| ==Phrack Inc.== |
|
|
| Volume Three, Issue 25, File 8 of 11 |
|
|
| /*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\ |
| \*/ \*/ |
| /*\ Hacking: What's Legal And What's Not /*\ |
| \*/ Written by Xandor SymmLeo Xet \*/ |
| /*\ With Technical Assistance From The ICH /*\ |
| \*/ \*/ |
| /*\ Reviewed by HATCHET MOLLY (TK0GRM1@NIU.BITNET) /*\ |
| \*/ Exclusively for Phrack Inc. \*/ |
| /*\ /*\ |
| \*/ March 8, 1989 \*/ |
| /*\ /*\ |
| \*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/*\*/ |
|
|
|
|
| "Hacking: What's Legal And What's Not" was originally published in 1987 by |
| "HackTel Communications" of Crosby, Texas. Reportedly the book is no longer |
| being published as the author, Xandor SymmLeo Xet, has joined the United States |
| Army. E. Arthur Brown of Minnesota has bought out the remaining stock and is |
| selling it for $12.95 (plus postage and handling) which is about half off it's |
| "cover price" of $25.00. |
|
|
| We've always been taught not to judge a book by its' cover, and I suppose that |
| one should not expect beautiful binding and great illustrations in |
| self-published books, especially those that deal with hacking and phreaking. |
| But I can't help comment on the sheer ugliness of this volume. To be fair, I |
| should preface these remarks by saying that E. Arthur Brown Company does |
| give fair warning about the packaging of this book in their advertisement. |
|
|
| The "book" consist of about 300 photocopied reproductions of non-NLQ dot matrix |
| pages. However, this does not mean you get three hundred pages of information |
| as about half of the pages are single sided copies. All in all I'd say it |
| could be reduced to about 200 pages if everything was copied back to back. |
| These pages come in a nice three ring binder, black in color, and it even has |
| the name of the book silk screened on the cover. (I can't resist mentioning |
| that the title of the book is improperly punctuated on the cover, though it is |
| correct inside the manuscript.) |
|
|
| Presumably the author(s) intended to release follow up reports and addendum to |
| the book at later dates (and at additional cost). So the three-ring binder |
| approach makes sense, and the author does explain that he has used single sided |
| copies in some places to allow for easy insertation of these "Hacker Reports." |
| So perhaps criticisms of the books packaging are a little unfair since it |
| appears these concessions were made with a purpose in mind. This does not, |
| however, change what you do indeed get when you order this book. All potential |
| buyers should be aware of what they are getting for their money. |
|
|
| Enough of what the book looks like, let's examine what it has to offer. |
| Generally speaking, it is a cross between a "how to" and a legal reference |
| guide. Much of the book is dedicated to state and federal laws that deal with |
| hacking, phreaking, and pirating. You'll find reprints of the state computer |
| crime laws for every state of the union, (current at the time the book was |
| written) and the Federal wire fraud and copyright laws. It does not include |
| the Federal Electronic Communication Privacy Act (ECPA) perhaps because act was |
| not passed at the time the book was compiled. The sections on state laws |
| appear complete enough, and the full source and appropriate references are |
| given if you want to check them for accuracy or changes. Thoughtfully, the |
| author has even included the associated penalties each statute carries. And |
| for those of you who aren't quite up on your Latin, there is even a (very) |
| short legal glossary so you can better understand the language of the law. |
|
|
| The crime laws make up the bulk of the book. They are probably the most useful |
| section despite the fact that the information is at least three years old by |
| now. The rest of the book is dedicated to various topics that are mundane to |
| anyone that is an active practitioner of phreaking and/or hacking. Topics like |
| "what is a network" and "how does a war dialer work" really do little for the |
| accomplished hacker, and the public can get the same information in the better |
| written book by Bill Landreth. |
|
|
| One point that interested me is that Xet adheres more to the "computer |
| professional" definition of "hacker" than he does to the definition used by |
| most of the underground. In other words, he maintains that people who gain |
| unauthorized access to systems are "crackers," not "hackers." He, like many |
| phreak/hackers, gets upset when the media uses the term incorrectly, but his |
| reasoning is a little different from most. Interestingly enough, despite an |
| entire chapter on software piracy, Xet does not realize that "cracker" already |
| refers to a specific type of activity and suggesting it as an alternative to |
| "hacker" only serves to further muddy the waters. To some this may be a minor |
| point, but the indiscriminate and apparently uninformed use of terms and labels |
| is ill advised in a book that aspires to be a useful reference manual. |
|
|
| By way of illustration, I've excerpted his definitions (actually, they should |
| properly be called "descriptions") of various terms from the glossary: |
|
|
| Hacker: A non-business computer user who operates a computer in |
| conjunction with a modem and who at least knows his (or her) way |
| around a local bulletin board and has at least heard of |
| CompuServe and The Source. Can usually be found eating pizza or |
| donuts, and has a working knowledge of the effects of long term |
| exposure to great amounts of caffeine either from drinking |
| several softdrinks (sic) or numerous cups of coffee. |
|
|
| Cracker: A hacker who has an adventurous streak which leads him into |
| unknown computer menus and strange protocols of all benign. He |
| has the ability to crack access codes or passwords in order to |
| illegally enter a computer over the telephone. Usually a very |
| good problem solver, quick to think, cautious to act. Often |
| thought of as clever or even sneaky. Excellent chess players. |
|
|
| Chrasher: A cracker gone bad. One who gets his jollies from terminating |
| corporate systems and picking on helpless bulletin boards by |
| destroying information or files or by rendering a system unable |
| to communicate (usually referred to as "crashing" the system) |
| until reset by a sysop. Very clever, extremely dangerous. |
| Smart, but hopelessly misdirected. They deserve respect for |
| their ability to destroy. |
|
|
| Pirate: Software pirate. A hacker who concentrates his efforts toward |
| cracking software copyright protection schemes which are placed |
| on computer disks to prevent the illegal copying of factory |
| produced programs. Some pirates have a habit of collecting |
| software that they have managed to crack either to trade with |
| other pirates for software they don't have yet or just to collect |
| it for the sake of building their egos. Some of my best friends |
| are pirates. Usually, very easy going people, and sometimes |
| politically minded as well. And even more clever than crackers |
| or crashers. |
|
|
| The problem with these definitions is that they are not mutually exclusive and |
| do little but reinforce the stereotypes that hackers, phreakers, and pirates |
| already face. Any phreak/hacker that reads this book will give these |
| definitions little attention, if they read them at all, but if this manual is |
| used by the media as an "example of hacker literature" it will only further |
| perpetuate some of these assumptions. |
|
|
| A large amount of the book is dedicated to what Xet calls The Gray Pages. |
| Labeled as a "national hackers' phone book" it is primarily a list of dialups |
| for Telenet, Tymnet, Compuserve, and The Source. This list is hardly "secret" |
| and the format hints that it may just be a capture of the "info" pages from |
| each of these networks. These numbers may be helpful to the beginner, but it |
| would have been better if he included instructions on how to dial the toll free |
| access number (or call customer service and just ask them) and check for your |
| local number by yourself. Not only would this have cut down on the number of |
| pages needed, but it would have at least given the beginner an excuse to |
| actually do something themselves. (Not to mention that is the best way to get |
| the most accurate information.) |
|
|
| The rest of "The Gray Pages" is taken up by a list of 400 public BBS systems. |
| Although the list is titled "hacker bulletin boards" many of the systems listed |
| are quite legitimate and do not support phreak/hack or pirate activities. Woe |
| to the beginner who calls CLAUG and starts asking for plans to a blue box. Of |
| course the biggest draw back to this list is that it was probably fifty percent |
| out of date four months after it was printed. |
|
|
| Speaking of blue box plans, Xet does offer a short list of box colors and what |
| they do. No plans for boxes are included, nor is there a discussion of DTMF |
| tones or other common phreak knowledge. He does include simple schematics and |
| operating instructions for a tap indicator, wire recorder, and a data converter |
| (for use with the wire recorder). The introduction to this section, called |
| "gray market equipment" says that future editions of the book will include box |
| schematics. |
|
|
| Finally, there is a short section called "helpful stuff" written by "The ICH." |
| This section is pretty informative but offers little clarifying information. |
| Basically it includes an ASCII table, DTMF frequencies, satellite and cellular |
| frequencies, and a short discussion of packet switching networks. |
|
|
| In summary, "Hacking: What's Legal And What's Not" offers some very basic |
| information to the beginning hacker, a quite good (although potentially |
| outdated) review of relevant state and federal computer crime laws, and a few |
| tid-bits here and there that are worth knowing. But it also wastes a lot of |
| space to bulletin boards and dialup numbers that are of little use to anyone. |
| Experienced phreak/hackers and pirates will find a few articles that are not |
| available elsewhere (like the section on "How Hackers Think" where Xet says |
| that since a San Diego BBS poll indicated that 79% of "hackers" had the |
| astrological sign of Leo all one has to do to understand hackers is read a |
| profile of Leo's!) but the vast majority of the information is old news in a |
| new format. |
|
|
| For someone who wants to get a broad overview of the computer underground I can |
| recommend this book. But if someone is looking for information of any real |
| use, I suggest you contact your local phreak/hack BBS and use the G-philes they |
| have available. You won't be missing anything this book has to offer. E. |
| Arthur Brown's price of $12.95 offers a reasonable value, and if your looking |
| to develop a "hacker library" you might consider ordering a copy. |
| _______________________________________________________________________________ |
|
|