[mod.comp-soc] Children & computers

taylor@hplabsc.UUCP (Dave Taylor) (11/10/86)

This article is from SHAWN <SIM1%VAXTS%rca.com@csnet-relay.ARPA>
 and was received on  Sat Nov  8 20:49:38 1986
 
This is an article that I found.  Read it and weep.  Is this what our
technology has come to?

                            The Night of the Hackers
                            ________________________

      . As you are surveying the dark and misty swamp you come across what 
        appears to be a small cave.  You light  a  torch  and  enter.  You 
        have  walked  several  hundred feet when you stumble into a bright 
        blue portal.  .  .  With a  sudden  burst  of  light  and  a  loud 
        explosion you are swept into . . . DRAGONFIRE . . .  

     .  You have programmed your personal computer to dial into Dragonfire, 
        a  computer  bulletin board in Gainesville,  Texas.  But before you 
        get any information, Dragonfire demands your name,  home  city  and 
        phone  number.  So, for tonight's tour of the electronic wilderness 
        you become Montana Wildhack of San Francisco.  

     .  Dragonfire,  Sherwood  Forest (sic),  Forbidden  Zone,  Blottoland,  
        Plovernet, The Vault, Shadowland, PHBI and scores of other computer 
        bulletin boards are hangouts of a new generation of vandals.  These 
        precocious teenagers use their  electronic skills to play hide-and-
        seek  with  computer  and telephone security forces.  Many computer  
        bulletin boards are perfectly legitimate: they resemble  electronic  
        versions  of  the  familiar  cork boards in supermarkets and school 
        corridors, listing services and providing information  someone  out 
        there is bound to find useful.  But this is a walk on the wild side,  
        a  trip into the world of underground bulletin boards dedicated  to  
        encouraging  --  and  making   -- mischief.  

     .  The phone number for these boards are as closely guarded as a
        psychiatrist's home telephone number.  Some numbers are posted  on 
        underground  boards;  others  are exchanged over the telephone.  A 
        friendly hacker provided Dragonfire's number.  Hook up and you see 
        a broad choice of topics offered. For Phone Phreaks -- who delight 
        in  stealing  service  from  AT&T  and  other  phone  networks   .  
        Phreakenstein's Lair is a potpourri of phone numbers, access codes 
        and  technical information.  For computer hackers -- who dial into 
        other people's computers -- Ranger's Lodge is chock-full of  phone 
        numbers  and  passwords  for government,  university and corporate 
        computers.  Moving through Dragonfire's offerings,  you  can  only 
        marvel  at  how conversant these teen-agers are with the technical 
        esoterica of today's electronic age.  Obviously they have spent  a 
        great  deal  of time studying computers,  though their grammar and 
        spelling indicate they haven't been diligent  in  other  subjects. 
        You are constantly reminded of how young they are.

     .  "Well it's that time of year again. School is back in session
        so  let's get those high school computer phone numbers rolling in. 
        Time to get straight A's,  have perfect  attendance  (except  when 
        you've been up all night hacking school passwords), and messing up 
        you worst teacher's paycheck." 

     .  Forbidden Zone, in Detroit, is offering ammunition for hacker
        civil war -- tips on  crashing  the  most  popular  bulletin-board 
        software.  There  also are plans for building black,  red and blue 
        boxes to mimic operator tones and get free phone service.  And here
        are  the  details for "the safest and best way to make and use 
        nitroglycerine," compliments of Doctor Hex, who says he got it 
        "from my chemistry teacher."

     .  Flip through the "pages." You have to wonder if this
        information  is accurate.  Can this really be the phone number and 
        password for Taco Bell's computer?  Do these kids really have  the 
        dial-up numbers for dozens of university computers? The temptation 
        is  too much.  You sign off and have your computer dial the number 
        for the Yale computer.  Bingo -- the words Yale University  appear 
        on your screen.  You enter the password.  A menu appears. You hang 
        up in a sweat. You are now a hacker.  

     .  Punch in another number and your modem zips off the touch
        tones. Here comes the tedious side of all of this. Bulletin boards 
        are popular. No vacancy in Bates Motel (named for Anthony Perkin's 
        creepy motel in the movie "Psycho"); the line is busy.  So are 221 
        B.  Baker Street, PHBI, Shadowland and The Vault,  Caesar's Palace 
        rings  and  connects.  This is different breed of board.  Caesar's 
        Palace is a combination Phreak board and computer store in  Miami.  
        This  is  the  place to learn ways to mess up a department store's 
        anti-shoplifting system,  or make free calls  on  telephones  with 
        locks  on  the  dial.  Pure  capitalism  accompanies such anarchy, 
        Caesar's Palace is offering good deals on disc  drives,  software, 
        computers  and  all  sorts of hardware.  Orders are placed through 
        electronic mail messages.  

     .  'Tele-Trial': Bored by Caesar's Palace, you enter the number
        for Blottoland,  the board operated by one of  the  nation's  most 
        notorious computer phreaks -- King Blotto.  This one has been busy 
        all night, but it's now pretty late in Cleveland.  The phone rings 
        and you connect.  To get past the blank screen, type the secondary 
        password "S-L-I-M-E." King Blotto obliges,  listing his rules:  he 
        must have your real name,  phone number,  address,  occupation and 
        interests. He will call and disclose the primary password, "if you 
        belong on this board." If admitted, do not reveal the phone number 
        or  the  secondary password,  lest you face "tele-trial," the King 
        warns as he dismisses  you  by  hanging  up.  You  expected  heavy 
        security,  but this teenager's security is,  as they say, awesome. 
        Computers at the Defense Department and hundreds of businesses let 
        you know when you've reached them.  Here you need a password  just 
        to find out what system answered the phone.  Then King Blotto asks 
        questions -- and hangs up.  Professional computer-security experts 
        could learn something from this kid.  He knows that ever since the 
        414 computer hackers were arrested in August 1982, law-enforcement 
        officers  have  been  searching  for  leads  on  computer bulletin 
        boards.  

     .  "Do you have any ties to or connections with any law
        enforcement  agency  or  any  agency which would inform such a law 
        enforcement agency of this bulletin board?" 

     .  Such is the welcoming message from Plovernet, a Florida board
        known  for  its great hacker/phreak files.  There amid a string of 
        valid VISA and MasterCard numbers are  dozens  of  computer  phone 
        numbers  and  passwords.  Here you also learn what Blotto means by 
        tele-trial.  "As some of you may or may not know, a session of the 
        conference  court was held and the Wizard was found guilty of some 
        miscellaneous  charges,  and  sentenced  to  four  months  without 
        bulletin  boards."  If  Wizard  calls,  system operators like King 
        Blotto disconnect him. Paging through bulletin boards is a test of 
        your patience. Each board has different commands.  Few are easy to 
        follow,  leaving you to hunt and peck your way around.  So far you 
        haven't had the nerve  to  type  "C,"  which  summons  the  system 
        operator for a live, computer-to-computer conversation.  The time, 
        however,  however  has  come for you to ask a few questions of the 
        "sysop." You dial a computer in Boston.  It answers and you  begin 
        working your way throughout the menus. You scan a handful of dial-
        up  numbers,  including one for Arpanet,  the Defense Department's 
        research computer.  Bravely tap C and in seconds the screen blanks 
        and your cursor dances across the screen.

     .  Hello . . . What kind of computer do you have?

     .  Contact. The sysop is here. You exchange amenities and get
        "talking." How much hacking does he do?  Not much, too busy. Is he 
        afraid of being busted,  having his computer confiscated like  the 
        Los  Angeles  man  facing  criminal  changes  because his computer 
        bulletin board contained a  stolen  telephone-credit-card  number?  
        "Hmmmm  .  .  .  No,"  he  replies.  Finally,  he asks the dreaded 
        question:  "How old are  you?"  "How  old  are  YOU,"  you  reply, 
        stalling.  "15,"  he  types.  Once you confess and he knows you're 
        old enough to be his father,  the conversation gets very  serious.  
        You fear each new question;  he probably thinks you're a cop.  But 
        all he wants to know  is  your  choice  for  president.  The  chat 
        continues,  until  he  asks,  "What  time  is it there?" Just past 
        midnight, you reply. Expletive. "it's 3:08 here," Sysop types.  "I 
        must be going to sleep.  I've got  school  tomorrow."  The  cursor 
        dances "*********** Thank you for Calling." The screen goes blank.  


                                    Epilog:

     .  A few weeks after this reporter submitted this article to
        Newsweek,  he found that his credit had been altered, his drivers' 
        licence revoked,  and EVEN HIS Social  Security  records  changed! 
        Just in case you all might like to construe this as a 'Victimless' 
        crime.  The  next  time  a  computer fouls up your billing on some 
        matter, and COSTS YOU, think about it!  
                        _______________________________

                            
     .  This the follow-up to the previous article concerning the
        Newsweek reporter.  It spells out SOME of the REAL dangers to  ALL 
                      of us, due to this type of activity!  

                             
                        _______________________________
                           The REVENGE of the Hackers
                        _______________________________

     .  In the mischievous fraternity of computer hackers, few things
        are  prized  more  than  the  veil  of  secrecy.  As  NEWSWEEK San 
        Francisco correspondent Richard Sandza found out after  writing  a 
        story on the electronic underground's (DISPATCHES,  Nov.  12, 198\ 
        ability  to  exact  revenge  can  be  unnerving.  Also  severe.... 
        Sandza's report: 

     .  "Conference!" someone yelled as I put the phone to my ear.
        Then came a mind-piercing "beep," and suddenly my  kitchen  seemed 
        full  of  hyperactive  15-year-olds.  "You  the  guy who wrote the 
        article in NEWSWEEK?" someone shouted from the depths  of  static, 
        and  giggles.  "We're  going disconnect your phone," one shrieked.  
        "We're going to blow up your house," called another. I hung up.  

     .  Some irate readers write letters to the editor. A few call
        their  lawyers.   Hackers,  however,  use  the  computer  and  the 
        telephone, and for more than simple comment. Within days, computer 
        "bulletin  boards"  around the country were lit up with attacks on 
        NEWSWEEK's "Montana Wildhack" (a name I took from a Kurt  Vonnegut 
        character),  questioning  everything  from  my manhood to my prose 
        style.  "Until we get real good revenge," said  one  message  from 
        Unknown  Warrior,  "I  would like to suggest that everyone with an 
        auto-l modem call Montana Butthack then hang up when he  answers." 
        Since  then  the  hackers  of America have called my home at least 
        2000 times.  My harshest  critics  communicate  on  Dragonfire,  a 
        Gainesville,  Texas,  bulletin  board  where I am on teletrial,  a 
        video-lynching in which a computer user with grievance  dials  the 
        board  and  presses  charges  against  the offending party.  Other 
        hackers  --  including  the  defendant  --post   concurrences   or 
        rebuttals.  Despite  the  mealtime interruptions,  all this was at 
        most a minor nuisance; some was amusing, even fun.  

     .  FRAUD: The fun stopped with a call from a man who identified
        himself only as Joe.  "I'm calling to warn you," he said.  When  I 
        barked back, he said, "Wait, I'm on your side.  Someone has broken 
        into TRW and obtained a list of all your credit-card numbers, your 
        home address,  social-security  number  and  wife's  name  and  is 
        posting  it  on  bulletin boards around the country." He named the 
        charge cards in my wallet.  

     .  Credit-card numbers are a very hot commodity among some
        hackers.  To get one from a computer system and  post  it  is  the 
        hacker  equivalent  of  making the team.  After hearing from Joe I 
        visited the local office of the TRW credit bureau and got  a  copy 
        of my credit record.  Sure enough, it showed a Nov.  13 inquiry by 
        the Lenox (Mass.) Savings Bank,  an  institution  with  no  reason 
        whatever  to  ask  about me.  Clearly some hacker had used Lenox's 
        password to the TRW computers to get to my  files  (the  bank  has 
        since changed the password).  

     .  It wasn't long before I found out what was being done with my
        credit-card numbers,  thanks to another friendly hacker who tipped 
        me to Pirate 80,  a bulletin board in Charleston,  W.Va.,  where I 
        found  this:  "I'm  sure you guys have heard about Richard Stza or 
        Montana Wildhack.  He's the guy who wrote the obscene story  about 
        phreaking  in NewsWeek Well,  my friend did a credit card check on 
        TRW . . . try this number, it' a VISA . .  .  Please nail this guy 
        bad . . . Captain Quieg.  

     .  Captain Quieg may himself be nailed. He has violated the
        Credit  Card  Fraud Act of 1984 signed by President Reagan on Oct.  
        12.  The law provides a $10,000 fine and up to  a  15-year  prison 
        term  for  "trafficking" in illegally obtained credit-card account 
        numbers.  He "friend" has committed  a  felony  violation  of  the 
        California  computer-crime  law.  TRW  spokeswoman Delia Fernandex 
        said that TRW would "be more than  happy  to  prosecute"  both  of 
        them.  

     .  TRW has good reason for concern. Its computers contain the
        credit  histories  of  120  million people.  Last year TRW sold 50 
        million credit  reports  on  their  customers.  But  these  highly 
        confidential   personal   records   are  so  poorly  guarded  that 
        computerized  teenagers  can  ransack   the   files   and   depart 
        undetected. TRW passwords -- unlike many others -- often print out 
        when  entered by TRW's customers.  Hackers then look for discarded 
        printouts.  A good source:  the  trash  of  banks  and  automobile 
        dealerships,  which  routinely do credit checks.  "Everybody hacks 
        TRW," says Cleveland hacker King Blotto,  whose bulletin board has 
        security  system the Pentagon would envy.  "It's the easiest." For 
        her her part,  Fernandez insists that TRW "does everything it  can 
        to keep the system secure 

     .  In my case, however, that was not enough. My credit limits
        would hardly support big-time fraud,  but victimization takes many 
        forms. Another hacker said it was likely that merchandise would be 
        ordered in my name and shipped to me -- just to harass me.  I used 
        to  use  credit-card  numbers  against someone I didn't like," the 
        hacker said.  "I'd call Sears and have a dozen toilets shipped  to 
        his house." 

     .  Meanwhile, back on Dragonfire, my teletrial was going strong.
        The charges,  as pressed my Unknown Warrior,  include "endangering 
        all phreaks and hacks." The judge in this case is  a  hacker  with 
        the  apt name of Ax Murderer.  Possible sentences range from exile 
        from the entire planet" to "kill the dude." King Blotto has  taken 
        up my defense,  using hacker power to make his first pleading:  he 
        dialed  up  Dragonfire,   broke  into  its  operating  system  and 
        "crashed"  the  bulletin  board,  destroying  all  of its messages 
        naming me. The board is back up now, with a retrial in full swing. 
        But then,  exile from the electronic underground looks better  all 
        the time.  
      

taylor@hplabsc.UUCP (Dave Taylor) (11/15/86)

This article is from tektronix!videovax.TEK.COM!stever (Steven E. Rice, P.E.)
 and was received on  Thu Nov 13 17:18:05 1986
 

Recently Shawn posted a commentary on teenage hackers:

> This is an article that I found.  Read it and weep.  Is this what our
> technology has come to?
> 
>                             The Night of the Hackers
>                             ________________________

[ article about teenage hackers ]

Many years ago, teenagers did similar things.  Of course, technology
being much more limited, they had to stick to such things as moving
outhouses back a few feet (consider what might happen if you went to
the outhouse in the dark, only to find it was a few feet back of the
hole. . .), taking gates off, putting buggies on top of barns, and
so forth.  However, though teenagers did such things, they had no
societal approval for their actions.  If caught, they were in trouble
at home and in their community!

Today, our society has given tacit approval to destructive activities
in a number of ways.  The present attitude of contempt toward the 55 MPH
speed limit is one example.  Another example is the widespread apathy
about use of drugs.  Until recently, illegal drugs (marijuana, cocaine,
etc.) were generally viewed as "harmless."  While the recent anti-drug
campaign may be slowly changing this view, it is still widely held.

One of the most significant means of giving approval to destructive
activities is the willingness of parents to side with their children, no
matter what they have done.  With the aid of the American Civil Liberties
Union (ACLU) and others, discipline in public schools has been gutted and
the juvenile justice system has been severely handicapped.

In sum, there has been no basic change in the nature of teenagers.  Nor
should our technology be blamed for the problems we are experiencing.
The citizens of this great Republic must reverse their present course
by demanding responsible actions and insisting on accountability for
irresponsible actions -- not just for teenagers, but for all!

					Steve Rice

----------------------------------------------------------------------------
{decvax | hplabs | ihnp4 | uw-beaver}!tektronix!videovax!stever

taylor@hplabsc.UUCP (Dave Taylor) (11/20/86)

This article is from seismo!isis!aburt (Andrew Burt)
 and was received on  Thu Nov 20 07:48:14 1986
 

>>                             The Night of the Hackers

>That these parents have provided entertaining, powerful toys for their 
>children does not relieve them of their responsibilities to guide the 
>children in the civil use of those toys.

This sounds terrific, but a root of the problem is in parental apathy.  Too
many couples in the past have borne and "raised" children without either (a)
knowing exactly how to do it or (b) simply caring how to do it.  The typical
human being is rather lazy.  We tend only to do what we have to do; with
parenting there is no set standard of what "must" be done (as far as what
responsibilties and ethics to instill into the children).  Plus the fact that
children gain their basic attitudes during the first six (or so) years of
life by observation means parents can't really have philosophical discussions
with their kids (should they even want to; if they don't care they won't
even bother).  Behind most "messed up" kids I suspect you'll find parents
who don't care or otherwise are poor parents.

As far as hacking being seen as ok, I would surmise the kids justify it
as mostly harmless.  From the standpoint of physical well-being, hackers
do no real harm to people or property (you could make a point that the
mental distress can lead to physical distress, but that thought probably
doesn't cross these kids' minds either often or persuasively).  As
toddlers most of us no doubt were exposed to our parents "little white
lies" and other acts that are also "mostly harmless".  We grow up
believe such acts are "ok".  Thus the extension to the harmlessness of
hacking is fairly easy.

A second factor to consider is adult computer literacy.  In a country where
just plain literacy isn't what it ought to be, expecting parents to watch
what their children do with the computers is totally unrealistic.  Even if
they do watch, they still have to *understand*.  Most adults wouldn't know
where to begin when looking for something out-of-place on their kids' screens.

>I believe the parents of these persons should be held financially responsible 
>for any and all losses or inconveniences suffered by the victims.

Nice, but idealistic.  If Joey Hacker accidentally crashes a Wall Street
computer and somehow causes a $10,000,000 loss (let's not argue how, just
suppose), it is not very reasonable to ask his father the janitor to
cough up $1,000,000 a year for the next 10 years (plus interest)...

Regarding the comment that parents always support their children, of
course they will.  If the kid is a major troublemaker, chances are it's
because of his poor parents.  Now, the parents don't want to admit this,
so instead of agreeing the kid should take his medicine and maybe that
will straighten him out, they side with him.  Defending their children
makes them feel like they're being good parents.
-- 

Andrew Burt 				   isis!aburt / aburt@isis.cs.du.edu