Underground by Suelette Dreyfus (top rated books of all time txt) đź“•
The critics have been good to `Underground', for which I am verygrateful. But the best praise came from two of the hackers detailed inthe book. Surprising praise, because while the text is free of thenarrative moralising that plague other works, the selection of materialis often very personal and evokes mixed sympathies. One of the hackers,Anthrax dropped by my office to say `Hi'. Out of the blue, he said witha note of amazement, `When I read those chapters, it was so real, as ifyou had been right there inside my head'. Not long after Par, half aworld away, and with a real tone of bewildered incredulity in his voicemade exactly the same observation. For a writer, it just doesn't get anybetter than that.
By releasing this book for free on the Net, I'm hoping more peoplewill not only enjoy the story of how the international computerunderground rose to power, but also make
Read free book «Underground by Suelette Dreyfus (top rated books of all time txt) 📕» - read online or download for free at americanlibrarybooks.com
- Author: Suelette Dreyfus
- Performer: 1863305955
Read book online «Underground by Suelette Dreyfus (top rated books of all time txt) 📕». Author - Suelette Dreyfus
`Yes.’ Force seemed hesitant. `OK.’
On the other side of the Pacific from Par, Force thought about this turn of events. If they were valid credit cards, that was very cool. Not because he intended to use them for credit card fraud in the way Ivan Trotsky might have done. But Force could use them for making long-distance phone calls to hack overseas. And the sheer number of cards was astonishing. Thousand and thousands of them. Maybe 10000. All he could think was, Shit! Free connections for the rest of my life.
Hackers such as Force considered using cards to call overseas computer systems a little distasteful, but certainly acceptable. The card owner would never end up paying the bill anyway. The hackers figured that Telecom, which they despised, would probably have to wear the cost in the end, and that was fine by them. Using cards to hack was nothing like ordering consumer goods. That was real credit card fraud. And Force would never sully his hands with that sort of behaviour.
Force scrolled back over his capture of the numbers which had been injected into his machine. After closer inspection, he saw there were headers which appeared periodically through the list. One said, `CitiSaudi’.
He checked the prefix of the mystery machine’s network address again. He knew from previous scans that it belonged to one of the world’s largest banks. Citibank.
The data dump continued for almost three hours. After that, the Citibank machine seemed to go dead. Force saw nothing but a blank screen, but he kept the connection open. There was no way he was going to hang up from this conversation. He figured this had to be a freak connection—that he accidentally connected to this machine somehow, that it wasn’t really at the address he had tried based on the DEFCON scan of Citibank’s network.
How else could it have happened? Surely Citibank wouldn’t have a computer full of credit cards which spilled its guts every time someone rang up to say `hello’? There would be tonnes of security on a machine like that. This machine didn’t even have a password. It didn’t even need a special character command, like a secret handshake.
Freak connections happened now and then on X.25 networks. They had the same effect as a missed voice phone connection. You dial a friend’s number—and you dial it correctly—but somehow the call gets screwed up in the tangle of wires and exchanges and your call gets put through to another number entirely. Of course, once something like that happens to an X.25 hacker, he immediately tries to figure out what the hell is going on, to search every shred of data from the machine looking for the system’s real address. Because it was an accident, he suspects he will never find the machine again.
Force stayed home from school for two days to keep the connection alive and to piece together how he landed on the doorstep of this computer. During this time, the Citibank computer woke up a few times, dumped a bit more information, and then went back to sleep. Keeping the connection alive meant running a small risk of discovery by an admin at his launch point, but the rewards in this case far exceeded the risk.
It wasn’t all that unusual for Force to skip school to hack. His parents used to tell him, `You better stop it, or you’ll have to wear glasses one day’. Still, they didn’t seem to worry too much, since their son had always excelled in school without much effort. At the start of his secondary school career he had tried to convince his teachers he should skip year 9. Some objected. It was a hassle, but he finally arranged it by quietly doing the coursework for year 9 while he was in year 8.
After Force had finally disconnected from the CitiSaudi computer and had a good sleep, he decided to check on whether he could reconnect to the machine. At first, no-one answered, but when he tried a little later, someone answered all right. And it was the same talkative resident who answered the door the first time. Although it only seemed to work at certain hours of the day, the Citibank network address was the right one. He was in again.
As Force looked over the captures from his Citibank hack, he noticed that the last section of the data dump didn’t contain credit card numbers like the first part. It had people’s names—Middle Eastern names—and a list of transactions. Dinner at a restaurant. A visit to a brothel. All sorts of transactions. There was also a number which looked like a credit limit, in come cases a very, very large limit, for each person. A sheik and his wife appeared to have credit limits of $1 million—each. Another name had a limit of $5 million.
There was something strange about the data, Force thought. It was not structured in a way which suggested the Citibank machine was merely transmitting data to another machine. It looked more like a text file which was being dumped from a computer to a line printer.
Force sat back and considered his exquisite discovery. He decided this was something he would share only with a very few close, trusted friends from The Realm. He would tell Phoenix and perhaps one other member, but no-one else.
As he looked through the data once more, Force began to feel a little anxious. Citibank was a huge financial institution, dependent on the complete confidence of its customers. The corporation would lose a lot of face if news of Force’s discovery got out. It might care enough to really come after him. Then, with the sudden clarity of the lightning strike photo which hung on his wall, a single thought filled his mind.
I am playing with fire.
`Where did you get those numbers?’ Par asked Force next time they were both on Altos.
Force hedged. Par leaped forward.
`I checked those numbers for you. They’re valid,’ he told Force. The American was more than intrigued. He wanted that network address. It was lust. Next stop, mystery machine. `So, what’s the address?’
That was the one question Force didn’t want to hear. He and Par had a good relationship, sharing information comfortably if occasionally. But that relationship only went so far. For all he knew, Par might have a less than desirable use for the information. Force didn’t know if Par carded, but he felt sure Par had friends who might be into it. So Force refused to tell Par where to find the mystery machine.
Par wasn’t going to give up all that easily. Not that he would use the cards for free cash, but, hey, the mystery machine seemed like a very cool place to check out. There would be no peace for Force until Par got what he wanted. Nothing is so tempting to a hacker as the faintest whiff of information about a system he wants, and Par hounded Force until the Australian hacker relented just a bit.
Finally Force told Par roughly where DEFCON had been scanning for addresses when it stumbled upon the CitiSaudi machine. Force wasn’t handing over the street address, just the name of the suburb. DEFCON had been accessing the Citibank network through Telenet, a large American data network using X.25 communications protocols. The sub-prefixes for the Citibank portion of the network were 223 and 224.
Par pestered Force some more for the rest of the numbers, but the Australian had dug his heels in. Force was too careful a player, too fastidious a hacker, to allow himself to get mixed up in the things Par might get up to.
OK, thought the seventeen-year-old Par, I can do this without you. Par estimated there were 20000 possible addresses on that network, any one of which might be the home of the mystery machine. But he assumed the machine would be in the low end of the network, since the lower numbers were usually used first and the higher numbers were generally saved for other, special network functions. His assumptions narrowed the likely search field to about 2000 possible addresses.
Par began hand-scanning on the Citibank Global Telecommunications Network (GTN) looking for the mystery machine. Using his knowledge of the X.25 network, he picked a number to start with. He typed 22301, 22302, 22303. On and on, heading toward 22310000. Hour after hour, slowly, laboriously, working his way through all the options, Par scanned out a piece, or a range, within the network. When he got bored with the 223 prefix, he tried out the 224 one for a bit of variety.
Bleary-eyed and exhausted after a long night at the computer, Par felt like calling it quits. The sun had splashed through the windows of his Salinas, California, apartment hours ago. His living room was a mess, with empty, upturned beer cans circling his Apple IIe. Par gave up for a while, caught some shut-eye. He had gone through the entire list of possible addresses, knocking at all the doors, and nothing had happened. But over the next few days he returned to scanning the network again. He decided to be more methodical about it and do the whole thing from scratch a second time.
He was part way through the second scan when it happened. Par’s computer connected to something. He sat up and peered toward the screen. What was going on? He checked the address. He was sure he had tried this one before and nothing had answered. Things were definitely getting strange. He stared at his computer.
The screen was blank, with the cursor blinking silently at the top. Now what? What had Force done to get the computer to sing its song?
Par tried pressing the control key and a few different letters. Nothing. Maybe this wasn’t the right address after all. He disconnected from the machine and carefully wrote down the address, determined to try it again later.
On his third attempt, he connected again but found the same irritating blank screen. This time he went through the entire alphabet with the control key.
Control L.
That was the magic keystroke. The one that made CitiSaudi give up its mysterious cache. The one that gave Par an adrenalin rush, along with thousands and thousands of cards. Instant cash, flooding his screen. He turned on the screen capture so he could collect all the information flowing past and analyse it later. Par had to keep feeding his little Apple IIe more disks to store all the data coming in through his 1200 baud modem.
It was magnificent. Par savoured the moment, thinking about how much he was going to enjoy telling Force. It was going to be sweet. Hey, Aussie, you aren’t the only show in town. See ya in Citibank.
An hour or so later, when the CitiSaudi data dump had finally finished, Par was stunned at what he found in his capture. These weren’t just any old cards. These were debit cards, and they were held by very rich Arabs. These people just plopped a few million in a bank account and linked a small, rectangular piece of plastic to that account. Every charge came directly out of the bank balance. One guy listed in the data dump bought a $330,000 Mercedes Benz in Istanbul—on his card. Par couldn’t imagine being able to throw down a bit of plastic for that. Taking that plastic out for a spin around the block would bring a whole new meaning to the expression, `Charge it!’
When someone wins the lottery, they often feel
Comments (0)