Hacker Crackdown by Bruce Sterling (i have read the book TXT) đź“•
You can put the book on disks and give the disks away, aslong as you don't take any money for it.
But this book is not public domain. You can't copyrightit in your own name. I own the copyright. Attempts to piratethis book and make money from selling it may involve you in aserious litigative snarl. Believe me, for the pittance you mightwring out of such an action, it's really not worth it. This bookdon't "belong" to you. In an odd but very genuine way, I feel itdoesn't "belong" to me, either. It's a book about the people ofcyberspace, and distributing it in this way is the best way Iknow to actually make this information available, freely andeasily, to all the people of cyberspace--including people faroutside the borders of the United States, who otherwise may neverhave a chance to see any edition of the book, and who may perhapslearn something useful from this strange story of distant,obscure, but por
Read free book «Hacker Crackdown by Bruce Sterling (i have read the book TXT) 📕» - read online or download for free at americanlibrarybooks.com
- Author: Bruce Sterling
- Performer: 055356370X
Read book online «Hacker Crackdown by Bruce Sterling (i have read the book TXT) 📕». Author - Bruce Sterling
Most any underground board not hopelessly lame and out-of-it would feature a complete run of PHRACK—and, possibly, the lesser-known standards of the underground: the LEGION OF DOOM TECHNICAL JOURNAL, the obscene and raucous CULT OF THE DEAD COW files, P/HUN magazine, PIRATE, the SYNDICATE REPORTS, and perhaps the highly anarcho-political ACTIVIST TIMES INCORPORATED.
Possession of PHRACK on one’s board was prima facie evidence of a bad attitude. PHRACK was seemingly everywhere, aiding, abetting, and spreading the underground ethos. And this did not escape the attention of corporate security or the police.
We now come to the touchy subject of police and boards. Police, do, in fact, own boards. In 1989, there were police-sponsored boards in California, Colorado, Florida, Georgia, Idaho, Michigan, Missouri, Texas, and Virginia: boards such as “Crime Bytes,” “Crimestoppers,” “All Points” and “Bullet-N- Board.” Police officers, as private computer enthusiasts, ran their own boards in Arizona, California, Colorado, Connecticut, Florida, Missouri, Maryland, New Mexico, North Carolina, Ohio, Tennessee and Texas. Police boards have often proved helpful in community relations. Sometimes crimes are reported on police boards.
Sometimes crimes are COMMITTED on police boards. This has sometimes happened by accident, as naive hackers blunder onto police boards and blithely begin offering telephone codes. Far more often, however, it occurs through the now almost-traditional use of “sting boards.” The first police sting-boards were established in 1985: “Underground Tunnel” in Austin, Texas, whose sysop Sgt. Robert Ansley called himself “Pluto”—“The Phone Company” in Phoenix, Arizona, run by Ken MacLeod of the Maricopa County Sheriff’s office—and Sgt. Dan Pasquale’s board in Fremont, California. Sysops posed as hackers, and swiftly garnered coteries of ardent users, who posted codes and loaded pirate software with abandon, and came to a sticky end.
Sting boards, like other boards, are cheap to operate, very cheap by the standards of undercover police operations. Once accepted by the local underground, sysops will likely be invited into other pirate boards, where they can compile more dossiers. And when the sting is announced and the worst offenders arrested, the publicity is generally gratifying. The resultant paranoia in the underground—perhaps more justly described as a “deterrence effect”—tends to quell local lawbreaking for quite a while.
Obviously police do not have to beat the underbrush for hackers. On the contrary, they can go trolling for them. Those caught can be grilled. Some become useful informants. They can lead the way to pirate boards all across the country.
And boards all across the country showed the sticky fingerprints of PHRACK, and of that loudest and most flagrant of all underground groups, the “Legion of Doom.”
The term “Legion of Doom” came from comic books. The Legion of Doom, a conspiracy of costumed super-villains headed by the chrome-domed criminal ultra-mastermind Lex Luthor, gave Superman a lot of four-color graphic trouble for a number of decades. Of course, Superman, that exemplar of Truth, Justice, and the American Way, always won in the long run. This didn’t matter to the hacker Doomsters—“Legion of Doom” was not some thunderous and evil Satanic reference, it was not meant to be taken seriously. “Legion of Doom” came from funny-books and was supposed to be funny.
“Legion of Doom” did have a good mouthfilling ring to it, though. It sounded really cool. Other groups, such as the “Farmers of Doom,” closely allied to LoD, recognized this grandiloquent quality, and made fun of it. There was even a hacker group called “Justice League of America,” named after Superman’s club of true-blue crimefighting superheros.
But they didn’t last; the Legion did.
The original Legion of Doom, hanging out on Quasi Moto’s Plovernet board, were phone phreaks. They weren’t much into computers. “Lex Luthor” himself (who was under eighteen when he formed the Legion) was a COSMOS expert, COSMOS being the “Central System for Mainframe Operations,” a telco internal computer network. Lex would eventually become quite a dab hand at breaking into IBM mainframes, but although everyone liked Lex and admired his attitude, he was not considered a truly accomplished computer intruder. Nor was he the “mastermind” of the Legion of Doom—LoD were never big on formal leadership. As a regular on Plovernet and sysop of his “Legion of Doom BBS,” Lex was the Legion’s cheerleader and recruiting officer.
Legion of Doom began on the ruins of an earlier phreak group, The Knights of Shadow. Later, LoD was to subsume the personnel of the hacker group “Tribunal of Knowledge.” People came and went constantly in LoD; groups split up or formed offshoots.
Early on, the LoD phreaks befriended a few computer-intrusion enthusiasts, who became the associated “Legion of Hackers.” Then the two groups conflated into the “Legion of Doom/Hackers,” or LoD/H. When the original “hacker” wing, Messrs. “Compu-Phreak” and “Phucked Agent 04,” found other matters to occupy their time, the extra “/H” slowly atrophied out of the name; but by this time the phreak wing, Messrs. Lex Luthor, “Blue Archer,” “Gary Seven,” “Kerrang Khan,” “Master of Impact,” “Silver Spy,” “The Marauder,” and “The Videosmith,” had picked up a plethora of intrusion expertise and had become a force to be reckoned with.
LoD members seemed to have an instinctive understanding that the way to real power in the underground lay through covert publicity. LoD were flagrant. Not only was it one of the earliest groups, but the members took pains to widely distribute their illicit knowledge. Some LoD members, like “The Mentor,” were close to evangelical about it. LEGION OF DOOM TECHNICAL JOURNAL began to show up on boards throughout the underground.
LOD TECHNICAL JOURNAL was named in cruel parody of the ancient and honored AT&T TECHNICAL JOURNAL. The material in these two publications was quite similar—much of it, adopted from public journals and discussions in the telco community. And yet, the predatory attitude of LoD made even its most innocuous data seem deeply sinister; an outrage; a clear and present danger.
To see why this should be, let’s consider the following (invented) paragraphs, as a kind of thought experiment.
(A) “W. Fred Brown, AT&T Vice President for Advanced Technical Development, testified May 8 at a Washington hearing of the National Telecommunications and Information Administration (NTIA), regarding Bellcore’s GARDEN project. GARDEN (Generalized Automatic Remote Distributed Electronic Network) is a telephone-switch programming tool that makes it possible to develop new telecom services, including hold-on-hold and customized message transfers, from any keypad terminal, within seconds. The GARDEN prototype combines centrex lines with a minicomputer using UNIX operating system software.”
(B) “Crimson Flash 512 of the Centrex Mobsters reports: D00dz, you wouldn’t believe this GARDEN bullshit Bellcore’s just come up with! Now you don’t even need a lousy Commodore to reprogram a switch—just log on to GARDEN as a technician, and you can reprogram switches right off the keypad in any public phone booth! You can give yourself hold-on-hold and customized message transfers, and best of all, the thing is run off (notoriously insecure) centrex lines using—get this—standard UNIX software! Ha ha ha ha!”
Message (A), couched in typical techno-bureaucratese, appears tedious and almost unreadable. (A) scarcely seems threatening or menacing. Message (B), on the other hand, is a dreadful thing, prima facie evidence of a dire conspiracy, definitely not the kind of thing you want your teenager reading.
The INFORMATION, however, is identical. It is PUBLIC information, presented before the federal government in an open hearing. It is not “secret.” It is not “proprietary.” It is not even “confidential.” On the contrary, the development of advanced software systems is a matter of great public pride to Bellcore.
However, when Bellcore publicly announces a project of this kind, it expects a certain attitude from the public— something along the lines of GOSH WOW, YOU GUYS ARE GREAT, KEEP THAT UP, WHATEVER IT IS—certainly not cruel mimickry, one-upmanship and outrageous speculations about possible security holes.
Now put yourself in the place of a policeman confronted by an outraged parent, or telco official, with a copy of Version (B). This well-meaning citizen, to his horror, has discovered a local bulletin-board carrying outrageous stuff like (B), which his son is examining with a deep and unhealthy interest. If (B) were printed in a book or magazine, you, as an American law enforcement officer, would know that it would take a hell of a lot of trouble to do anything about it; but it doesn’t take technical genius to recognize that if there’s a computer in your area harboring stuff like (B), there’s going to be trouble.
In fact, if you ask around, any computer-literate cop will tell you straight out that boards with stuff like (B) are the SOURCE of trouble. And the WORST source of trouble on boards are the ringleaders inventing and spreading stuff like (B). If it weren’t for these jokers, there wouldn’t BE any trouble.
And Legion of Doom were on boards like nobody else. Plovernet. The Legion of Doom Board. The Farmers of Doom Board. Metal Shop. OSUNY. Blottoland. Private Sector. Atlantis. Digital Logic. Hell Phrozen Over.
LoD members also ran their own boards. “Silver Spy” started his own board, “Catch-22,” considered one of the heaviest around. So did “Mentor,” with his “Phoenix Project.” When they didn’t run boards themselves, they showed up on other people’s boards, to brag, boast, and strut. And where they themselves didn’t go, their philes went, carrying evil knowledge and an even more evil attitude.
As early as 1986, the police were under the vague impression that EVERYONE in the underground was Legion of Doom. LoD was never that large—considerably smaller than either “Metal Communications” or “The Administration,” for instance—but LoD got tremendous press. Especially in PHRACK, which at times read like an LoD fan magazine; and PHRACK was everywhere, especially in the offices of telco security. You couldn’t GET busted as a phone phreak, a hacker, or even a lousy codes kid or warez dood, without the cops asking if you were LoD.
This was a difficult charge to deny, as LoD never distributed membership badges or laminated ID cards. If they had, they would likely have died out quickly, for turnover in their membership was considerable. LoD was less a high-tech street-gang than an ongoing state-of-mind. LoD was the Gang That Refused to Die. By 1990, LoD had RULED for ten years, and it seemed WEIRD to police that they were continually busting people who were only sixteen years old. All these teenage small-timers were pleading the tiresome hacker litany of “just curious, no criminal intent.” Somewhere at the center of this conspiracy there had to be some serious adult masterminds, not this seemingly endless supply of myopic suburban white kids with high SATs and funny haircuts.
There was no question that most any American hacker arrested would “know” LoD. They knew the handles of contributors to LOD TECH JOURNAL, and were likely to have learned their craft through LoD boards and LoD activism. But they’d never met anyone from LoD. Even some of the rotating cadre who were actually and formally “in LoD” knew one another only by board-mail and pseudonyms. This was a highly unconventional profile for a criminal conspiracy. Computer networking, and the rapid evolution of the digital underground, made the situation very diffuse and confusing.
Furthermore, a big reputation in the digital underground did not coincide with one’s willingness to commit “crimes.” Instead, reputation was based on cleverness and technical mastery. As a result, it often seemed that the HEAVIER the hackers were, the LESS likely they were to have committed any kind of common, easily prosecutable crime. There were some hackers who could really steal. And there were hackers who could really hack. But the two groups didn’t seem to overlap much, if at all. For instance, most people in the underground looked up to “Emmanuel Goldstein” of 2600 as a hacker demigod. But Goldstein’s publishing activities were entirely legal—Goldstein just printed dodgy stuff and talked about politics, he didn’t even hack. When you came right down to it, Goldstein spent half his time complaining that computer security WASN’T STRONG ENOUGH
Comments (0)