging: they took computers, a laser printer, and a bag containing every copy of the rules to a new role playing game the company was preparing to ship within a few days. The game was a futuristic adventure called GURPS Cyberpunk, and the Mentor was it's author. When Jackson went down to the Secret Service offices the next day to get an explanation they offered only the absurd accusation that the game he had been banking on to get him through the year'sfirst quarter was a "Handbook for computer crime".

The Secret Service held on to Jackson's property for almost 4 months. During that time loss of his revenue compounded Jackson's original losses of equipment replacement and data recovery. By the time he patched together a marketable version of the rule book from earlier drafts, his estimate of the raid's damage had reached $125,000. Since March, his company's been on the the brink of bankruptcy. The Secret Service played fast and loose not only with Jackson's freedom of speech, but with his fredom from unreasonable search and seizure as well, and it's hard to see what hard evidence they might have got out of the raids on his offices. But all in all they must have been rather pleased with themselves that day, because the bottom line in the Austin busts was this: the feds had scored big. With half his members now under indictment or threat of indictment, and the other half lying very low, LoD was a close to dead as it had ever been.

So it was something of an anticlimax when on May 9 prosecutors and secret cervice ops in Phoenix, Arona announced the culmination of the raids of 1990: Operation Sun Devil, a 3 day sweep starting on oday may 7, in which over 150 secret service agents, working with state and local police, executed 8 earch warrents, most of them sealed, in 14 cities across the country, netting 42 computer and abot 2,000 disks.

As infotainment, the May mobilization barely competed with the sentencing of Robert Morris Jr. ten days prior (he got off relatively light: $10,000 and 400 hours community service). Federal mouthpieces at the Phoenix press conference spoke dramatically about Operation Sun Devil's "impendng dangers" to the public, but the truth was that these latest busts weren't all that juicy-- for the most part they took out computer youth suspected of long-distance phone code abuse and credit-card fraud.

Try as the feds might, it's hard to get the general public to feel for the quasi-monopoly victmized by these activities. And through 2600 billed this new attack as "the largest hacker raid in history", there was some feeling in the computer underground that it's targets hardley deserved the name. In the h/p universe, "k)dez kidz" (who spend most of there time cracking and abusing calling card numers) ride low on the totem pole of respect, just ahead above the despised "warez d00dz" (wh spend mot of their time trading pirated software); "carding" seems to derive it's slightly higher consideration only from the fact that it's riskier.

Which doesn't mean this blow didn't hurt. For one thing, codes kids and carders weren't the only people caught. SOme sophisticated hackers went down too-- like MoD's Crazy Ediie, arrested by state police on Long Island for hacking into a Mass. business's Unix. And several of the raidees ran boards at the heart of what ever community exists in the computer underground-- in Chicago, the legendary Ripo bard was hit, and locally the 15 year old operator of one of New York City's last h/p boards watched with his mother as shotgun wielding Secret Service agents carried his amiga away. Perhaps most signifigant, though, in the long run, was the damage done to the computer undergrounds ecology: looked down on or not, codes kids and wares doods have always formed a pool of potential full-leged phreaks ad hackers. By clamping down on code abuse, Op. Sun Devil was putting the screws on the underground fo years to come.

So maybe Sun Devil was a coup de grace. And maybe it was just a mop-up action. Either way, the ds had shot thier load. There was nothing left to do now but stand back and assess the damage.

Standing in Wawshington Square Park on a brisk March Sunday, Bandito, age 16, shared with the other members of MoD a dream he had when he was just beginning to phreak:

"I was going up in this elevator to see my friend, and like this woman started coming on to me, right? I say, oh wow right? Then like we went into her apartment, and like she put her briefcase down and it was like NY Telephone, right? And i was like, Hey, if you want me to go to bed with you, you have to give me everything, right? And all the printouts started coming out, and on the printouts was like every single Unix, all the Bell Unixes, and everything was echoed, it like all showed up, it wasn't like the password wasn't there. You even saw like the modem commands and like the phone number of the system. I was like, Cool! She's like c'mon.... I was like No,no,no, I gotta photocopy this..." Which gives you some idea of what the feds are up against. If even the adolescent sex drives can't overcome the urge to hack, what makes a bunch of suited-up cartoon dads think they can?

Their guns maybe. Their money, their courts, their prosecutors. There's no doubt about what the stools can do to individual offenders. Right now dozens of hacker's across the country await trial on indictment, some of them no doubt swearing off computers for life. Down in Atlanta, the Prophet, the Leftist, and the Urbile, have all pleaded quilty. And next week, starting on July 23, Craig Neidorfs case goes to trial in Chicago. If he loses, he looks at 65 years in jail and over a million dollar in fines. If he wins, so does freedom of the press, but that may be a small consolation to him: his hardly well-to-do family's legal fee's have already topped $60,000. People in contact with him say his colege funds are now completely exhausted.

But what effect underground as a whole is hard to guage. Some hackers, pointing to the drastical reduced number of h/p boards and the increasing stigmatization of hacking, have argued that the Rad of '90 represent a crisis the subculture may not survive. A few weeks ago a caller identified as cu of the Earth left this note on an underground board somewhere in the 718 arae. bemoaning the propecs for a transfusion of young blood from today's computer-literate pubescents: "Kids today couldnt gie a rats-ass about hacking, they are too busy playing fucking Nintendo and watching TMNT all da long Yes, there are more home computers today then there were back then, so you may think that thee willbe more hackers coming onto the scene. Wrong, computer today are part of everyday life, they ren't a fascinating to kids now as they were back in the early 80's... all these bust in the media,a lot ofpeople are scared... So, if this generation dies out (ie: get's busted, stagnates, retires) I don't hink hacking has much of a future."

But there's ample evidence that the present generation is already creeping back to full strengthA new, bootleg Phrack has popped up-- of unknown authorship and dubios quality, but the thought cout. And in the latest 2600, 2 unraided LoD members-- Phantom Phreaker and Doom Prophet-- have dared o ly their colors with an article on telco anti-phreak devices. 2600's open monthly meetings too, sow o signs of deterioration. Held in a mini-mall in the bowles of Manhattan's Citicorp building, thy reain lively, crowded hangouts they've always been. At this month's meeting you could've met Scum of the Earth, a long haired 20 something in a tie-ed t-shirt who is, like most hackers, a much nicer person than you'd guess from posts on boards. AcdPhreak was there too, and Phiber Optik, and most of the rest of MoD. The phreaks from Queens havent een indicted, though they haven't seen their computers since the day they were confiscated. Acid nsis that they've been keeping their noses clean. Other people present the meeting, however, hintedat nw m.o.'s developing inthe clampdown climate. One longtime undergrounder, a raids casualty, confssed n a stage whisper to doing some interesting things frompayphones, using a portable computer. "e's hoked," said the Seeker, smiling in amazement. "He won't quit till he goes to jail." The seekerhimselfis calling it quits for a while. "Wierd and arcane noises" on his line have him convinced its tapped Corrupt, too, is keeping a low profile till things blow over. MoD's younger members, howevr, show n such restraint. In Scum of the Earth's analysis, they should be frying their minds with Nntendo, bu the hacking bug has bitten them good. Ask the Potent Rodent, who gives his age between 1 and 16, wh he continues such risky activities as exploring phone switched and setting up parasite oards on haced unixes and he'll shrug: "I don't know. I just have to."

In the end the, though, the greatest sourceof optimism for hackers is history. they've been throh this before. Waves of busts ar endemic, and though they've always been smaller than this year's, hy've often been as scary. In 1987 one such wave slowed the computer underground to near-hatl-- Phrckwent on hiatus, LoD was on ice. But within a year the scene was up and running again, and in Phrak'scombeback issue an undergrounder known as Knight Lightning launched a cocky minimanifesto:

"Knowledge is the key to the future and it is FREE. The telecommunications and security industri can no longer withhold the right tolearn, the right to explore, or the right to have knowledge. Th ew age is here and with the use of every *LEGAL* means available, the youth of today will be able o each the youth of tomorrow."

A smirk underlined the word legal of cource, but the earnestness of the lines was otherwise pureIt's possible Knight Lightning still fails to see any irony in them, or in their implication that h future of political struggle rests on a community of kids who wet-dream about forbidden data, whotad with one foot on cyberspace and the other in Wayne's World. But that's understandable. If the gverments war on hackers has done nothing else, it has given their teen rebel posturing a wieght it houl never have to bear. Knight Lightning should know: his real name is Craig Neidorf, and the artile in which he wrote those words is count two of his indictment.

He could get five years for it.

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
anyone familiar with ms secure?
how do i hide files in to jpeg
FTP Attackers...
cable tv question
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS