mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1120 lines
49 KiB
Text
1120 lines
49 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Forty-One, File 2 of 13
|
|
|
|
[-=:< Phrack Loopback >:=-]
|
|
|
|
By Dispater & Mind Mage
|
|
|
|
Phrack Loopback is a forum for you, the reader, to ask questions, air
|
|
problems, and talk about what ever topic you would like to discuss. This is
|
|
also the place Phrack Staff will make suggestions to you by reviewing various
|
|
items of note; books, magazines, software, catalogs, hardware, etc.
|
|
|
|
In this issue:
|
|
|
|
Comments on Phrack 40 : Rop Gonggrijp
|
|
Fine Art of Telephony (re: Phrack 40) : Inhuman
|
|
Question & Comment (BT Tymnet/AS400) : Otto Synch
|
|
BT Tymnet article in Phrack 40 : Anonymous
|
|
Phrack fraud? : Doctor Pizz
|
|
Remarks & Warning! : Synaps/Clone1/Feyd
|
|
One Ron Hults (re: Phrack 38 Loopback) : Ken Martin
|
|
Hacking In Czecho-Slovakia : Stalker
|
|
Phrack 40 is Sexist! : Ground Zero
|
|
Phrack 40 is Sexist!? (PC Phrack) : Shit Kickin' Jim
|
|
Misunderstood Hackers Get No Respect : The Cruiser
|
|
Hackers Should Land In Jail, Not In Press : Alan Falk
|
|
Anonymous Usenet Posting? : Anonymous
|
|
Anonymous Mail Poster : Sir Hackalot
|
|
Phrack On The Move : Andy Panda-Bear
|
|
Computer Underground Publications Index : Amadeus
|
|
Pirates v. AT&T: Posters : Legacy Irreverent
|
|
Ultrix 4.2 Bug : Krynn
|
|
PumpCon Hosed : Phil "The Outlander"
|
|
2600 Meeting Disrupted by Law Enforcement : Emmanuel Goldstein
|
|
Two New Hardcovers : Alan J. Rothman
|
|
_______________________________________________________________________________
|
|
|
|
Letters to the Editors
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
From: rop@hacktic.nl (Rop Gonggrijp) (Editor of Hack-Tic Magazine)
|
|
Date: August 14, 1992
|
|
Subject: Comments on Phrack 40
|
|
|
|
My compliments! You've put out one of the best issues to date. If you keep
|
|
this up I'll have to get jealous!
|
|
|
|
Rop Gonggrijp (rop@hacktic.nl) Dangerous and capable of making
|
|
fax: +31 20 6900968 considerable trouble.
|
|
|
|
----------
|
|
|
|
From: Inhuman (Sysop of Pentavia BBS)
|
|
Date: August 18, 1992
|
|
Subject: Fine Art of Telephony
|
|
|
|
I just wanted to let you guys know that the article titled "The Fine Art of
|
|
Telephony" was one of the best articles I've seen in Phrack in a long time.
|
|
|
|
I hope to see more information on switching and general telephony in the
|
|
future.
|
|
|
|
Thanks,
|
|
|
|
Inhuman
|
|
|
|
----------
|
|
|
|
Date: October 22, 1992
|
|
From: Otto Synch
|
|
Subject: Question & Comment
|
|
|
|
Hello,
|
|
|
|
Reading your (huge) Phrack issue #40, and noticing that you were accepting
|
|
comments and questions, I decided to post mine. First of all, please forgive
|
|
the English. I'm French and can't help it :-)
|
|
|
|
My comment: When I saw in the index that this issue was dealing with BT
|
|
Tymnet, I felt very happy because I was looking for such information. And when
|
|
I read it, I felt really disappointed. Toucan Jones could have reduced his
|
|
whole article with the following lines:
|
|
|
|
-> Find any Tymnet number.
|
|
-> Dial and wait for the "Please log-in:" prompt.
|
|
-> Log as user "help", no password required.
|
|
-> Capture everything you want, it's free public information.
|
|
|
|
I must say I was a bit surprised to find this kind of article in a high-quality
|
|
magazine such as yours...
|
|
|
|
My question: I'm currently trying to find out everything about a neat AS/400
|
|
I've "found," but I never saw any "hack report" on it. Do you know if there
|
|
are any available?
|
|
|
|
OK - Let's see if you answer. We feel somewhat lonely here in the Old
|
|
Continent...but Phrack is here to keep the challenge up!
|
|
|
|
Regards,
|
|
|
|
> Otto Sync <
|
|
|
|
----------
|
|
|
|
From: Anonymous
|
|
Date: August 19, 1992
|
|
Subject: BT Tymnet article in Phrack 40
|
|
|
|
Dear Phrack Staff,
|
|
|
|
The BT Tymnet article in the 40th issue of Phrack was totally lame. I hate it
|
|
when people enter Telenet or Tymnet's information facility and just buffer all
|
|
the sh*t that's in there. Then they have the audacity to slap their name on
|
|
the data as if they had made a major network discovery. That's so f*ck*ng
|
|
lame!
|
|
|
|
Phrack should make a policy not to accept such lame sh*t for their fine
|
|
magazine. Is Phrack *that* desperate for articles? Crap like commercial dial-
|
|
up lists is about as lame as posting a few random pages from the front of the
|
|
white pages. The information is quickly outdated and easily available at any
|
|
time to anyone. You don't hack this sh*t.
|
|
|
|
Regards,
|
|
|
|
Anonymous (anonymous because I don't want to hear any lame flames)
|
|
|
|
[Editor's Response: We agree that buffering some dialup list is not hacking,
|
|
however, in this specific case, a decision was made that
|
|
not everyone had ready access to the information or even
|
|
knew of its existence. Furthermore and more relevant to
|
|
why the article appeared in Phrack, an article on Tymnet
|
|
was appropriate when considering the recent events with
|
|
the MOD case in New York.
|
|
|
|
In the future, you may ask that your letter be printed
|
|
anonymously, but don't send us anonymous mail.]
|
|
|
|
----------
|
|
|
|
From: Doctor Pizz
|
|
Date: October 12, 1992
|
|
Subject: Phrack fraud?
|
|
|
|
I recently received an ad from someone who was selling the full set of Phrack
|
|
back issues for $100.00. I do believe that this is a violation of your rights
|
|
to Phrack, as he is obviously selling your work for profit!
|
|
|
|
The address I received to order these disks was:
|
|
|
|
R.E. Jones
|
|
21067 Jones-Mill
|
|
Long Beach, MS 39560
|
|
|
|
It seems he is also selling the set of NIA files for $50, a set of "Hacking
|
|
Programs" for $40, LOD Tech Journals for $25, and lots of viruses. It sounds
|
|
like some sort of copyright violation, or fraud, as he is selling public domain
|
|
stuff for personal profit. At least you should be aware of this. Anyway, I
|
|
look forward to receiving future volumes of Phrack! Keep up the good work.
|
|
|
|
Good luck in stopping this guy!
|
|
|
|
Thank you,
|
|
|
|
--Doctor Pizz--
|
|
|
|
[Editor's Note: We look forward to hearing what our Phrack readers think about
|
|
people selling hardcopies of Phrack for their own personal
|
|
profit.]
|
|
|
|
----------
|
|
|
|
From: Synaps a/k/a Clone1 a/k/a Feyd
|
|
Date: September 2, 1992
|
|
Subject: Remarks & Warning!
|
|
|
|
Hi,
|
|
|
|
I've been a regular reader of Phrack for two years now and I approve fully the
|
|
way you continue Phrack. It's really a wonderful magazine and if I can help
|
|
its development in France, I'll do as much as I can! Anyway, this is not
|
|
really the goal of my letter and excuse me for my English, which isn't very
|
|
good.
|
|
|
|
My remarks are about the way you distribute Phrack. Sometimes, I don't receive
|
|
it fully. I know this is not your fault and I understand that (this net
|
|
sometimes has some problems!). But I think you could provide a mail server
|
|
like NETSERV where we could get back issues by mail and just by MAIL (no FTP).
|
|
|
|
Some people (a lot in France) don't have any access to international FTP and
|
|
there are no FTP sites in France which have ANY issues of Phrack. I did use
|
|
some LISTSERV mailers with the send/get facility. Could you install it on your
|
|
LISTSERV?
|
|
|
|
My warning is about a "group" (I should say a pseudo-group) founded by Jean
|
|
Bernard Condat and called CCCF. In fact, the JBC have spread his name through
|
|
the net to a lot of people in the Underground. As the Underground place in
|
|
France is weak (the D.S.T, anti-hacker staff is very active here and very
|
|
efficient), people tend to trust JBC. He seems (I said SEEMS) to have a good
|
|
knowledge in computing, looks kind, and has a lot of resources. The only
|
|
problem is that he makes some "sting" (as you called it some years ago)
|
|
operation and uses the information he spied to track hackers. He organized a
|
|
game last year which was "le prix du chaos" (the amount of chaos) where he
|
|
asked hackers to prove their capabilities.
|
|
|
|
It was not the real goal of this challenge. He used all the materials hackers
|
|
send him to harass some people and now he "plays" with the normal police and
|
|
the secret police (DST) and installs like a trade between himself and them.
|
|
It's really scary for the hacking scene in France because a lot of people trust
|
|
him (even the television which has no basis to prove if he is really a hacker
|
|
as he claims to be or if he is a hacker-tracker as he IS!). Journalists take
|
|
him as a serious source for he says he leads a group of computer enthusiasts.
|
|
|
|
But we discovered that his group doesn't exist. There is nobody in his group
|
|
except his brother and some other weird people (2 or 3) whereas he says there
|
|
is 73 people in his club/group. You should spread this warning to everybody in
|
|
the underground because we must show that "stings" are not only for USA! I
|
|
know he already has a database with a lot of information like addresses and
|
|
other stuff like that about hackers and then he "plays" with those hackers.
|
|
|
|
Be very careful with this guy. Too many trust him. Now it's time to be
|
|
"objective" about him and his group!
|
|
|
|
Thanks a lot and goodbye.
|
|
|
|
Synaps a/k/a Clone1 a/k/a Feyd
|
|
|
|
----------
|
|
|
|
From: Ken Martin <70712.760@compuserve.com>
|
|
Date: November 17, 1992
|
|
Subject: One Ron Hults...(Phrack 38 Loopback)
|
|
|
|
Dear Phrack Staff:
|
|
|
|
This letter is concerning the letter in the Phrack Loopback column (#38, April
|
|
20, 1992) written by one Ron Hults. It suggests that all children should be
|
|
disallowed access to a computer with a modem.
|
|
|
|
The news release to which it is attached attempts to put an idea in the
|
|
reader's mind that everything out there (on bulletin boards) is bad. Anyone
|
|
who can read messages from "satanic cultists, pedophile, and rapists" can also
|
|
read a typical disclaimer found on most bulletin boards which have adult
|
|
material and communication areas available to their users, and should be able
|
|
to tell the SysOp of a BBS how old he/she is.
|
|
|
|
A child who is intelligent enough to operate a computer and modem should also
|
|
be able to decide what is appropriate for him/her to read, and should have the
|
|
sense enough to avoid areas of the BBS that could lead to trouble, and not to
|
|
give their address and home phone number to the Charles Manson idols. (It is a
|
|
fact that all adolescents have thoughts about sex; nothing can change that.
|
|
The operator of a BBS also has the moral responsibility to keep little kids out
|
|
of the XXX-Rated GIF downloading area.)
|
|
|
|
One problem with that is BBSes run by the underground type (hack/phreak, these
|
|
usually consist of people from 15-30 years of age). The operators of these let
|
|
practically anyone into their system, from my experiences. These types of
|
|
BBSes often have credit card numbers, telephone calling card numbers, access
|
|
codes to credit reporting services, etc., usually along with text-file
|
|
documents about mischievous topics. Mr. Hults makes no mention of these in his
|
|
letter and press release. It is my belief that these types of systems are the
|
|
real problem. The kids are fascinated that, all of a sudden, they know how to
|
|
make explosives and can get lots of anything for free.
|
|
|
|
I believe that the parents of children should have the sense enough to watch
|
|
what they are doing. If they don't like the kind of information that they're
|
|
getting or the kind of messages that they're sending to other users, then that
|
|
is the time to restrict access to the modem.
|
|
|
|
I am fifteen years old, and I can say that I have gotten into more than my
|
|
share of trouble with the law as a result of information that I have obtained
|
|
from BBSes and public communications services like CompuServe. The computer is
|
|
a tool, and it always will be. Whether it is put to good use or not depends on
|
|
its user. I have put my computer/modem to use in positive applications more
|
|
than destructive ones.
|
|
|
|
I would like Mr. Hults to think about his little idea of banning children from
|
|
modem use, and to think about the impact it would have on their education.
|
|
Many schools use computers/modems in their science and English curriculums for
|
|
research purposes.
|
|
|
|
Banning children from telecommunications is like taking away connection to the
|
|
outside world and all forms of publication whatsoever when one takes a look
|
|
around a large information service like CompuServe or GEnie, and sees all of
|
|
the information that a service like this is capable of providing to this
|
|
nation.
|
|
|
|
Thanks,
|
|
|
|
Ken Martin (70712.760@compuserve.com)
|
|
a.k.a. Scorpion, The Omega Concern, Dr. Scott
|
|
|
|
----------
|
|
|
|
From: Stalker
|
|
Date: October 14, 1992
|
|
Subject: Hacking In Czecho-Slovakia
|
|
|
|
Hi there!
|
|
|
|
I'm student from Czecho-Slovakia (for some stupid person who doesn't know, it's
|
|
in middle Europe). Call me Stalker (if there is other guy with this name, call
|
|
me what you want). If you think that computers, networks, hacking and other
|
|
interesting things are not in Eastern Europe, you're WRONG. I won't talk
|
|
about politicians. They really make me (and other men from computers) sick!
|
|
I'll tell you what is interesting here right now.
|
|
|
|
Our university campus is based on two main systems, VMS and ULTRIX. There's
|
|
VAX 6000, VAX 4000, MicroVAX, VAXStation and some oldtimer machines which run
|
|
under VMS. As for hacking, there's nothing interesting. You can't do some
|
|
tricks with /etc/passwd, there's no main bug in utilities and commands. But,
|
|
as I know, VMS doesn't crypt the packets across the network so you can take
|
|
some PC and Netwatch (or any other useful software ) and try to see what
|
|
is interesting on the cable. You can grab anything that you want (usernames,
|
|
passwords, etc.).
|
|
|
|
Generally, students hate VMS and love UNIX-like systems. Other machines are
|
|
based on ULTRIX. We have DECstations (some 3100, some 5000) and one SM 52-12
|
|
which is something on VAX-11 :-(. It is a really slow machine, but it has
|
|
Internet access! There's many users so you can relatively easily run Crack
|
|
(excellent program) since passwd is not shadowed. Another useful thing is tftp
|
|
(see some other Crack issues). There was a machine with enabled tftp, but
|
|
after one incident, it was disabled.
|
|
|
|
I would like to tell you more about this incident but sysadmins are still
|
|
suspecting (they probably read my mail). Maybe after some months in other
|
|
articles. Now I can tell you that I'm not a real UNIX-GURU-HACKER, but the
|
|
sysadmins thought that I was. Someone (man or girl, who knows) has hacked one
|
|
(or two) machines on our campus. Administrators thought that I was this
|
|
mysterious hacker but I am not! He/she is much better than I and my friends.
|
|
Today no one knows who the hacker is. The administrator had talked to him/her
|
|
and after some weeks, gave him/her an account. He/she probably had root
|
|
privileges for some time and maybe has these today. He/she uses a modem to
|
|
connect. His/her login name is nemo (Jules Verne is a popular hero). I will
|
|
try to send mail to him/her about Phrack and maybe he/she will write
|
|
interesting articles about himself.
|
|
|
|
And some tips. Phrack is very interesting, but there's other interesting
|
|
official files on cert.org (192.88.209.9) available via anonymous FTP. This
|
|
is the Computer Emergency Response Team (CERT) FTP server. You can find
|
|
interesting information here about bugs in actual software, but you will see
|
|
only which command or utility has the bug, not how to exploit it. If you are
|
|
smart enough, there's nothing to say.
|
|
|
|
If you are not, you must read Phrack! :-)
|
|
|
|
Bye,
|
|
|
|
Stalker
|
|
|
|
----------
|
|
|
|
From: Ground Zero
|
|
Date: August 25, 1992
|
|
Subject: Phrack 40 is Sexist!
|
|
|
|
Hi, just a quick comment about Phrack's account of SummerCon:
|
|
|
|
I don't think your readers need to know or are really interested in hearing
|
|
about the fact that Doc Holiday was busy trying to pick up girls or that there
|
|
were some unbalanced teeny-boppers there offering themselves to some of the
|
|
SummerCon participants. Also, as a woman I don't care for your
|
|
characterizations of females in that file.
|
|
|
|
I'm not trying to nitpick or be politically correct (I hate PC), I'm just
|
|
writing because I felt strongly enough about it. Ciao.
|
|
|
|
Ground Zero (Editor of Activist Times, Inc./ATI)
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
From: Shit Kickin' Jim
|
|
Date: September 11, 1992
|
|
Subject: Phrack 40 is Sexist!? (PC Phrack)
|
|
|
|
Listen here woman. I don't know whut yer big fat butt thinks Phrack wuz tryin'
|
|
to insinuate. Lemme tell yew a thang er two. First of all, Phrack ain't run
|
|
by some little pip-squeek faggot ass pansies. Ah mean wut are you sum kinda
|
|
hOmOsexual? Here's what ah mean. NOW here iz a real story 'bout me and one a
|
|
my bestest friends: 4x4 Phreaker.
|
|
|
|
See 4x4 Phreaker come down to Texas fur a little hackin adventure. Even though
|
|
he lives up there in Yankee-land, 4x4 Phreaker iz a pretty good ol' boy.
|
|
Whuddya think real manly hackers do when they get together? Go stop by Radio
|
|
Shack and buy shrink wrap?
|
|
|
|
HELL NO! We fuckin' went to Caligula XXI. Fur yew ol' boys that ain't from
|
|
'round here er yer a fauygut out there that might be readin this, Caligula XXI
|
|
specializes in enertainmunt fer gennelmen.
|
|
|
|
Now, me and 4x4 Phreaker didn't go to hawk at some fat nasty sluts like you
|
|
might see at your typical Ho-Ho Con. We went with the purpose in mind of seein
|
|
a real movie star. Yup Christy Canyon was in the house that night. 4x4
|
|
Phreaker and me sat down at a table near the front. At that point I decided
|
|
that I'd start trollin for babes. Yep that's right I whipped out an American
|
|
Express Corporate Gold card. And I'll be damned if it weren't 3 minutes later
|
|
me and 4x4 Phreaker had us 2 new found friends for the evening.
|
|
|
|
So anywayz, yew can see we treated these two fine ladies real nice and they
|
|
returned the favor. We even took em to Waffle House the next mornin'. So I
|
|
dunno where yew git off by callin us sexist. Yer just some Yankee snob big
|
|
city high horse woman who expects to be a takin care of.
|
|
|
|
God bless George Bush and his mistress Jennifer whutz her name.
|
|
|
|
:Shit Kickin' Jim (Madder than a bramer bull fightin a mess of wet hornets)
|
|
|
|
_______________________________________________________________________________
|
|
|
|
Misunderstood Hackers Get No Respect August 10, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by The Cruiser (ComputerWorld)(Page 24)(Letters to the Editor)
|
|
|
|
I just read the replies to Chris Goggans' "Hackers aren't the real enemy"
|
|
[ComputerWorld, June 29], and I thought I'd address a few of the points brought
|
|
up. I'm a hacker -- which means that I'm every system administrator's
|
|
nightmare.
|
|
|
|
Hardly. Many hackers are politically aware activists. Besides being fueled by
|
|
an obsession for mastering technology (I call it a blatant disregard for such),
|
|
true hackers live and obey a strict moral code.
|
|
|
|
All this talk about the differences between voyeurism and crime: Please, let's
|
|
stop comparing information access to breaking into someone's house. The
|
|
government can seize computers and equipment from suspected hackers, never to
|
|
return it, without even charging a crime. I will not sit back and let Big
|
|
Brother control me.
|
|
|
|
The Cruiser
|
|
_______________________________________________________________________________
|
|
|
|
Hackers Should Land In Jail, Not In Press October 19, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Alan Falk (ComputerWorld)(Page 32)(Letters to the Editor)
|
|
|
|
The letters you get from avowed hackers seem to glorify the virtues of hacking.
|
|
I find this very disturbing for a simple reason: It completely ignores the
|
|
issue of private property.
|
|
|
|
The computer systems they hack into (pun intended) and the databases they try
|
|
to access, as well as the data in the databases, are private property.
|
|
|
|
An analogous argument might be that breaking and entering a jewelry store and
|
|
taking off with some valuables is really a way of testing the security controls
|
|
at the jeweler's establishment. They're really just doing it for the
|
|
excitement and challenge.
|
|
Would they promote voyeurism based on the "logic" that "after all, if they
|
|
didn't want me to look, they'd have pulled the drapes closer together?"
|
|
|
|
The fact that there's challenge or excitement involved (or even commitment,
|
|
intellect or whatever) does not change the issue.
|
|
|
|
I suggest that hackers who gain entry to systems against the wishes of the
|
|
systems' owners should be treated according to the laws regarding unlawful
|
|
entry, theft, etc.
|
|
|
|
Alan Falk
|
|
Cupertino, California
|
|
_______________________________________________________________________________
|
|
|
|
Anonymous Usenet Posting?
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Date: August 19, 1992
|
|
From: Anonymous
|
|
|
|
I've read in Phrack all about the different ways to send fake mail, but do any
|
|
of the readers (or Mind Mage) know anything about anonymous newsgroup posting?
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Anonymous Mail Poster August 4, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
by Sir Hackalot
|
|
|
|
Here is some C source to a simple "anonymous" mail poster that I wrote a LONG
|
|
time ago. It's just one of many pieces of code I never gave to anyone before.
|
|
You may find it useful. Basically, it will connect to the SMTP port and
|
|
automate the sending. It will allow for multiple recipients on the "To:" line,
|
|
and multiple "To:" lines.
|
|
|
|
From: sirh@sirh.com
|
|
|
|
------ Cut here for fm.c -----
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netdb.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <signal.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
|
|
|
|
int openSock(name,port)
|
|
char *name;
|
|
int port;
|
|
|
|
{
|
|
int mysock,opt=1;
|
|
struct sockaddr_in sin;
|
|
struct hostent *he;
|
|
he = gethostbyname(name);
|
|
if (he == NULL) {
|
|
printf("No host found..\n");
|
|
exit(0);
|
|
}
|
|
|
|
memcpy((caddr_t)&sin.sin_addr,he->h_addr_list[0],he->h_length);
|
|
sin.sin_port = port;
|
|
|
|
sin.sin_family = AF_INET;
|
|
|
|
mysock = socket(AF_INET,SOCK_STREAM,0);
|
|
|
|
opt = connect(mysock,(struct sockaddr *)&sin,sizeof(sin));
|
|
|
|
return mysock;
|
|
|
|
}
|
|
|
|
/* This allows us to have many people on one TO line, seperated by
|
|
commas or spaces. */
|
|
|
|
process(s,d)
|
|
int d;
|
|
char *s;
|
|
{
|
|
char *tmp;
|
|
char buf[120];
|
|
|
|
tmp = strtok(s," ,");
|
|
|
|
while (tmp != NULL) {
|
|
sprintf(buf,"RCPT TO: %s\n",tmp);
|
|
write(d,buf,strlen(buf));
|
|
tmp = strtok(NULL," ,");
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
getAndSendFrom(fd)
|
|
int fd;
|
|
{
|
|
char from[100];
|
|
char outbound[200];
|
|
|
|
printf("You must should specify a From address now.\nFrom: ");
|
|
gets(from);
|
|
|
|
sprintf(outbound,"MAIL FROM: %s\n",from);
|
|
write(fd,outbound,strlen(outbound));
|
|
|
|
|
|
|
|
}
|
|
|
|
getAndSendTo(fd)
|
|
int fd;
|
|
{
|
|
char addrs[100];
|
|
|
|
printf("Enter Recipients, with a blank line to end.\n");
|
|
|
|
addrs[0] = '_';
|
|
|
|
while (addrs[0] != '\0') {
|
|
printf("To: ");
|
|
gets(addrs);
|
|
process(addrs,fd);
|
|
}
|
|
|
|
}
|
|
|
|
getAndSendMsg(fd)
|
|
int fd;
|
|
{
|
|
char textline[90];
|
|
char outbound[103];
|
|
|
|
sprintf(textline,"DATA\n");
|
|
write(fd,textline,strlen(textline));
|
|
|
|
|
|
printf("You may now enter your message. End with a period\n\n");
|
|
printf("[---------------------------------------------------------]\n");
|
|
|
|
textline[0] = '_';
|
|
|
|
while (textline[0] != '.') {
|
|
gets(textline);
|
|
sprintf(outbound,"%s\n",textline);
|
|
write(fd,outbound,strlen(outbound));
|
|
}
|
|
|
|
}
|
|
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
|
|
char text[200];
|
|
int file_d;
|
|
|
|
/* Get ready to connect to host. */
|
|
printf("SMTP Host: ");
|
|
gets(text);
|
|
|
|
/* Connect to standard SMTP port. */
|
|
file_d = openSock(text,25);
|
|
|
|
if (file_d < 0) {
|
|
printf("Error connecting to SMTP host.\n");
|
|
perror("smtp_connect");
|
|
exit(0);
|
|
}
|
|
|
|
printf("\n\n[+ Connected to SMTP host %s +]\n",text);
|
|
|
|
sleep(1);
|
|
|
|
getAndSendFrom(file_d);
|
|
|
|
getAndSendTo(file_d);
|
|
|
|
getAndSendMsg(file_d);
|
|
|
|
sprintf(text,"QUIT\n");
|
|
write(file_d,text,strlen(text));
|
|
|
|
/* Here we just print out all the text we got from the SMTP
|
|
Host. Since this is a simple program, we didnt need to do
|
|
anything with it. */
|
|
|
|
printf("[Session Message dump]:\n");
|
|
while(read(file_d,text,78) > 0)
|
|
printf("%s\n",text);
|
|
close(file_d);
|
|
}
|
|
----- End file fm.c
|
|
_______________________________________________________________________________
|
|
|
|
From: Andy Panda-Bear
|
|
Date: September 25, 1992
|
|
Subject: Phrack on the move
|
|
|
|
To Whom It May Concern:
|
|
|
|
I love reading your Phrack articles and find them very, very informative as
|
|
well as helpful. I was wondering in you've ever or plan to put together a
|
|
compendium of related articles. For instance, you could make a Phrack guide to
|
|
telephony and include all telephone/telecommunications articles. Perhaps a
|
|
"Phrack Guide to UNIX" or "Phrack Guide to Internet" could be produced. It
|
|
could have reprints of past articles along with commentaries by individuals who
|
|
care to share their knowledge. Anyway it's just something to think about.
|
|
|
|
Thanks for many megabytes of useful info and keep it coming.
|
|
|
|
Later,
|
|
|
|
Andy Panda-Bear
|
|
|
|
----------
|
|
|
|
Computer Underground Publications Index
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Amadeus
|
|
|
|
I just finished the new edition of the Phrack Index, now called the Computer
|
|
Underground Publications Index since it now includes the issues of the Legion
|
|
of Doom Tech Journals and Informatik.
|
|
|
|
You can get it from ftp.uu.net as /tmp/CUPindex
|
|
|
|
I have already sent it to da folks at CUD so that they may enter it into their
|
|
archives.
|
|
|
|
The CUP has been updated to included all the Phracks up to 40.
|
|
|
|
C'ya
|
|
|
|
Amadeus
|
|
_______________________________________________________________________________
|
|
|
|
Pirates v. AT&T: Posters August 8, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Legacy Irreverent (legacy@cpu.cyberpnk1.sai.com)
|
|
|
|
On May 24 1992, two lone Pirates, Legacy of CyberPunk System, and Captain
|
|
Picard of Holodeck, had finally had enough of AT&T. Together, they traveled to
|
|
the AT&T Maintenance Facility, just west of Goddard, Kansas, and claimed the
|
|
property in the name of Pirates and Hackers everywhere. They hoisted the Jolly
|
|
Roger skull and crossbones high on the AT&T flagpole, where it stayed for 2
|
|
days until it was taken down by security.
|
|
|
|
This event was photographed and videotaped by EGATOBAS Productions, to preserve
|
|
this landmark in history. And now you can witness the event. For a limited
|
|
time we are offering a 11" x 17" full color poster of the Jolly Roger Pirate
|
|
flag flying high over AT&T, with the AT&T logo in plain view, with the caption;
|
|
"WE CAME, WE SAW, WE CONQUERED." These are $5.50 each and are laminated.
|
|
|
|
Also available, by request is a 20" x 30" full color photograph, and a cotton
|
|
T-shirt with the same full color picture on the front, for $20 each.
|
|
|
|
If you are interested in purchasing any of the above items, simply send check
|
|
or money order for the amount to:
|
|
|
|
CyberPunk System
|
|
P.O. Box 771027
|
|
Wichita, KS 67277-1072
|
|
|
|
A GIF of this is also available from CyberPunk System, 1:291/19, 23:316/0,
|
|
72:708/316, 69:2316/0. FREQ magicname PIRATE
|
|
|
|
Any questions, send them to Legacy@cpu.cyberpnk1.sai.com
|
|
|
|
_______________________________________________________________________________
|
|
|
|
Ultrix 4.2 Bug
|
|
~~~~~~~~~~~~~~
|
|
By Krynn
|
|
|
|
A bug was discovered in Ultrix 4.2 upgrade version. It involves npasswd, and
|
|
root. It is quite simple, and a patch/fix is available. Here is a description
|
|
of the hole:
|
|
|
|
Sys Admin's username: mradmin
|
|
Any user's username : mruser
|
|
|
|
Okay, mruser has forgotten his password, which isn't good. Mruser goes to
|
|
mradmin and asks mradmin to change his password to newpass. Mradmin does so.
|
|
|
|
Mradmin now will su to root, and npasswd mruser. He will enter mruser's new
|
|
password, newpasswd. It will appear in the /etc/passwd that mruser's password
|
|
is a "*" (shadowed), and that it has been changed, but it hasn't.
|
|
|
|
The password changed was root's, meaning root's password is now newuser.
|
|
|
|
A fix is available via anonymous ftp at:
|
|
|
|
black.ox.ac.uk /src/npasswd.enhanced.shar.Z
|
|
|
|
The original is there as /src/npasswd jpl.tar.Z
|
|
_______________________________________________________________________________
|
|
|
|
PumpCon Hosed November 5, 1992
|
|
~~~~~~~~~~~~~
|
|
by Phil "The Outlander"
|
|
|
|
PumpCon '92 was held this past weekend at the Westchester Courtyard by
|
|
Marriott, and was shut down in spades.
|
|
|
|
It began like any typical hacker/phreak/cyberpunk's convention, with lots of
|
|
beer, lots of shooting the bull, and lots of people from around the country,
|
|
except that the guests got sloppy, stupid, noisy, and overconfident.
|
|
|
|
The manager of the hotel, accompanied by three town of Greenborough police
|
|
officers, entered the room at approximately 10pm on Saturday. The manager had
|
|
received complaints about noise and vandalism from some of the hotel's other
|
|
guests. She claims to have tried to call the room several times before
|
|
physically entering, but the room's telephone line was consistently busy.
|
|
|
|
The police officers noticed the multiple open (and empty) beer bottles
|
|
scattered around the room and were gearing up to make some arrests for
|
|
"Unlawful Possession of Alcoholic Beverages by Underage Persons" when one of
|
|
the policemen spotted an Amiga, connected to a US Robotics modem, which was in
|
|
turn connected to the suite's phone line. The "stolen" calling card was all
|
|
the probable cause necessary to upgrade the charges to "Wire Fraud."
|
|
|
|
Everyone in the suite was detained for questioning. Standard investigation
|
|
procedure was followed. The entire case was handled by local authorities,
|
|
including the Westchester County DA. To my knowledge, the FBI and Bell
|
|
Security people were not called in (or if they were, it was after I was
|
|
released).
|
|
|
|
Each detainee was body-searched for diskettes, hand-written notes about credit
|
|
and computer services, autodialers, and the like. The suite where PumpCon had
|
|
taken place was also searched. Hardware seized includes at least two Amigas
|
|
with monitors, modems, and diskettes, and one AT&T dumb terminal with modem.
|
|
|
|
Each of the detainees was interviewed in turn. Just before dawn on the morning
|
|
of Sunday, November 1st, the police began making the actual arrests. Four to
|
|
eight people were arrested and taken to the local jail.
|
|
|
|
The rest of the detainees were released with no charges or arrests filed.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
And now on a personal note to anybody who is new to the world of hacking:
|
|
|
|
Many of the attendees to PumpCon '92 were just like me. I was aware of the
|
|
possible consequences of an arrest, but the full enormity of the possibilities
|
|
hadn't sunk in. Getting busted can really ruin your life, and I am unwilling
|
|
to sacrifice my liberty and get a criminal record just for the thrill of
|
|
hanging out with the "eleet."
|
|
|
|
I was personally terrified out of my skull and went right off any dreams I had
|
|
of being some kind of big-time cyberpunk. The law had us outgunned ten to one
|
|
(literally and figuratively) and I as I write this on Monday night I still
|
|
haven't stopped shaking.
|
|
|
|
To anyone who hasn't considered what it would be like to get seriously busted,
|
|
I want you to try and picture the scene that night, and comes the dawn, a lot
|
|
of the people you were partying with just twelve hours earlier are carted away
|
|
in handcuffs to face an uncertain future.
|
|
|
|
The attendees of PumpCon, including myself and with few exceptions, were utter
|
|
and complete fools. They thought that they could act like jerks, bust up the
|
|
hotel, and phreak off the room lines without bringing down the heat like a jet
|
|
of molten lava. They thought they were too smart to get caught. They thought
|
|
that they were immortal. They thought wrong, and now some of them are going to
|
|
pay for it.
|
|
|
|
I got lucky. I was released, and I learned some invaluable lessons.
|
|
|
|
I can't stress enough to anybody out there who is treating the state of the
|
|
Hack like it's a big game: You aren't going to get your marbles back when the
|
|
night is over. The stakes are real. Ask yourself if you can deal with the
|
|
possibilities of ruining your life before it's even begun.
|
|
|
|
Everyone must make their own decision. You are only given this one chance to
|
|
bail out now; any others that come along are blessings from on high.
|
|
|
|
If you do decide to live in the computer underground, I can only offer this
|
|
advice: Cover your a$$. Do not act foolishly. Do not associate with fools.
|
|
Remember that you are not immortal, and that ultimately there are no safety
|
|
nets. Intelligence can't always save you. Do not, in your arrogance, believe
|
|
that it will. My time as a cyberpunk has been short and undistinguished but it
|
|
has taught me this much.
|
|
|
|
I'm not saying that you should not become a hacker. If that is truly your
|
|
wish, then I'm not one to stop you. I'm just warning you that when the fall
|
|
comes, it can come hard, and there's nobody who can help you when you've gone
|
|
far enough past the line.
|
|
|
|
Phil "The Outlander"
|
|
_______________________________________________________________________________
|
|
|
|
2600 Meeting Disrupted by Law Enforcement December 12, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Emmanuel Goldstein (Editor of 2600 Magazine)
|
|
|
|
The following is a letter I wrote to the Washington Post in response to their
|
|
article about the incidents at the Pentagon City Mall on November 6, entitled,
|
|
"Hackers Allege Harassment at Mall" (dated November 13, page A1). Their
|
|
article failed to focus on the startling revelation of federal government
|
|
involvement and the ominous implications of such an action. The article also
|
|
does little to lessen the near hysteria that is pumped into the general public
|
|
every time the word "hacker" is mentioned.
|
|
|
|
Let us take a good look at what has been confirmed so far. A group of computer
|
|
hackers gathered at a local mall as they do once a month. Similar meetings
|
|
have been going on in other cities for years without incident. This gathering
|
|
was not for the purposes of causing trouble and nobody has accused the hackers
|
|
of doing anything wrong. Rather, the gathering was simply a place to meet and
|
|
socialize. This is what people seem to do in food courts and it was the
|
|
hackers' intention to do nothing more.
|
|
|
|
When mall security personnel surrounded the group and demanded that they all
|
|
submit to a search, it became very clear that something bizarre was happening.
|
|
Those who resisted were threatened with arrest. Everyone's names were written
|
|
down, everyone's bags gone through. One person attempted to write down the
|
|
badge numbers of the people doing this. The list was snatched out of his hand
|
|
and ripped to pieces. Another hacker attempted to catch the episode on film.
|
|
He was apprehended and the film was ripped from his camera. School books,
|
|
notepads, and personal property were seized. Much of it has still not been
|
|
returned. The group was held for close to an hour and then told to stay out
|
|
of the mall or be arrested.
|
|
|
|
This kind of treatment is enough to shock most people, particularly when
|
|
coupled with the overwhelming evidence and eyewitness accounts confirming no
|
|
unusual or disruptive behavior on the part of the group. It is against
|
|
everything that our society stands for to subject people to random searches and
|
|
official intimidation, simply because of their interests, lifestyles, or the
|
|
way they look. This occurrence alone would warrant condemnation of a blatant
|
|
abuse of power. But the story doesn't end there.
|
|
|
|
The harassment of the hackers by the mall police was only the most obvious
|
|
element. Where the most attention should be focused at this point is on the
|
|
United States Secret Service which, according to Al Johnson, head of mall
|
|
security, "ramrodded" the whole thing. Other media sources, such as the
|
|
industry newsletter Communications Daily, were told by Johnson that the Secret
|
|
Service was all over the mall that day and that they had, in effect, ordered
|
|
the harassment. Arlington police confirm that the Secret Service was at the
|
|
mall that day.
|
|
|
|
It is understood that the Secret Service, as a branch of the Treasury
|
|
Department, investigates credit card fraud. Credit card fraud, in turn, can be
|
|
accomplished through computer crime. Some computer hackers could conceivably
|
|
use their talents to accomplish computer crime. Thus we arrive at the current
|
|
Secret Service policy, which appears to treat everybody in the hacker world as
|
|
if they were a proven counterfeiter. This feeling is grounded in
|
|
misperceptions and an apprehension that borders on panic. Not helping the
|
|
situation any is the ever-present generation gap -- most hackers are young and
|
|
most government officials are not.
|
|
|
|
Apart from being disturbed by the gross generalizations that comprise their
|
|
policy, it seems a tremendous waste of resources to use our Secret Service to
|
|
spy on public gatherings in shopping malls. It seems certain to be a violation
|
|
of our rights to allow them to disrupt these meetings and intimidate the
|
|
participants, albeit indirectly. Like any other governmental agency, it is
|
|
expected that the Secret Service follow the rules and not violate the
|
|
constitutional rights of citizens.
|
|
|
|
If such actions are not publicly condemned, we will in effect be granting a
|
|
license for their continuance and expansion. The incident above sounds like
|
|
something from the darkest days of the Soviet Union when human rights activists
|
|
were intimidated by government agents and their subordinates. True, these are
|
|
technology enthusiasts, not activists. But who they are is not the issue. We
|
|
cannot permit governmental abuse of any person or group simply because they may
|
|
be controversial.
|
|
|
|
Why do hackers evoke such controversy? Their mere presence is an inconvenience
|
|
to those who want so desperately to believe the emperor is wearing clothes.
|
|
Hackers have a tendency of pointing out the obvious inadequacies of the
|
|
computer systems we entrust with such a large and growing part of our lives.
|
|
Many people don't want to be told how flimsily these various systems are held
|
|
together and how so much personal data is readily available to so many.
|
|
Because hackers manage to demonstrate how simple it is to get and manipulate
|
|
this information, they are held fully responsible for the security holes
|
|
themselves.
|
|
|
|
But, contrary to most media perceptions, hackers have very little interest in
|
|
looking at other people's personal files. Ironically, they tend to value
|
|
privacy more than the rest of us because they know firsthand how vulnerable it
|
|
is. Over the years, hackers have gone to the media to expose weaknesses in our
|
|
credit reporting agencies, the grading system for New York City public schools,
|
|
military computer systems, voice mail systems, and even commonly used push
|
|
button locks that give a false sense of security. Not one of these examples
|
|
resulted in significant media attention and, consequently, adequate security
|
|
was either delayed or not implemented at all.
|
|
|
|
Conversely, whenever the government chooses to prosecute a hacker, most media
|
|
attention focuses on what the hacker "could have done" had he been malicious.
|
|
This reinforces the inaccurate depiction of hackers as the major threat to our
|
|
privacy and completely ignores the failure of the system itself.
|
|
|
|
By coming out publicly and meeting with other hackers and non-hackers in an
|
|
open atmosphere, we have dispelled many of the myths and helped foster an
|
|
environment conducive to learning. But the message we received at the Pentagon
|
|
City Mall tells us to hide, be secretive, and not trust anybody. Perhaps
|
|
that's how the Secret Service wants hackers to behave. But we are not
|
|
criminals and we refuse to act as such simply because we are perceived that way
|
|
by uninformed bureaucrats.
|
|
|
|
Regardless of our individual outlooks on the hacker issue, we should be
|
|
outraged and extremely frightened to see the Secret Service act as they did.
|
|
Whether or not we believe that hackers are decent people, we must agree that
|
|
they are entitled to the same constitutional freedoms the rest of us take for
|
|
granted. Any less is tantamount to a very dangerous and ill-advised precedent.
|
|
|
|
Emmanuel Goldstein
|
|
Editor, 2600 Magazine -- The Hacker Quarterly (516)751-2600
|
|
|
|
(NOTE: 2600 Magazine coordinates monthly hacker meetings throughout the
|
|
country.)
|
|
_______________________________________________________________________________
|
|
|
|
Two New Hardcovers November 24, 1992
|
|
~~~~~~~~~~~~~~~~~~
|
|
by Alan J. Rothman (New York Law Journal)(Page 5)
|
|
|
|
During the opening sequence of the classic English television series "The
|
|
Prisoner," the lead character known only as Number 6 (brilliantly played by
|
|
Patrick McGoohan) is abducted and taken to a secret location called "The
|
|
Village." He desperately pleads with his captors "What do you want?" Their
|
|
grim response is "Information." Through 17 thrilling episodes, his kidnappers
|
|
staged elaborate high-tech ruses to find out why he quit work as a spy.
|
|
|
|
Had this story been set in the 1990s rather than the 1960s, all The Village's
|
|
proprietors would have needed was a PC and a modem. They could have assembled
|
|
a composite of Number 6's movements by cross-referencing records from any of
|
|
the commercial data bases containing the details of nearly everyone's daily
|
|
activities. Then with a bit of ingenuity, they could have tried to steal even
|
|
more information by hacking into other restricted data systems.
|
|
|
|
No longer fiction, but common fact, the billowing growth in the computers and
|
|
telecommunications networks everywhere is generating urgent legal issues
|
|
regarding the content, usage and ownership of the data coursing through them.
|
|
Dilemmas have also surfaced concerning the responsibilities of the businesses
|
|
which gather, sift and repackage such information. Indeed, a critical juncture
|
|
has now been reached where the basic constitutional rights of privacy and
|
|
expression are colliding with the ever-expanding reach of modern technology.
|
|
|
|
Two well-crafted books have recently been published which together frame the
|
|
spectrum of relevant individual rights issues in these areas with uncanny
|
|
symmetry. Fortunately, neither degenerates into a "computers are bad"
|
|
jeremiad. Rather, they portray an appropriate balance between the virtues of
|
|
computerization and disturbing cases of technological misuse for wrongful
|
|
commercial and governmental ends.
|
|
|
|
Presenting array of new forms of electronic encroachment on personal privacy is
|
|
Jeffrey Rothfeder's alarming new book, "Privacy for Sale: How Computerization
|
|
Has Made Everyone's Private Life an Open Secret" (Simon & Schuster, 224 pages,
|
|
$22). He offers the chilling thesis that anyone can find out nearly anything
|
|
regarding anybody and there is nowhere left to hide. He convincingly states
|
|
his case in a concise and insightful exploration of the trends and abuses in
|
|
the mass processing of personal data.
|
|
|
|
The fascinating mechanics of how and where information about virtually every
|
|
aspect of our lives is gathered and then computerized are extensively
|
|
described. The most productive fonts include medical records, credit
|
|
histories, mortgage applications, subscription lists, phone records, driver's
|
|
licenses and insurance forms. Yet notwithstanding the legitimate commercial
|
|
and regulatory reasons for providing these facts, the author carefully
|
|
documents another more deeply hidden and troubling consequence of volunteering
|
|
such information: It is constantly resold, combined with other sources and
|
|
reused without your knowledge or permission for purposes entirely different
|
|
from those you first intended.
|
|
|
|
Mr. Rothfeder alleges the most perilous result of these activities is the
|
|
growing and highly organized sales, integration and cross-matching of
|
|
databases. Businesses and government entities now have sophisticated software
|
|
to generate complex demographic profiles about individuals, populations and
|
|
geographic areas. In turn, these computer-generated syntheses are increasingly
|
|
used for invasive and discriminatory purposes.
|
|
|
|
Numerous examples of such misuse are cited, ranging from slightly annoying to
|
|
purely horrifying. The astonishing breadth of this roster includes the sale of
|
|
driver's license information with height weight specifications to clothes
|
|
marketers for tall men and thin women, purchases of credit histories and
|
|
workmen's compensation claims reports by prospective employers who believe this
|
|
material is indicative of a job applicant's character, and the creation of
|
|
"propensity files" by federal agencies to identify people who have not
|
|
committed any offense but might likely be criminals.
|
|
|
|
Two additional problems pervade the trafficking of intimate information.
|
|
First, there is little or no federal legislation to effectively protect people
|
|
from certain problems presented in the book. For example, the release of
|
|
medical records thought to be "confidential" is virtually unprotected.
|
|
|
|
Second, it can be extremely difficult to have false entries corrected before
|
|
they have a ripple effect on your other data. Beyond the common tales of
|
|
frustration at clearing up a faulty credit report, Mr. Rothfeder relates the
|
|
case of a man denied any health insurance because his medical records contained
|
|
an erroneous report he was HIV positive.
|
|
|
|
|
|
JOURNEY IN CYBERSPACE
|
|
|
|
Turning to a much more accurate account, author Bruce Sterling takes readers
|
|
into the ethereal realm of "cyberspace" where computers, networks, and
|
|
electronic bulletin boards systems (BBS) are linked together by phone. In his
|
|
first non-fiction work, "The Hacker Crackdown: Law and Disorder on the
|
|
Electronic Frontier" (Bantam, 328 pages, $23), he chronicles the U.S.
|
|
government's highly visible efforts in 1990 to prosecute "hackers" it suspected
|
|
of committing crimes by PC and modem. However, Mr. Sterling distinguishes this
|
|
term as being more about active computer enthusiasts, most of whom have never
|
|
committed any wrongdoing. The writer's other credits include some highly
|
|
regarded "cyberpunk" science fiction, where computer technology is central to
|
|
the plots and characters.
|
|
|
|
The "crackdown" detailed by the author began with the crash of AT&T's long-
|
|
distance phone system on January 15, 1990. Although it has never been proven
|
|
that hackers were responsible, this event served as the final catalyst to spur
|
|
federal law enforcement agencies into concerted action against a suspected
|
|
underground of computer criminals. A variety of counter-operations were
|
|
executed. Most notable was Operation Sundevil the following May when agents
|
|
around the country seized 42 computer systems, 23,000 diskettes, and halted 25
|
|
BBS's where the government believed hackers were exchanging tips of the trade.
|
|
|
|
Some of the government's resulting prosecutions through their nationwide
|
|
efforts were moderately successful. However, the book's dramatic centerpiece is
|
|
the trial of Craig Neidorf (a.k.a. Knight Lightning). Mr. Neidorf was a
|
|
contributor to Phrack, an electronic magazine catering to hackers, available on
|
|
various BBS's.
|
|
|
|
In January 1989, another hacker named "Prophet" transmitted a document he
|
|
pilfered from BellSouth's computers regarding the 911 emergency system to
|
|
Neidorf. Together they edited the text, which Neidorf then published in
|
|
Phrack. In July 1990, he was placed on trial for federal charges of entering a
|
|
fraudulent scheme with Prophet to steal this document. The government alleged
|
|
it was worth $79,499 and that its publication threatened emergency operations.
|
|
To the prosecutor's dismay, the case was dropped when the defense proved the
|
|
same material was publicly available for only $13.
|
|
|
|
With insight and style, Mr. Sterling uses this and other events to cast
|
|
intriguing new spins on applicable civil liberties issues.
|
|
|
|
Are the constitutional guarantees of freedom of expression and assembly fully
|
|
extended to BBS dialogs and gatherings? What degree of privacy can be expected
|
|
for personal data on systems which may be subject to surreptitious entry? Are
|
|
hackers really breaking any laws when merely exploring new systems? Is posting
|
|
a message or document on a BBS considered a "publication"? Should all BBS's be
|
|
monitored just because of their potential for illegal activity? What are the
|
|
responsibilities of BBS operators for the contents of, and access to, their
|
|
systems?
|
|
|
|
The efforts of Mitchell Kapor, the co-developer of Lotus 123 and now chairman
|
|
of ONtechnology, are depicted as a direct response to such issues raised by the
|
|
crackdown. Mr. Kapor assembled a prominent group of fellow computer
|
|
professionals to establish the Electronic Frontier Foundation (EFF), dedicated
|
|
to education and lobbying for free speech and expression in electronic media.
|
|
As well, EFF has provided support to Craig Neidorf and others they consider
|
|
wrongly charged with computer crime.
|
|
|
|
Weighty legal matters aside, the author also embellishes his story with some
|
|
colorful hacker lore. These denizens of cyberspace are mostly young men in
|
|
their late teens or early twenties, often fueled by junk food and propelled by
|
|
macho. Perhaps their most amusing trait is the monikers they adopt --
|
|
Bloodaxe, Shadowhawk, and of course, Phiber Optik.
|
|
|
|
Someone else, a non-hacker involuntary given the pseudonym "Number 6," knew his
|
|
every act was continually being monitored and recorded against his will. As a
|
|
manifestation of resistance to this relentless surveillance, he often bid
|
|
farewell to other citizens of the Village with a sarcastic "Be seeing you."
|
|
Today, the offerings of authors Rothfeder and Sterling provide a resounding
|
|
"And you" as a form of rejoinder (often uttered by The Village's citizens as
|
|
well), to publicize the ironic diversity threats wrought by information
|
|
technology.
|
|
|
|
Number 6 cleverly managed to escape his fictional captivity in The Village
|
|
during the final (and mind-boggling) episode of The Prisoner. However, based
|
|
on the compelling evidence presented in these two books, the protection of
|
|
individual rights in the reality of today's evolving "global village" of
|
|
computer networks and telecommunications may not be so neatly resolved.
|