mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
179 lines
11 KiB
Text
179 lines
11 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 25, File 8 of 11
|
|
|
|
/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\
|
|
\*/ \*/
|
|
/*\ Hacking: What's Legal And What's Not /*\
|
|
\*/ Written by Xandor SymmLeo Xet \*/
|
|
/*\ With Technical Assistance From The ICH /*\
|
|
\*/ \*/
|
|
/*\ Reviewed by HATCHET MOLLY (TK0GRM1@NIU.BITNET) /*\
|
|
\*/ Exclusively for Phrack Inc. \*/
|
|
/*\ /*\
|
|
\*/ March 8, 1989 \*/
|
|
/*\ /*\
|
|
\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/
|
|
|
|
|
|
"Hacking: What's Legal And What's Not" was originally published in 1987 by
|
|
"HackTel Communications" of Crosby, Texas. Reportedly the book is no longer
|
|
being published as the author, Xandor SymmLeo Xet, has joined the United States
|
|
Army. E. Arthur Brown of Minnesota has bought out the remaining stock and is
|
|
selling it for $12.95 (plus postage and handling) which is about half off it's
|
|
"cover price" of $25.00.
|
|
|
|
We've always been taught not to judge a book by its' cover, and I suppose that
|
|
one should not expect beautiful binding and great illustrations in
|
|
self-published books, especially those that deal with hacking and phreaking.
|
|
But I can't help comment on the sheer ugliness of this volume. To be fair, I
|
|
should preface these remarks by saying that E. Arthur Brown Company does
|
|
give fair warning about the packaging of this book in their advertisement.
|
|
|
|
The "book" consist of about 300 photocopied reproductions of non-NLQ dot matrix
|
|
pages. However, this does not mean you get three hundred pages of information
|
|
as about half of the pages are single sided copies. All in all I'd say it
|
|
could be reduced to about 200 pages if everything was copied back to back.
|
|
These pages come in a nice three ring binder, black in color, and it even has
|
|
the name of the book silk screened on the cover. (I can't resist mentioning
|
|
that the title of the book is improperly punctuated on the cover, though it is
|
|
correct inside the manuscript.)
|
|
|
|
Presumably the author(s) intended to release follow up reports and addendum to
|
|
the book at later dates (and at additional cost). So the three-ring binder
|
|
approach makes sense, and the author does explain that he has used single sided
|
|
copies in some places to allow for easy insertation of these "Hacker Reports."
|
|
So perhaps criticisms of the books packaging are a little unfair since it
|
|
appears these concessions were made with a purpose in mind. This does not,
|
|
however, change what you do indeed get when you order this book. All potential
|
|
buyers should be aware of what they are getting for their money.
|
|
|
|
Enough of what the book looks like, let's examine what it has to offer.
|
|
Generally speaking, it is a cross between a "how to" and a legal reference
|
|
guide. Much of the book is dedicated to state and federal laws that deal with
|
|
hacking, phreaking, and pirating. You'll find reprints of the state computer
|
|
crime laws for every state of the union, (current at the time the book was
|
|
written) and the Federal wire fraud and copyright laws. It does not include
|
|
the Federal Electronic Communication Privacy Act (ECPA) perhaps because act was
|
|
not passed at the time the book was compiled. The sections on state laws
|
|
appear complete enough, and the full source and appropriate references are
|
|
given if you want to check them for accuracy or changes. Thoughtfully, the
|
|
author has even included the associated penalties each statute carries. And
|
|
for those of you who aren't quite up on your Latin, there is even a (very)
|
|
short legal glossary so you can better understand the language of the law.
|
|
|
|
The crime laws make up the bulk of the book. They are probably the most useful
|
|
section despite the fact that the information is at least three years old by
|
|
now. The rest of the book is dedicated to various topics that are mundane to
|
|
anyone that is an active practitioner of phreaking and/or hacking. Topics like
|
|
"what is a network" and "how does a war dialer work" really do little for the
|
|
accomplished hacker, and the public can get the same information in the better
|
|
written book by Bill Landreth.
|
|
|
|
One point that interested me is that Xet adheres more to the "computer
|
|
professional" definition of "hacker" than he does to the definition used by
|
|
most of the underground. In other words, he maintains that people who gain
|
|
unauthorized access to systems are "crackers," not "hackers." He, like many
|
|
phreak/hackers, gets upset when the media uses the term incorrectly, but his
|
|
reasoning is a little different from most. Interestingly enough, despite an
|
|
entire chapter on software piracy, Xet does not realize that "cracker" already
|
|
refers to a specific type of activity and suggesting it as an alternative to
|
|
"hacker" only serves to further muddy the waters. To some this may be a minor
|
|
point, but the indiscriminate and apparently uninformed use of terms and labels
|
|
is ill advised in a book that aspires to be a useful reference manual.
|
|
|
|
By way of illustration, I've excerpted his definitions (actually, they should
|
|
properly be called "descriptions") of various terms from the glossary:
|
|
|
|
Hacker: A non-business computer user who operates a computer in
|
|
conjunction with a modem and who at least knows his (or her) way
|
|
around a local bulletin board and has at least heard of
|
|
CompuServe and The Source. Can usually be found eating pizza or
|
|
donuts, and has a working knowledge of the effects of long term
|
|
exposure to great amounts of caffeine either from drinking
|
|
several softdrinks (sic) or numerous cups of coffee.
|
|
|
|
Cracker: A hacker who has an adventurous streak which leads him into
|
|
unknown computer menus and strange protocols of all benign. He
|
|
has the ability to crack access codes or passwords in order to
|
|
illegally enter a computer over the telephone. Usually a very
|
|
good problem solver, quick to think, cautious to act. Often
|
|
thought of as clever or even sneaky. Excellent chess players.
|
|
|
|
Chrasher: A cracker gone bad. One who gets his jollies from terminating
|
|
corporate systems and picking on helpless bulletin boards by
|
|
destroying information or files or by rendering a system unable
|
|
to communicate (usually referred to as "crashing" the system)
|
|
until reset by a sysop. Very clever, extremely dangerous.
|
|
Smart, but hopelessly misdirected. They deserve respect for
|
|
their ability to destroy.
|
|
|
|
Pirate: Software pirate. A hacker who concentrates his efforts toward
|
|
cracking software copyright protection schemes which are placed
|
|
on computer disks to prevent the illegal copying of factory
|
|
produced programs. Some pirates have a habit of collecting
|
|
software that they have managed to crack either to trade with
|
|
other pirates for software they don't have yet or just to collect
|
|
it for the sake of building their egos. Some of my best friends
|
|
are pirates. Usually, very easy going people, and sometimes
|
|
politically minded as well. And even more clever than crackers
|
|
or crashers.
|
|
|
|
The problem with these definitions is that they are not mutually exclusive and
|
|
do little but reinforce the stereotypes that hackers, phreakers, and pirates
|
|
already face. Any phreak/hacker that reads this book will give these
|
|
definitions little attention, if they read them at all, but if this manual is
|
|
used by the media as an "example of hacker literature" it will only further
|
|
perpetuate some of these assumptions.
|
|
|
|
A large amount of the book is dedicated to what Xet calls The Gray Pages.
|
|
Labeled as a "national hackers' phone book" it is primarily a list of dialups
|
|
for Telenet, Tymnet, Compuserve, and The Source. This list is hardly "secret"
|
|
and the format hints that it may just be a capture of the "info" pages from
|
|
each of these networks. These numbers may be helpful to the beginner, but it
|
|
would have been better if he included instructions on how to dial the toll free
|
|
access number (or call customer service and just ask them) and check for your
|
|
local number by yourself. Not only would this have cut down on the number of
|
|
pages needed, but it would have at least given the beginner an excuse to
|
|
actually do something themselves. (Not to mention that is the best way to get
|
|
the most accurate information.)
|
|
|
|
The rest of "The Gray Pages" is taken up by a list of 400 public BBS systems.
|
|
Although the list is titled "hacker bulletin boards" many of the systems listed
|
|
are quite legitimate and do not support phreak/hack or pirate activities. Woe
|
|
to the beginner who calls CLAUG and starts asking for plans to a blue box. Of
|
|
course the biggest draw back to this list is that it was probably fifty percent
|
|
out of date four months after it was printed.
|
|
|
|
Speaking of blue box plans, Xet does offer a short list of box colors and what
|
|
they do. No plans for boxes are included, nor is there a discussion of DTMF
|
|
tones or other common phreak knowledge. He does include simple schematics and
|
|
operating instructions for a tap indicator, wire recorder, and a data converter
|
|
(for use with the wire recorder). The introduction to this section, called
|
|
"gray market equipment" says that future editions of the book will include box
|
|
schematics.
|
|
|
|
Finally, there is a short section called "helpful stuff" written by "The ICH."
|
|
This section is pretty informative but offers little clarifying information.
|
|
Basically it includes an ASCII table, DTMF frequencies, satellite and cellular
|
|
frequencies, and a short discussion of packet switching networks.
|
|
|
|
In summary, "Hacking: What's Legal And What's Not" offers some very basic
|
|
information to the beginning hacker, a quite good (although potentially
|
|
outdated) review of relevant state and federal computer crime laws, and a few
|
|
tid-bits here and there that are worth knowing. But it also wastes a lot of
|
|
space to bulletin boards and dialup numbers that are of little use to anyone.
|
|
Experienced phreak/hackers and pirates will find a few articles that are not
|
|
available elsewhere (like the section on "How Hackers Think" where Xet says
|
|
that since a San Diego BBS poll indicated that 79% of "hackers" had the
|
|
astrological sign of Leo all one has to do to understand hackers is read a
|
|
profile of Leo's!) but the vast majority of the information is old news in a
|
|
new format.
|
|
|
|
For someone who wants to get a broad overview of the computer underground I can
|
|
recommend this book. But if someone is looking for information of any real
|
|
use, I suggest you contact your local phreak/hack BBS and use the G-philes they
|
|
have available. You won't be missing anything this book has to offer. E.
|
|
Arthur Brown's price of $12.95 offers a reasonable value, and if your looking
|
|
to develop a "hacker library" you might consider ordering a copy.
|
|
_______________________________________________________________________________
|