| ==Phrack Inc.== |
|
|
| Volume Four, Issue Thirty-Eight, File 12 of 15 |
|
|
| PWN ^*^ PWN ^*^ PWN ^*^ { CFP-2 } ^*^ PWN ^*^ PWN ^*^ PWN |
| ^*^ ^*^ |
| PWN P h r a c k W o r l d N e w s PWN |
| ^*^ ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ ^*^ |
| PWN Special Edition Issue Six PWN |
| ^*^ ^*^ |
| PWN Computers, Freedom, & Privacy II PWN |
| ^*^ ^*^ |
| PWN March 18-20, 1992 PWN |
| ^*^ ^*^ |
| PWN Written by Max Nomad PWN |
| ^*^ ^*^ |
| PWN ^*^ PWN ^*^ PWN ^*^ { CFP-2 } ^*^ PWN ^*^ PWN ^*^ PWN |
|
|
|
|
| Computers, Freedom, & Privacy II |
| Random Notes and Mission X Telegraphs from the Nation's Capitol |
|
|
| by Max Nomad |
|
|
| Originally, when I read the brochure on the second "Computers, Freedom, and |
| Privacy Conference," I saw opportunity knocking at my door: Three days at the |
| Loew's L'Enfant Plaza Hotel in Washington, D.C. stalking around a series of |
| meetings all geared toward telecommunications, as well as the high potential |
| for mischief; techno-gurus, privacy advocates, computer outlaws, corporate |
| bigwigs, and lastly feds, a few of which who were casually walking around with |
| automatic weapons disguised as black tote-bags. There was no telling what |
| those hackers were capable of, I'm sure, so the beefed up security was |
| necessary. |
|
|
| Upon learning that Basil Rouland, Inc., an information systems security firm, |
| had secured a press pass and transportation, my excitement grew. I wasn't sure |
| what kind of story I would bring back from the trip, or if I would find a |
| unique story at all. Fortunately, the conference topics provided dozens of |
| angles to take on, more than I care list. My previous article and notes alone |
| on the event were upwards of 25k, mostly filled with mundane excerpts and |
| quotes from various panelists. If you're interested in a blow-by-blow account |
| of CFP-2, it's available on VHS; contact bkoball@well.sf.ca.us for more |
| details. |
|
|
| For the readers of PHRACK, a different perspective was in order. The following |
| commentary has been taken strictly from my notes and thoughts on the |
| underground showing. |
|
|
| Overall, this year's CFP was a success. The panel discussions on everything |
| >from the issues of privacy to Internet to cryptography and security were |
| informative, even enlightening. After three days of non-stop conferences on |
| these subjects I realized just how much of a runaway horse technology is to our |
| federal government. Big Brother is definitely out there, but he's got fast |
| competition coming up from the private sector. And special thanks to CRAIG |
| NEIDORF, who graciously donated his name to modern science and the EFF. This |
| individual's case was referred to more times than Roe v. Wade; personally, |
| Craig, if I were you, I'd put a trademark on it and charge by the usage. In |
| any case, this year's CFP conference was a success. Congrats are in order for |
| the organizers and volunteers. Anyone who is seriously interested in computer |
| networks, security, and what the big fish are up to should attend. Also, |
| members of the press are welcome. |
|
|
| Daily, in the aftermath of the conferences, "Birds of a Feather" sessions were |
| held in the meeting rooms. At best, these were well structured discussions for |
| people of similar interests. At worst, they were lame farces, such as the "Why |
| Don't They Understand" discussion, where unofficial representatives of the |
| underground were given a forum to supposedly voice their opinions. |
|
|
| The panel consisted of Glen Tenney (organizer of the annual Hacker's |
| conference), Knight Lightning (founder of Phrack, abused civil rights poster |
| child for the EFF), Dispater (current publisher of Phrack), Emmanuel Goldstein |
| (editor/publisher of 2600 magazine, host of "Off the Hook" [WBAI radio, New |
| York]), Phiber Optik (hacker/phreak currently receiving a great deal of "fan |
| harassment" by the authorities), Steven Levy (MacWorld, author of _Hackers_), |
| Dorothy Denning (Computer Science Department, Georgetown University), and the |
| panel chair was John McMullen of McMullen & McMullen. Aside from a few hackers |
| and law officials in the audience, the curious and uninformed filled the |
| meeting room to capacity. There was definitely a sense of anticipation prior |
| to the start of the discussion; it didn't take a private eye to know that one |
| way or the other, this was going to be a show. |
|
|
| And it was. |
|
|
| Steven Levy gave a neutral dissertation to the meaning of the word "hacker" as |
| it was when he published his book by the same name back in 1986: programmers |
| and electronics hobbyists supposedly with purer intentions, many of which that |
| went on to make revolutionary waves in the computer industry. Hackers and |
| phone phreaks like Wozniak and Jobs are two of those heroes of yesteryear's |
| underground. But as with the rest of society, nostalgia always casts a darker |
| tint on the present. Those heroes would be considered the maniacal high-tech |
| terrorists of today, thanks to a combination of media sensationalism, a few |
| malicious idiots on both sides of the law, and the general public opinion that |
| hackers are to be feared like hardened outlaws -- all of which stems from |
| varying degrees of ignorance. |
|
|
| Dorothy Denning appended Levy's statement with an objective view, pointing out |
| the fact that neither side seems to fully understand what it's like to walk in |
| the other's shoes, befitting the title of the next session. Another perfect |
| neutrality. Tenney interjected with a somewhat polished speech about what it |
| was to be a hacker (i.e. programmer) back in his day, uttered a few slants |
| directed at certain people, both of which smoothly establishing the slight |
| anti-hack tone that would end up carrying on until this session ended. Upon |
| finding out this man is supposedly running for Congress in some state, I was |
| even less surprised. It was as if he smelled what the crowd wanted to hear, |
| then cooked it up enough to feed everyone. He's pretty good. He'll probably |
| get the seat he's shooting for. |
|
|
| In his best radio voice, Emmanuel Goldstein immediately returned the volley to |
| previous statements, also adding a few interpretations of his own: the feeling |
| of learning and exploring, even in forbidden regions, how it is unhealthy to |
| put restrictions on thought and discovery, and how it is the complacency of the |
| other side that the underground is making use of. He also brought up a very |
| good point concerning the Dutch and how many of the system administrators over |
| there are making use of hackers in the bullet-proofing of their systems. The |
| distrust of most American sysadmins along with the level of arrogance in some |
| cases almost makes such cooperation ludicrous over here in the states. Shame. |
|
|
| Each underground member of the panel eventually made his or her statement, |
| including Phiber Optik's tale of how a certain New York State Police officer |
| and gang rolled up on his home like the DEA and awakened him from his sleep at |
| gun point. Whether by coincidence or not, the officer in charge of the arrest |
| was standing in the back of the room. Of course, the voice of authority had to |
| make a statemental come-back on the topic. In that instant it became obvious |
| that having hacks and law enforcement in the same room wasn't the best vehicle |
| for accurately portraying views. Neither side was prone to be open and honest |
| with the other watching with anticipation. Any hack who was not under |
| investigation wouldn't dare open up and speak, and any hack currently under |
| investigation couldn't speak honestly; no one wants to speak his piece bad |
| enough to get indicted. The feds were in the same boat, since they couldn't |
| openly discuss any pending cases, as well as keeping a lid on any of their |
| trade secrets; a catch-22 that further solidified the misconceptions of those |
| in the middle: the image of hackers as chaotic compu-hoodlums and law |
| enforcement officials as determined yet uninformed trackers. |
|
|
| In all honesty, this session came off like a side show, and the hackers like |
| circus freaks. With two prominent underground publishers, an ex-hack/publisher |
| turned representative of the EFF, and a hack/phreak currently under |
| investigation, there was no alternative but to stutter and give vague answers |
| to delicate questions and even then that only applied to those occasions where |
| they could speak their minds uninterrupted. Self-preservation and the |
| felonious core of this topic made every answer a forfeited one before it was |
| given. Any well-informed spectator knew this. So did the feds, who were |
| probably chuckling to themselves the entire time. Absolutely no resolutions |
| were made either way. Truthfully, the feds gained brownie points on this one. |
| The hacker perspective wasn't accurately presented and the masses would |
| continue to live ignorance of the underground. |
|
|
| The next night, random reports of strange activity churned through the rumor |
| mill shortly after the hackers hijacked one of the meeting rooms for Knight |
| Lightning's "Frank" Party, the kind of talk most people weren't bold enough to |
| investigate or so "unthinkable" that no one wanted their name attached. The |
| room itself was easy to identify -- "Fire Line Do Not Cross" tape covered the |
| front doors, as well as a chaotic chatter that roared from within. There was |
| no agenda to speak of. Most of the hackers I've met during my travels were |
| leaders and rugged individualists and here was no different. None wanted to |
| take charge -- to do so would have been useless. Each generally did his own |
| thing and, if it looked interesting enough, others would follow. Some of the |
| name-tagged feds would have probably wandered in if they weren't already having |
| a session of their own. Speculatively, they were discussing matters about |
| targeted individuals present at our gathering. |
|
|
| The evening's entertainment was an old cult-classic tape, Frank & The Phunny |
| Phone Call, the hilarious and unexpurgated recordings of an old man driven to |
| aggravated dementia by some anonymous phone phreaks making his phone "go |
| berzerk." Earlier at one of the literature tables, free promotional 2-in-1 |
| screwdrivers were given away (a gift from Hayes Modem Corporation) and it |
| seemed that every hack in here had at least one or two. Granted, these tools |
| are handy for any computer buff, but a room full of hacks and phreaks with them |
| was almost as unpredictable as handing out matches at a Pyromaniacs Anonymous |
| meeting. Soon, RJ-11 phone jacks were being unscrewed from the wall and |
| studied. Lineman's Test Phones appeared, soon followed by a small expedition |
| stalking around the service hallways and finding the unlocked telephone closet |
| for the hotel. The rest is, shall we say, up to reader interpretation as to |
| what happened after that, ironically ten yards and a set of double doors away |
| >from a room full of state cops and feds. |
|
|
|
|
| The Last Day |
|
|
| Instead of rushing the microphone during the final statements in the main |
| conference room, our rogue gang had coagulated in the hall (next to the |
| payphones no less) around an Air Force special investigator and Phiber Optik. |
| At first the mood resembled that of a James Bond movie, where Bond and an arch |
| nemesis would meet and chat, each anticipating the downfall of the other |
| beneath polite exteriors. This seemed to be the sublime tension between all |
| the feds and hacks who talked at the conference, but it was especially delicate |
| in this case -- Phiber was high on the priority list this agent's department |
| was currently investigating. Eventually the mood lightened, and an impromptu |
| Q&A pow-wow session between the hacks and the agent broke out, spawning all |
| sorts of conversations that seemed much more interesting than the finale taking |
| place inside. And, like clockwork, a little mischief came into play. As a |
| show of good faith and a sign that the hackers would be returning for next |
| year's conference, several prominent organizers found that the answer messages |
| on their hotel voice mailboxes had been mysteriously "changed." Sources say |
| the culprit was described as an old Yiddish, but all reports on this matter |
| were unconfirmed. Shortly after this impromptu gathering, it was apparent that |
| the conference had finally adjourned. Except for the underground types and a |
| few observers, the halls were thinning out, and eventually we all wandered our |
| separate ways. And once again, this environment began to take the look of a |
| hotel. |
|
|
|
|
| To The Underground At Large: |
|
|
| This was just one conference; the feds will continue to do what they do and so |
| will we. After the hacker panel fiasco, I overheard John Markoff (New York |
| Times reporter and co-author of the book _Cyberpunk_) and Steve Levy talking |
| about how topics like this were being discussed in conferences like this ten |
| years ago. Only the names and circumstances had changed -- the song and dance |
| steps remained the same. Chances are, ten years from now these same subjects |
| will share some portion of the limelight in regard to growth and development of |
| cyberspace. As society becomes more technologically complex, the bugs, |
| loopholes, and defaults will exist and the underground will thrive. Whether |
| the masses choose to acknowledge this or not, we are a subculture of and to |
| ourselves, much like the Grateful Dead followers. Some will move on, die off, |
| or fade away, and others will stream in to fill the empty spaces. A few words |
| of interpretive advice to the newbees: study everything you touch carefully, |
| covet and respect the knowledge you gain like a gun, and never drive faster |
| than you can think. The feds are out there and, trust me, these motherfuckers |
| didn't come to play. |
|
|
|
|
| To The Feds And Hacker Trackers Present At The Conference: |
|
|
| There isn't much that can be said. You have a much better understanding of the |
| computer underworld than most, even than by some of those in it. By virtue of |
| the job you do, this is a given. Respect is due to you for your showing at |
| CFP-2, how you presented yourselves, and the subtle way you furthered the |
| brainwashed concepts of "the hacker" in the public eye. You knew the |
| presentations would be slanted in your favor, and probably took great pride in |
| this. Smooth. Very smooth. |
|
|
|
|
| To The Uninformed: |
|
|
| Don't blindly believe the hype. Whether you wish to face it or not, hackers |
| and phone phreaks are an integral part of this technological revolution. |
| Advancement cannot come without the need for change and to improve, both micro- |
| and macroscopically. Positive direction is the result of an equal but opposite |
| force that presses it forward. Because of the hackers (old, new, and even the |
| malicious), software and hardware developers have made radical improvements on |
| the networks and supermachines that are undeniably molding the foundation of |
| tomorrow's world. Our society is based on complacency. And any social |
| institution or machinery that seems to work without weight to tip the scales of |
| change simply goes unchecked, eventually to become a standard. The hijinx that |
| Congress gets away with and how little the public truly reacts is a perfect |
| example. If hackers didn't truly love computers and telecommunications or have |
| an unnatural need to explore and learn, the technological growth curve would be |
| stunted. Long after these embryotic times have faded into our grandchildren's |
| history books, hackers will exist, and the bulk of high-tech crimes will |
| continue to be perpetrated by minions of the people in power, the elite white- |
| collar. |
|
|
| Regardless of the long-term insight, computer intrusion is still an illegal art |
| and science. |
|
|
| There is no rationale for why hackers hack, at least nothing that will |
| withstand the scrutiny of the unenlightened masses or one's inner beliefs. |
| "Hackers," like any other subculture, yield a range of personalities and |
| perspectives from the careful explorer to the callous marauder. Inexperienced |
| sociologists would probably try to classify this underground sect as a |
| movement, possibly even subversive in its intentions. The problem with this |
| lies in the fact that a movement needs a leader or spokesman. Aside from the |
| individual nature of these people, anyone who becomes a mouthpiece for this |
| culture cannot rightly be a hacker, or at least hacking around with anything |
| unlawful. Chances are, others would shy away from such a person, seeing him as |
| either an informant or too dangerous to be around; the feds would pursue him |
| passionately, like tracking a trophy-sized bull in a deer hunt. Hackers cannot |
| be categorized as a movement, fad, or pre-packaged subculture like bubble-gum |
| rock music or the pseudo-hippies of the 90's. Most hackers have their own |
| directions and forward momentum. It is a shared mindset, ironically |
| paralleling that of the feds that chase them. One group has no rules or set |
| channels to adhere to. The other is backed by the establishment and a badge. |
|
|
| This statement was not intended to rationalize their actions, only give insight |
| to the uninitiated. To summarize the spectrum of motives with the hacker |
| intellect, I give this analogy: the need to come onto someone else's property, |
| some for peaceful exploration, others to inhabit, and in some instances to |
| misuse or destroy is not a new phenomena. The early settlers of this country |
| did the same thing to the Native Americans. |
|
|
|
|
| I\/Iax I\Iomad |
|
|
| [Mission X Tribe Out] |
|
|
| [---------] |
|
|
| Thanks and respect are due to: |
|
|
| Basil Rouland Inc. (for getting me there) and URban Lividity, Jet Heller, |
| Silkworm, and the rest of the "In The Flesh" (804-489-7031) posse that couldn't |
| make the trip. mXt. |
| _______________________________________________________________________________ |
|
|