| ==Phrack Inc.== | |
| Volume Four, Issue Thirty-Eight, File 12 of 15 | |
| PWN ^*^ PWN ^*^ PWN ^*^ { CFP-2 } ^*^ PWN ^*^ PWN ^*^ PWN | |
| ^*^ ^*^ | |
| PWN P h r a c k W o r l d N e w s PWN | |
| ^*^ ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ ^*^ | |
| PWN Special Edition Issue Six PWN | |
| ^*^ ^*^ | |
| PWN Computers, Freedom, & Privacy II PWN | |
| ^*^ ^*^ | |
| PWN March 18-20, 1992 PWN | |
| ^*^ ^*^ | |
| PWN Written by Max Nomad PWN | |
| ^*^ ^*^ | |
| PWN ^*^ PWN ^*^ PWN ^*^ { CFP-2 } ^*^ PWN ^*^ PWN ^*^ PWN | |
| Computers, Freedom, & Privacy II | |
| Random Notes and Mission X Telegraphs from the Nation's Capitol | |
| by Max Nomad | |
| Originally, when I read the brochure on the second "Computers, Freedom, and | |
| Privacy Conference," I saw opportunity knocking at my door: Three days at the | |
| Loew's L'Enfant Plaza Hotel in Washington, D.C. stalking around a series of | |
| meetings all geared toward telecommunications, as well as the high potential | |
| for mischief; techno-gurus, privacy advocates, computer outlaws, corporate | |
| bigwigs, and lastly feds, a few of which who were casually walking around with | |
| automatic weapons disguised as black tote-bags. There was no telling what | |
| those hackers were capable of, I'm sure, so the beefed up security was | |
| necessary. | |
| Upon learning that Basil Rouland, Inc., an information systems security firm, | |
| had secured a press pass and transportation, my excitement grew. I wasn't sure | |
| what kind of story I would bring back from the trip, or if I would find a | |
| unique story at all. Fortunately, the conference topics provided dozens of | |
| angles to take on, more than I care list. My previous article and notes alone | |
| on the event were upwards of 25k, mostly filled with mundane excerpts and | |
| quotes from various panelists. If you're interested in a blow-by-blow account | |
| of CFP-2, it's available on VHS; contact bkoball@well.sf.ca.us for more | |
| details. | |
| For the readers of PHRACK, a different perspective was in order. The following | |
| commentary has been taken strictly from my notes and thoughts on the | |
| underground showing. | |
| Overall, this year's CFP was a success. The panel discussions on everything | |
| >from the issues of privacy to Internet to cryptography and security were | |
| informative, even enlightening. After three days of non-stop conferences on | |
| these subjects I realized just how much of a runaway horse technology is to our | |
| federal government. Big Brother is definitely out there, but he's got fast | |
| competition coming up from the private sector. And special thanks to CRAIG | |
| NEIDORF, who graciously donated his name to modern science and the EFF. This | |
| individual's case was referred to more times than Roe v. Wade; personally, | |
| Craig, if I were you, I'd put a trademark on it and charge by the usage. In | |
| any case, this year's CFP conference was a success. Congrats are in order for | |
| the organizers and volunteers. Anyone who is seriously interested in computer | |
| networks, security, and what the big fish are up to should attend. Also, | |
| members of the press are welcome. | |
| Daily, in the aftermath of the conferences, "Birds of a Feather" sessions were | |
| held in the meeting rooms. At best, these were well structured discussions for | |
| people of similar interests. At worst, they were lame farces, such as the "Why | |
| Don't They Understand" discussion, where unofficial representatives of the | |
| underground were given a forum to supposedly voice their opinions. | |
| The panel consisted of Glen Tenney (organizer of the annual Hacker's | |
| conference), Knight Lightning (founder of Phrack, abused civil rights poster | |
| child for the EFF), Dispater (current publisher of Phrack), Emmanuel Goldstein | |
| (editor/publisher of 2600 magazine, host of "Off the Hook" [WBAI radio, New | |
| York]), Phiber Optik (hacker/phreak currently receiving a great deal of "fan | |
| harassment" by the authorities), Steven Levy (MacWorld, author of _Hackers_), | |
| Dorothy Denning (Computer Science Department, Georgetown University), and the | |
| panel chair was John McMullen of McMullen & McMullen. Aside from a few hackers | |
| and law officials in the audience, the curious and uninformed filled the | |
| meeting room to capacity. There was definitely a sense of anticipation prior | |
| to the start of the discussion; it didn't take a private eye to know that one | |
| way or the other, this was going to be a show. | |
| And it was. | |
| Steven Levy gave a neutral dissertation to the meaning of the word "hacker" as | |
| it was when he published his book by the same name back in 1986: programmers | |
| and electronics hobbyists supposedly with purer intentions, many of which that | |
| went on to make revolutionary waves in the computer industry. Hackers and | |
| phone phreaks like Wozniak and Jobs are two of those heroes of yesteryear's | |
| underground. But as with the rest of society, nostalgia always casts a darker | |
| tint on the present. Those heroes would be considered the maniacal high-tech | |
| terrorists of today, thanks to a combination of media sensationalism, a few | |
| malicious idiots on both sides of the law, and the general public opinion that | |
| hackers are to be feared like hardened outlaws -- all of which stems from | |
| varying degrees of ignorance. | |
| Dorothy Denning appended Levy's statement with an objective view, pointing out | |
| the fact that neither side seems to fully understand what it's like to walk in | |
| the other's shoes, befitting the title of the next session. Another perfect | |
| neutrality. Tenney interjected with a somewhat polished speech about what it | |
| was to be a hacker (i.e. programmer) back in his day, uttered a few slants | |
| directed at certain people, both of which smoothly establishing the slight | |
| anti-hack tone that would end up carrying on until this session ended. Upon | |
| finding out this man is supposedly running for Congress in some state, I was | |
| even less surprised. It was as if he smelled what the crowd wanted to hear, | |
| then cooked it up enough to feed everyone. He's pretty good. He'll probably | |
| get the seat he's shooting for. | |
| In his best radio voice, Emmanuel Goldstein immediately returned the volley to | |
| previous statements, also adding a few interpretations of his own: the feeling | |
| of learning and exploring, even in forbidden regions, how it is unhealthy to | |
| put restrictions on thought and discovery, and how it is the complacency of the | |
| other side that the underground is making use of. He also brought up a very | |
| good point concerning the Dutch and how many of the system administrators over | |
| there are making use of hackers in the bullet-proofing of their systems. The | |
| distrust of most American sysadmins along with the level of arrogance in some | |
| cases almost makes such cooperation ludicrous over here in the states. Shame. | |
| Each underground member of the panel eventually made his or her statement, | |
| including Phiber Optik's tale of how a certain New York State Police officer | |
| and gang rolled up on his home like the DEA and awakened him from his sleep at | |
| gun point. Whether by coincidence or not, the officer in charge of the arrest | |
| was standing in the back of the room. Of course, the voice of authority had to | |
| make a statemental come-back on the topic. In that instant it became obvious | |
| that having hacks and law enforcement in the same room wasn't the best vehicle | |
| for accurately portraying views. Neither side was prone to be open and honest | |
| with the other watching with anticipation. Any hack who was not under | |
| investigation wouldn't dare open up and speak, and any hack currently under | |
| investigation couldn't speak honestly; no one wants to speak his piece bad | |
| enough to get indicted. The feds were in the same boat, since they couldn't | |
| openly discuss any pending cases, as well as keeping a lid on any of their | |
| trade secrets; a catch-22 that further solidified the misconceptions of those | |
| in the middle: the image of hackers as chaotic compu-hoodlums and law | |
| enforcement officials as determined yet uninformed trackers. | |
| In all honesty, this session came off like a side show, and the hackers like | |
| circus freaks. With two prominent underground publishers, an ex-hack/publisher | |
| turned representative of the EFF, and a hack/phreak currently under | |
| investigation, there was no alternative but to stutter and give vague answers | |
| to delicate questions and even then that only applied to those occasions where | |
| they could speak their minds uninterrupted. Self-preservation and the | |
| felonious core of this topic made every answer a forfeited one before it was | |
| given. Any well-informed spectator knew this. So did the feds, who were | |
| probably chuckling to themselves the entire time. Absolutely no resolutions | |
| were made either way. Truthfully, the feds gained brownie points on this one. | |
| The hacker perspective wasn't accurately presented and the masses would | |
| continue to live ignorance of the underground. | |
| The next night, random reports of strange activity churned through the rumor | |
| mill shortly after the hackers hijacked one of the meeting rooms for Knight | |
| Lightning's "Frank" Party, the kind of talk most people weren't bold enough to | |
| investigate or so "unthinkable" that no one wanted their name attached. The | |
| room itself was easy to identify -- "Fire Line Do Not Cross" tape covered the | |
| front doors, as well as a chaotic chatter that roared from within. There was | |
| no agenda to speak of. Most of the hackers I've met during my travels were | |
| leaders and rugged individualists and here was no different. None wanted to | |
| take charge -- to do so would have been useless. Each generally did his own | |
| thing and, if it looked interesting enough, others would follow. Some of the | |
| name-tagged feds would have probably wandered in if they weren't already having | |
| a session of their own. Speculatively, they were discussing matters about | |
| targeted individuals present at our gathering. | |
| The evening's entertainment was an old cult-classic tape, Frank & The Phunny | |
| Phone Call, the hilarious and unexpurgated recordings of an old man driven to | |
| aggravated dementia by some anonymous phone phreaks making his phone "go | |
| berzerk." Earlier at one of the literature tables, free promotional 2-in-1 | |
| screwdrivers were given away (a gift from Hayes Modem Corporation) and it | |
| seemed that every hack in here had at least one or two. Granted, these tools | |
| are handy for any computer buff, but a room full of hacks and phreaks with them | |
| was almost as unpredictable as handing out matches at a Pyromaniacs Anonymous | |
| meeting. Soon, RJ-11 phone jacks were being unscrewed from the wall and | |
| studied. Lineman's Test Phones appeared, soon followed by a small expedition | |
| stalking around the service hallways and finding the unlocked telephone closet | |
| for the hotel. The rest is, shall we say, up to reader interpretation as to | |
| what happened after that, ironically ten yards and a set of double doors away | |
| >from a room full of state cops and feds. | |
| The Last Day | |
| Instead of rushing the microphone during the final statements in the main | |
| conference room, our rogue gang had coagulated in the hall (next to the | |
| payphones no less) around an Air Force special investigator and Phiber Optik. | |
| At first the mood resembled that of a James Bond movie, where Bond and an arch | |
| nemesis would meet and chat, each anticipating the downfall of the other | |
| beneath polite exteriors. This seemed to be the sublime tension between all | |
| the feds and hacks who talked at the conference, but it was especially delicate | |
| in this case -- Phiber was high on the priority list this agent's department | |
| was currently investigating. Eventually the mood lightened, and an impromptu | |
| Q&A pow-wow session between the hacks and the agent broke out, spawning all | |
| sorts of conversations that seemed much more interesting than the finale taking | |
| place inside. And, like clockwork, a little mischief came into play. As a | |
| show of good faith and a sign that the hackers would be returning for next | |
| year's conference, several prominent organizers found that the answer messages | |
| on their hotel voice mailboxes had been mysteriously "changed." Sources say | |
| the culprit was described as an old Yiddish, but all reports on this matter | |
| were unconfirmed. Shortly after this impromptu gathering, it was apparent that | |
| the conference had finally adjourned. Except for the underground types and a | |
| few observers, the halls were thinning out, and eventually we all wandered our | |
| separate ways. And once again, this environment began to take the look of a | |
| hotel. | |
| To The Underground At Large: | |
| This was just one conference; the feds will continue to do what they do and so | |
| will we. After the hacker panel fiasco, I overheard John Markoff (New York | |
| Times reporter and co-author of the book _Cyberpunk_) and Steve Levy talking | |
| about how topics like this were being discussed in conferences like this ten | |
| years ago. Only the names and circumstances had changed -- the song and dance | |
| steps remained the same. Chances are, ten years from now these same subjects | |
| will share some portion of the limelight in regard to growth and development of | |
| cyberspace. As society becomes more technologically complex, the bugs, | |
| loopholes, and defaults will exist and the underground will thrive. Whether | |
| the masses choose to acknowledge this or not, we are a subculture of and to | |
| ourselves, much like the Grateful Dead followers. Some will move on, die off, | |
| or fade away, and others will stream in to fill the empty spaces. A few words | |
| of interpretive advice to the newbees: study everything you touch carefully, | |
| covet and respect the knowledge you gain like a gun, and never drive faster | |
| than you can think. The feds are out there and, trust me, these motherfuckers | |
| didn't come to play. | |
| To The Feds And Hacker Trackers Present At The Conference: | |
| There isn't much that can be said. You have a much better understanding of the | |
| computer underworld than most, even than by some of those in it. By virtue of | |
| the job you do, this is a given. Respect is due to you for your showing at | |
| CFP-2, how you presented yourselves, and the subtle way you furthered the | |
| brainwashed concepts of "the hacker" in the public eye. You knew the | |
| presentations would be slanted in your favor, and probably took great pride in | |
| this. Smooth. Very smooth. | |
| To The Uninformed: | |
| Don't blindly believe the hype. Whether you wish to face it or not, hackers | |
| and phone phreaks are an integral part of this technological revolution. | |
| Advancement cannot come without the need for change and to improve, both micro- | |
| and macroscopically. Positive direction is the result of an equal but opposite | |
| force that presses it forward. Because of the hackers (old, new, and even the | |
| malicious), software and hardware developers have made radical improvements on | |
| the networks and supermachines that are undeniably molding the foundation of | |
| tomorrow's world. Our society is based on complacency. And any social | |
| institution or machinery that seems to work without weight to tip the scales of | |
| change simply goes unchecked, eventually to become a standard. The hijinx that | |
| Congress gets away with and how little the public truly reacts is a perfect | |
| example. If hackers didn't truly love computers and telecommunications or have | |
| an unnatural need to explore and learn, the technological growth curve would be | |
| stunted. Long after these embryotic times have faded into our grandchildren's | |
| history books, hackers will exist, and the bulk of high-tech crimes will | |
| continue to be perpetrated by minions of the people in power, the elite white- | |
| collar. | |
| Regardless of the long-term insight, computer intrusion is still an illegal art | |
| and science. | |
| There is no rationale for why hackers hack, at least nothing that will | |
| withstand the scrutiny of the unenlightened masses or one's inner beliefs. | |
| "Hackers," like any other subculture, yield a range of personalities and | |
| perspectives from the careful explorer to the callous marauder. Inexperienced | |
| sociologists would probably try to classify this underground sect as a | |
| movement, possibly even subversive in its intentions. The problem with this | |
| lies in the fact that a movement needs a leader or spokesman. Aside from the | |
| individual nature of these people, anyone who becomes a mouthpiece for this | |
| culture cannot rightly be a hacker, or at least hacking around with anything | |
| unlawful. Chances are, others would shy away from such a person, seeing him as | |
| either an informant or too dangerous to be around; the feds would pursue him | |
| passionately, like tracking a trophy-sized bull in a deer hunt. Hackers cannot | |
| be categorized as a movement, fad, or pre-packaged subculture like bubble-gum | |
| rock music or the pseudo-hippies of the 90's. Most hackers have their own | |
| directions and forward momentum. It is a shared mindset, ironically | |
| paralleling that of the feds that chase them. One group has no rules or set | |
| channels to adhere to. The other is backed by the establishment and a badge. | |
| This statement was not intended to rationalize their actions, only give insight | |
| to the uninitiated. To summarize the spectrum of motives with the hacker | |
| intellect, I give this analogy: the need to come onto someone else's property, | |
| some for peaceful exploration, others to inhabit, and in some instances to | |
| misuse or destroy is not a new phenomena. The early settlers of this country | |
| did the same thing to the Native Americans. | |
| I\/Iax I\Iomad | |
| [Mission X Tribe Out] | |
| [---------] | |
| Thanks and respect are due to: | |
| Basil Rouland Inc. (for getting me there) and URban Lividity, Jet Heller, | |
| Silkworm, and the rest of the "In The Flesh" (804-489-7031) posse that couldn't | |
| make the trip. mXt. | |
| _______________________________________________________________________________ | |