taylor@hplabsc.UUCP (Dave Taylor) (11/10/86)
This article is from SHAWN <SIM1%VAXTS%rca.com@csnet-relay.ARPA>
and was received on Sat Nov 8 20:49:38 1986
This is an article that I found. Read it and weep. Is this what our
technology has come to?
The Night of the Hackers
________________________
. As you are surveying the dark and misty swamp you come across what
appears to be a small cave. You light a torch and enter. You
have walked several hundred feet when you stumble into a bright
blue portal. . . With a sudden burst of light and a loud
explosion you are swept into . . . DRAGONFIRE . . .
. You have programmed your personal computer to dial into Dragonfire,
a computer bulletin board in Gainesville, Texas. But before you
get any information, Dragonfire demands your name, home city and
phone number. So, for tonight's tour of the electronic wilderness
you become Montana Wildhack of San Francisco.
. Dragonfire, Sherwood Forest (sic), Forbidden Zone, Blottoland,
Plovernet, The Vault, Shadowland, PHBI and scores of other computer
bulletin boards are hangouts of a new generation of vandals. These
precocious teenagers use their electronic skills to play hide-and-
seek with computer and telephone security forces. Many computer
bulletin boards are perfectly legitimate: they resemble electronic
versions of the familiar cork boards in supermarkets and school
corridors, listing services and providing information someone out
there is bound to find useful. But this is a walk on the wild side,
a trip into the world of underground bulletin boards dedicated to
encouraging -- and making -- mischief.
. The phone number for these boards are as closely guarded as a
psychiatrist's home telephone number. Some numbers are posted on
underground boards; others are exchanged over the telephone. A
friendly hacker provided Dragonfire's number. Hook up and you see
a broad choice of topics offered. For Phone Phreaks -- who delight
in stealing service from AT&T and other phone networks .
Phreakenstein's Lair is a potpourri of phone numbers, access codes
and technical information. For computer hackers -- who dial into
other people's computers -- Ranger's Lodge is chock-full of phone
numbers and passwords for government, university and corporate
computers. Moving through Dragonfire's offerings, you can only
marvel at how conversant these teen-agers are with the technical
esoterica of today's electronic age. Obviously they have spent a
great deal of time studying computers, though their grammar and
spelling indicate they haven't been diligent in other subjects.
You are constantly reminded of how young they are.
. "Well it's that time of year again. School is back in session
so let's get those high school computer phone numbers rolling in.
Time to get straight A's, have perfect attendance (except when
you've been up all night hacking school passwords), and messing up
you worst teacher's paycheck."
. Forbidden Zone, in Detroit, is offering ammunition for hacker
civil war -- tips on crashing the most popular bulletin-board
software. There also are plans for building black, red and blue
boxes to mimic operator tones and get free phone service. And here
are the details for "the safest and best way to make and use
nitroglycerine," compliments of Doctor Hex, who says he got it
"from my chemistry teacher."
. Flip through the "pages." You have to wonder if this
information is accurate. Can this really be the phone number and
password for Taco Bell's computer? Do these kids really have the
dial-up numbers for dozens of university computers? The temptation
is too much. You sign off and have your computer dial the number
for the Yale computer. Bingo -- the words Yale University appear
on your screen. You enter the password. A menu appears. You hang
up in a sweat. You are now a hacker.
. Punch in another number and your modem zips off the touch
tones. Here comes the tedious side of all of this. Bulletin boards
are popular. No vacancy in Bates Motel (named for Anthony Perkin's
creepy motel in the movie "Psycho"); the line is busy. So are 221
B. Baker Street, PHBI, Shadowland and The Vault, Caesar's Palace
rings and connects. This is different breed of board. Caesar's
Palace is a combination Phreak board and computer store in Miami.
This is the place to learn ways to mess up a department store's
anti-shoplifting system, or make free calls on telephones with
locks on the dial. Pure capitalism accompanies such anarchy,
Caesar's Palace is offering good deals on disc drives, software,
computers and all sorts of hardware. Orders are placed through
electronic mail messages.
. 'Tele-Trial': Bored by Caesar's Palace, you enter the number
for Blottoland, the board operated by one of the nation's most
notorious computer phreaks -- King Blotto. This one has been busy
all night, but it's now pretty late in Cleveland. The phone rings
and you connect. To get past the blank screen, type the secondary
password "S-L-I-M-E." King Blotto obliges, listing his rules: he
must have your real name, phone number, address, occupation and
interests. He will call and disclose the primary password, "if you
belong on this board." If admitted, do not reveal the phone number
or the secondary password, lest you face "tele-trial," the King
warns as he dismisses you by hanging up. You expected heavy
security, but this teenager's security is, as they say, awesome.
Computers at the Defense Department and hundreds of businesses let
you know when you've reached them. Here you need a password just
to find out what system answered the phone. Then King Blotto asks
questions -- and hangs up. Professional computer-security experts
could learn something from this kid. He knows that ever since the
414 computer hackers were arrested in August 1982, law-enforcement
officers have been searching for leads on computer bulletin
boards.
. "Do you have any ties to or connections with any law
enforcement agency or any agency which would inform such a law
enforcement agency of this bulletin board?"
. Such is the welcoming message from Plovernet, a Florida board
known for its great hacker/phreak files. There amid a string of
valid VISA and MasterCard numbers are dozens of computer phone
numbers and passwords. Here you also learn what Blotto means by
tele-trial. "As some of you may or may not know, a session of the
conference court was held and the Wizard was found guilty of some
miscellaneous charges, and sentenced to four months without
bulletin boards." If Wizard calls, system operators like King
Blotto disconnect him. Paging through bulletin boards is a test of
your patience. Each board has different commands. Few are easy to
follow, leaving you to hunt and peck your way around. So far you
haven't had the nerve to type "C," which summons the system
operator for a live, computer-to-computer conversation. The time,
however, however has come for you to ask a few questions of the
"sysop." You dial a computer in Boston. It answers and you begin
working your way throughout the menus. You scan a handful of dial-
up numbers, including one for Arpanet, the Defense Department's
research computer. Bravely tap C and in seconds the screen blanks
and your cursor dances across the screen.
. Hello . . . What kind of computer do you have?
. Contact. The sysop is here. You exchange amenities and get
"talking." How much hacking does he do? Not much, too busy. Is he
afraid of being busted, having his computer confiscated like the
Los Angeles man facing criminal changes because his computer
bulletin board contained a stolen telephone-credit-card number?
"Hmmmm . . . No," he replies. Finally, he asks the dreaded
question: "How old are you?" "How old are YOU," you reply,
stalling. "15," he types. Once you confess and he knows you're
old enough to be his father, the conversation gets very serious.
You fear each new question; he probably thinks you're a cop. But
all he wants to know is your choice for president. The chat
continues, until he asks, "What time is it there?" Just past
midnight, you reply. Expletive. "it's 3:08 here," Sysop types. "I
must be going to sleep. I've got school tomorrow." The cursor
dances "*********** Thank you for Calling." The screen goes blank.
Epilog:
. A few weeks after this reporter submitted this article to
Newsweek, he found that his credit had been altered, his drivers'
licence revoked, and EVEN HIS Social Security records changed!
Just in case you all might like to construe this as a 'Victimless'
crime. The next time a computer fouls up your billing on some
matter, and COSTS YOU, think about it!
_______________________________
. This the follow-up to the previous article concerning the
Newsweek reporter. It spells out SOME of the REAL dangers to ALL
of us, due to this type of activity!
_______________________________
The REVENGE of the Hackers
_______________________________
. In the mischievous fraternity of computer hackers, few things
are prized more than the veil of secrecy. As NEWSWEEK San
Francisco correspondent Richard Sandza found out after writing a
story on the electronic underground's (DISPATCHES, Nov. 12, 198\
ability to exact revenge can be unnerving. Also severe....
Sandza's report:
. "Conference!" someone yelled as I put the phone to my ear.
Then came a mind-piercing "beep," and suddenly my kitchen seemed
full of hyperactive 15-year-olds. "You the guy who wrote the
article in NEWSWEEK?" someone shouted from the depths of static,
and giggles. "We're going disconnect your phone," one shrieked.
"We're going to blow up your house," called another. I hung up.
. Some irate readers write letters to the editor. A few call
their lawyers. Hackers, however, use the computer and the
telephone, and for more than simple comment. Within days, computer
"bulletin boards" around the country were lit up with attacks on
NEWSWEEK's "Montana Wildhack" (a name I took from a Kurt Vonnegut
character), questioning everything from my manhood to my prose
style. "Until we get real good revenge," said one message from
Unknown Warrior, "I would like to suggest that everyone with an
auto-l modem call Montana Butthack then hang up when he answers."
Since then the hackers of America have called my home at least
2000 times. My harshest critics communicate on Dragonfire, a
Gainesville, Texas, bulletin board where I am on teletrial, a
video-lynching in which a computer user with grievance dials the
board and presses charges against the offending party. Other
hackers -- including the defendant --post concurrences or
rebuttals. Despite the mealtime interruptions, all this was at
most a minor nuisance; some was amusing, even fun.
. FRAUD: The fun stopped with a call from a man who identified
himself only as Joe. "I'm calling to warn you," he said. When I
barked back, he said, "Wait, I'm on your side. Someone has broken
into TRW and obtained a list of all your credit-card numbers, your
home address, social-security number and wife's name and is
posting it on bulletin boards around the country." He named the
charge cards in my wallet.
. Credit-card numbers are a very hot commodity among some
hackers. To get one from a computer system and post it is the
hacker equivalent of making the team. After hearing from Joe I
visited the local office of the TRW credit bureau and got a copy
of my credit record. Sure enough, it showed a Nov. 13 inquiry by
the Lenox (Mass.) Savings Bank, an institution with no reason
whatever to ask about me. Clearly some hacker had used Lenox's
password to the TRW computers to get to my files (the bank has
since changed the password).
. It wasn't long before I found out what was being done with my
credit-card numbers, thanks to another friendly hacker who tipped
me to Pirate 80, a bulletin board in Charleston, W.Va., where I
found this: "I'm sure you guys have heard about Richard Stza or
Montana Wildhack. He's the guy who wrote the obscene story about
phreaking in NewsWeek Well, my friend did a credit card check on
TRW . . . try this number, it' a VISA . . . Please nail this guy
bad . . . Captain Quieg.
. Captain Quieg may himself be nailed. He has violated the
Credit Card Fraud Act of 1984 signed by President Reagan on Oct.
12. The law provides a $10,000 fine and up to a 15-year prison
term for "trafficking" in illegally obtained credit-card account
numbers. He "friend" has committed a felony violation of the
California computer-crime law. TRW spokeswoman Delia Fernandex
said that TRW would "be more than happy to prosecute" both of
them.
. TRW has good reason for concern. Its computers contain the
credit histories of 120 million people. Last year TRW sold 50
million credit reports on their customers. But these highly
confidential personal records are so poorly guarded that
computerized teenagers can ransack the files and depart
undetected. TRW passwords -- unlike many others -- often print out
when entered by TRW's customers. Hackers then look for discarded
printouts. A good source: the trash of banks and automobile
dealerships, which routinely do credit checks. "Everybody hacks
TRW," says Cleveland hacker King Blotto, whose bulletin board has
security system the Pentagon would envy. "It's the easiest." For
her her part, Fernandez insists that TRW "does everything it can
to keep the system secure
. In my case, however, that was not enough. My credit limits
would hardly support big-time fraud, but victimization takes many
forms. Another hacker said it was likely that merchandise would be
ordered in my name and shipped to me -- just to harass me. I used
to use credit-card numbers against someone I didn't like," the
hacker said. "I'd call Sears and have a dozen toilets shipped to
his house."
. Meanwhile, back on Dragonfire, my teletrial was going strong.
The charges, as pressed my Unknown Warrior, include "endangering
all phreaks and hacks." The judge in this case is a hacker with
the apt name of Ax Murderer. Possible sentences range from exile
from the entire planet" to "kill the dude." King Blotto has taken
up my defense, using hacker power to make his first pleading: he
dialed up Dragonfire, broke into its operating system and
"crashed" the bulletin board, destroying all of its messages
naming me. The board is back up now, with a retrial in full swing.
But then, exile from the electronic underground looks better all
the time.
taylor@hplabsc.UUCP (Dave Taylor) (11/15/86)
This article is from tektronix!videovax.TEK.COM!stever (Steven E. Rice, P.E.) and was received on Thu Nov 13 17:18:05 1986 Recently Shawn posted a commentary on teenage hackers: > This is an article that I found. Read it and weep. Is this what our > technology has come to? > > The Night of the Hackers > ________________________ [ article about teenage hackers ] Many years ago, teenagers did similar things. Of course, technology being much more limited, they had to stick to such things as moving outhouses back a few feet (consider what might happen if you went to the outhouse in the dark, only to find it was a few feet back of the hole. . .), taking gates off, putting buggies on top of barns, and so forth. However, though teenagers did such things, they had no societal approval for their actions. If caught, they were in trouble at home and in their community! Today, our society has given tacit approval to destructive activities in a number of ways. The present attitude of contempt toward the 55 MPH speed limit is one example. Another example is the widespread apathy about use of drugs. Until recently, illegal drugs (marijuana, cocaine, etc.) were generally viewed as "harmless." While the recent anti-drug campaign may be slowly changing this view, it is still widely held. One of the most significant means of giving approval to destructive activities is the willingness of parents to side with their children, no matter what they have done. With the aid of the American Civil Liberties Union (ACLU) and others, discipline in public schools has been gutted and the juvenile justice system has been severely handicapped. In sum, there has been no basic change in the nature of teenagers. Nor should our technology be blamed for the problems we are experiencing. The citizens of this great Republic must reverse their present course by demanding responsible actions and insisting on accountability for irresponsible actions -- not just for teenagers, but for all! Steve Rice ---------------------------------------------------------------------------- {decvax | hplabs | ihnp4 | uw-beaver}!tektronix!videovax!stever
taylor@hplabsc.UUCP (Dave Taylor) (11/20/86)
This article is from seismo!isis!aburt (Andrew Burt) and was received on Thu Nov 20 07:48:14 1986 >> The Night of the Hackers >That these parents have provided entertaining, powerful toys for their >children does not relieve them of their responsibilities to guide the >children in the civil use of those toys. This sounds terrific, but a root of the problem is in parental apathy. Too many couples in the past have borne and "raised" children without either (a) knowing exactly how to do it or (b) simply caring how to do it. The typical human being is rather lazy. We tend only to do what we have to do; with parenting there is no set standard of what "must" be done (as far as what responsibilties and ethics to instill into the children). Plus the fact that children gain their basic attitudes during the first six (or so) years of life by observation means parents can't really have philosophical discussions with their kids (should they even want to; if they don't care they won't even bother). Behind most "messed up" kids I suspect you'll find parents who don't care or otherwise are poor parents. As far as hacking being seen as ok, I would surmise the kids justify it as mostly harmless. From the standpoint of physical well-being, hackers do no real harm to people or property (you could make a point that the mental distress can lead to physical distress, but that thought probably doesn't cross these kids' minds either often or persuasively). As toddlers most of us no doubt were exposed to our parents "little white lies" and other acts that are also "mostly harmless". We grow up believe such acts are "ok". Thus the extension to the harmlessness of hacking is fairly easy. A second factor to consider is adult computer literacy. In a country where just plain literacy isn't what it ought to be, expecting parents to watch what their children do with the computers is totally unrealistic. Even if they do watch, they still have to *understand*. Most adults wouldn't know where to begin when looking for something out-of-place on their kids' screens. >I believe the parents of these persons should be held financially responsible >for any and all losses or inconveniences suffered by the victims. Nice, but idealistic. If Joey Hacker accidentally crashes a Wall Street computer and somehow causes a $10,000,000 loss (let's not argue how, just suppose), it is not very reasonable to ask his father the janitor to cough up $1,000,000 a year for the next 10 years (plus interest)... Regarding the comment that parents always support their children, of course they will. If the kid is a major troublemaker, chances are it's because of his poor parents. Now, the parents don't want to admit this, so instead of agreeing the kid should take his medicine and maybe that will straighten him out, they side with him. Defending their children makes them feel like they're being good parents. -- Andrew Burt isis!aburt / aburt@isis.cs.du.edu