| ==Phrack Magazine== | |
| Volume Seven, Issue Forty-Eight, File 17 of 18 | |
| **************************************************************************** | |
| International Scenes | |
| There was once a time when hackers were basically isolated. It was | |
| almost unheard of to run into hackers from countries other than the | |
| United States. Then in the mid 1980's thanks largely to the existence | |
| of chat systems accessible through X.25 networks like Altger, tchh and | |
| QSD, hackers world-wide began to run into each other. They began to | |
| talk, trade information, and learn from each other. Separate and diverse | |
| subcultures began to merge into one collective scene and has brought us | |
| the hacking subculture we know today. A subculture that knows no | |
| borders, one whose denizens share the common goal of liberating | |
| information from its corporate shackles. | |
| With the incredible proliferation of the Internet around the globe, this | |
| group is growing by leaps and bounds. With this in mind, we want to | |
| help further unite the communities in various countries by shedding | |
| light onto the hacking scenes that exist there. If you want to | |
| contribute a file about the hacking scene in your country, please send | |
| it to us at phrack@well.com. | |
| This issue we have files about the scenes in Sweden and Brazil. | |
| ------------------------------------------------------------------------------ | |
| The Swedish Hacker Scene | |
| It's about time to fill up this hole in the worldwide history of hackers | |
| published in the Phrack series of articles on national scenes. Since no | |
| one else seems to be getting around to do it I'd better do it myself. | |
| Sweden was in fact one of the countries in the front line during the | |
| birth of computers in the 1940's and 50's. By 1953 KTH university in | |
| Stockholm built BESK, at the time being the fastest and most advanced | |
| computer in the world. During the late 1960's Linkoping university | |
| specialized in computer science and in 1973 the computer society Lysator | |
| started out as an offshoot of american hacker culture of the kind you | |
| could find at MIT during the 60's and 70's. They are still active and | |
| often referred to as the first Swedish hacker society ever, which is | |
| indeed true. Now days they still adhere to the international hacker | |
| ethic of university societies and among their lines are as well idiots | |
| as real bright guys (as is the case of most such societies) and their | |
| contributions to the world of e-culture include Project Runeberg; a text | |
| archive of Scandinavian literature, and a voluminous FTP archive. | |
| There's actually a lot of ASCII work being done at Lysator, including | |
| converting Phrack back issues to HTML format. | |
| Despite the early interest in computers in Sweden there was no | |
| equivalent to the American phreakers of the 1970's. This was not caused | |
| by lack of knowledge but rather by dullness. Sweden was during the 70's | |
| and early 80's in a period of both economic wealth and social mentality | |
| commonly known as "The Welfare State". Everybody was facing the same | |
| high economic standards, nobody was really displeased with Swedish | |
| society, and the government granted lots of spare-time activities for | |
| youths. Thus the growing ground for any outlaw societies was withdrawn. | |
| (Eg Hells Angels didn't start out in Sweden until the 80's.) Swedes were | |
| in fact too pleased, too wealthy and too filled up with their vision of | |
| an almost utopian society to even get the faintest glimpse of an idea to | |
| form any underground movements. Even political groupings like | |
| Anarchists, Hippies (in Europe referred to as "Provos") or Fascists were | |
| almost WIPED OUT by the extreme political climate and wealth of the | |
| 70's. | |
| Thus, phreaker culture couldn't possibly start out in Sweden at this | |
| time, though some freaked out engineers and radio-amateurs might have | |
| built blue boxes and similar equipment for their household needs. This | |
| state of society caused Sweden to lag behind other European and | |
| Scandinavian countries in the field of outlaw hacking. | |
| The first hacker activity in Sweden was reported by the authorities in | |
| 1980. The hacker in question was a student at Chalmers university in | |
| Gothenburg and was sued for manipulating the account system into | |
| granting him free access to the mainframe, for which was sentenced to a | |
| relatively light fine. Apart from some similar incidents carried out by | |
| bright individuals there was no real H/P scene until 1984. Also in 1980 | |
| BBS activity started out in Sweden. Most enthusiasts were using a | |
| Swedish micro built by Luxor and DIAB in 1978 called ABC-80 (Obviously | |
| inspired by the American TRS-80). These enthusiast, however, were well | |
| organized engineers running a straight user-group, no anarchists or | |
| radicals of any kind were ever involved. | |
| In 1984 a magazine called "Rolig Teknik" started out as an offshoot of | |
| YIPL/TAP featuring the same kind of material, and by 1987 some | |
| journalist "discovered" this magazine, causing a lot of noise throughout | |
| The Welfare State and bringing people out in a public debate of how to | |
| defeat this magazine. (Though it actually didn't feature any illegal | |
| material; even Sweden has the freedom of speech and press written | |
| explicit in its constitution, as in the American First Amendment.) | |
| "Rolig Teknik" rapidly became a cult media for underground electronic | |
| freaks, outlaw radio amateurs, and other antisocial movements. But let's | |
| not get ahead of events. | |
| By early 1984 two youths aged 17 and 19, clearly inspired by the movie | |
| "War Games", hacked their way into several Swedish computer systems | |
| using a simple Apple II and a 300 baud modem, notably DAFA-Spar - a | |
| register containing public information on every Swedish citizen. Though | |
| there were no secret data in this computer, and though these hackers | |
| never succeed in gaining root access, the incident was annoying to the | |
| authorities. Also this year, some wealthy upper-middle class youths | |
| started using the was-to-become major European home computer: the | |
| Commodore 64. What the Apple II was for America, the C-64 was for | |
| Europe. Enter the software crackers. | |
| C-64 was THE symbol of hackerdom to Swedish youths in the 1980's. As | |
| software cracker Mr.Z pioneered the hacker scene in 1983 with hundreds | |
| and hundreds of cracked games, Swedish hackers somehow got to believe | |
| that cracking games was the Big Thing for any hacker. Besides, not many | |
| of these guys had modems. By 1987 American game producers were alarmed | |
| by the Niagara of cracked C-64 software being downloaded from Europe, | |
| causing them to start copy-protecting games that were to be exported to | |
| Europe. A closer examination showed that a lot of these cracks were made | |
| by Swedish groups, notably Triad and Fairlight. Thus, most Americans to | |
| get in touch with the Swedish hacker scene were what you would refer to | |
| as the "Warez D00ds" or "Pirates" of the time. Since the Swedes were | |
| unable to phreak due to lack of knowledge in the telecom field, American | |
| warez d00ds constantly called up Swedish crackers to obtain the latest | |
| software. | |
| There seems to be some kind of misconception in the American view of the | |
| hacker culture of Europe: Not very many hackers in Sweden and the rest | |
| of Europe got into phreaking nor net hacking in these early years, | |
| perhaps with the exception of the movement in Germany caused by Chaos | |
| Computer Club. By tradition most European hackers in general, and | |
| Swedish hackers in particular, turned to software cracking and demo | |
| programming. (The Demo as an art form was invented in Europe during | |
| 1984-86.) None of these activities were actually illegal at the time | |
| being, though indeed underground. This might have helped to create the | |
| general American view of European hackers as "Idiotic Immature Warez | |
| D00ds". In fact, most European hackers look upon software cracking and | |
| demo programming with pride, though spreading (warez trading) wasn't | |
| considered a real hacker activity, and pirating for economic gain was | |
| looked upon with disgust and utter contempt. Software spreading in all | |
| forms was finally outlawed in Sweden January 1st 1993. | |
| 1986: Enter the Netrunners. | |
| By the year 1986 the legendary BBS "Tungelstamonitorn" under the | |
| supervision of Jinge Flucht began distributing H/P and Anarchy files. | |
| Jinge himself, being a social inspector and thereby fully aware of the | |
| state of society, was upset with The Welfare State and thought the | |
| Swedes had gone law-abiding in an absurd and unhealthy manner. In his | |
| view people seemed to accept laws without ever questioning them, thereby | |
| making Sweden into a conformistic utopian hell. Later Jinge joined the | |
| Fidonet where he got known for running the most explicit and intense | |
| debates in Swedish BBS-culture ever. | |
| Probably the H/P files stored at Jinges BBS were the spark that lit the | |
| Swedish net hacking scene. Swedish hackers had SEEN "War Games", HEARD | |
| about the CCC in Germany, and now they finally got their hands on | |
| documents that explained the techniques. In 1987 excerpts from Steven | |
| Levy's "Hackers" and Bill Leebs "Out of the Inner Circle" were reprinted | |
| in the Swedish computer- magazine "Datormagazin" by editor Christer | |
| Rindeblad, creating a common group-awareness among Swedish hackers. | |
| ("Out of the Inner Circle" had actually been translated to Swedish | |
| already 1985, but was obviously read mostly by security experts and War | |
| Games-obsessed wannabe's.) 1987 also saw the birth of the first | |
| all-Swedish hacker group ever to make themselves a name outside | |
| Scandinavia. This was of course SHA - Swedish Hackers Association. | |
| SHA wanted to be a hacker group of international standards and | |
| qualities. They collected the best people, storing up a knowledge basis | |
| for future use. In the years 1989-92 SHA was at its height, successfully | |
| trashing computer companies and computer scrap dumps and gaining access | |
| to hundreds of computers. Inspired by the German hackers Pengo and | |
| Hagbard in Leitstelle 511 they started having regular meetings on | |
| fridays at their own booked table in a restaurant in Stockholm. Their | |
| perhaps biggest achievement ever was made in 1991 when they wrote a | |
| scanner to exploit the Unix NIS-bug, running it on 30 processes | |
| simultaneously, and ending up with some 150.000 passwords whereof 600 | |
| gained root access. Though some would say SHA were a bit too fond of the | |
| media image of hackers and sometimes had a weakness for hacker cliches, | |
| no one can really deny their achievements. | |
| Swedish hackers also got a lot attention for their carding activities in | |
| 1989. Both Sneaker of SHA and Erik XIV of Agile wrote modulo | |
| 10-calculators to produce endless series of valid Visa-numbers. Erik XIV | |
| was even on national television, demonstrating the weaknesses of the | |
| credit card system. Cynically they were both busted. | |
| At Christmas 1990 the Swedish X.25 network Datapak and Decnet were both | |
| attacked by a group of UK hackers called 8LGM (8 Little Green Men or | |
| 8-Legged Groove Machine - I don't know which one is a media nick). Using | |
| a war dialer they scanned about 22.000 entries and successfully accessed | |
| 380 of these. This is perhaps the most well-known of all hacks in | |
| Sweden, causing a lot of media noise. (The exact figures are a product | |
| of the Swedish telephone system AXE that I will write more about in a | |
| moment.) As reported in Phrack #43 they were busted and convicted under | |
| the new British anti-hacker law. | |
| Later Swedish achievements include the phonecard emulator, constructed | |
| by Atari ST enthusiast Marvin in 1992, after hearing the Swedish phone | |
| company Telia boast of these prepaid phonecards superior security. | |
| Though these silicon-based chip phonecards (256 bytes serial EPROMs) | |
| couldn't actually be recharged or easily tampered with, he realized | |
| there was no problem in emulating the chip with a Motorola 68c705 | |
| one-chip computer. Some fake phonecards were manufactured and sold for | |
| almost nothing among his very best friends more on a "See, it can be | |
| done"-basis than with any intention to defraud Telia or earn heaps of | |
| money. Somehow the blueprints for the emulator found its way into the | |
| Internet. | |
| Swedish hackers in general have a very strong tradition of forming | |
| groups, due to their roots in programming activities rather than | |
| phreaking. Group awareness and culture is very widespread and accepted | |
| within the boundaries of the whole Swedish computer underground. Thus, | |
| LOYALTY is very strong among Swedish hackers. Most hackers who get | |
| busted by authorities or blackmailed by companies would rather DIE than | |
| telling the name of even a single 10-year old warez d00d. | |
| While we're at it - hacker busts, and phreaker busts in particular, are | |
| carried out in quite a disturbing manner in Sweden. To explain this I | |
| must first explain a bit about the Swedish telephone system. | |
| Almost all Swedish networks use a system similar to 4ESS, constructed in | |
| cooperation by the State Telecom "Televerket" and Swedish | |
| telecommunications equipment producers Ericsson Telecom. This system is | |
| called AXE, which is an abbreviation for Automatic Cross-Connection | |
| Equipment. AXE is used in some 100 countries all over the world and | |
| probably one of the most beautiful exchange systems ever developed. AXE | |
| is designed for national, metropolitan and rural networks, and the same | |
| system nucleus is used in all the different systems. It can control both | |
| digital and analog equipment, though it's made with the aim on | |
| transforming all Swedish networks from analog to digital connections. It | |
| also comes with a fully featured bureaucratic organization for | |
| maintenance, administration and economics in general. AXE has the | |
| capability of building virtual groups in switching-stations, thus | |
| putting your PBX into the telco soup as well, making you believe you | |
| have the control over it though it's actually located elsewhere. | |
| In short, this is an centralized, monolithic system of the horribly | |
| efficient type that telcos love. It tells any amateur to keep their | |
| hands off and do something else. Of course it's a system that hackers | |
| and phreakers hate, since it's limited to authorities. The filthy crowd | |
| do not know what is going on inside these exchanges, and the telcos like | |
| to keep it that way. | |
| AXE also works with stored program control that resides inside the | |
| system core of every switching station. Of course this is all software, | |
| and of course State Telecom, upon building AXE, couldn't hold back their | |
| Big Brother tendencies. | |
| The result is that every call made from anywhere to anywhere, is logged | |
| in a central computer. Now that's something! Not only did this equipment | |
| wipe out every possibility to box within Sweden, but it also removed all | |
| kind of phone privacy. In fact not only calls are logged, but ALL | |
| activity performed at your terminal. If you lift the handset, press a | |
| digit and hang up, time, date and the digit you pressed is registered. | |
| All this data is stored on magnetic tapes for 6 months. | |
| Now, luckily Sweden has a strong Computer Privacy Act. You just aren't | |
| allowed to set up and use such facilities as you please, not even if you | |
| are the State Telecom. There is even a specific authority, | |
| "Datainspektionen" (The Computer Inspection Department) with the only | |
| purpose of looking after and preserve citizen privacy by protecting | |
| individuals from corporate and governmental interests. As a result State | |
| Telecom "Televerket" (which later changed name to "Telia" as they were | |
| transformed from an authority into a private corporation as of July 1st | |
| 1993) were not allowed to give out any of the information gathered in | |
| these registers to anyone else than either the calling or the receiving | |
| party. Not even the police could have this information in case they | |
| weren't suspecting a indictable crime resulting in at least 2 years of | |
| prison, such as drug trading or terrorism, and you don't get that kind | |
| of penalty for phreaking alone - at least not in Sweden. | |
| But Telia could evade these restrictions. In order to successfully | |
| phreak using PIN-codes, you have to call an operator using a Swedish | |
| version of the 800-number: a 020-number. Telia could then claim the call | |
| was made to the owner of that number: AT&T, MCI & Sprint mostly. (There | |
| are of course Calling Cards in Sweden as well: "Telia Access" - neither | |
| used nor abused by anybody.) As well as these companies have their own | |
| intelligence agencies, so have Telia. Once eg AT&T had someone traced | |
| for phreaking, Telia could easily produce a complete list of calls made | |
| to AT&T operators from a certain number. Telia themselves would even use | |
| information they weren't allowed to: they would pull out a list of ALL | |
| outgoing calls from the phreaker in question including calls to MCI, | |
| girlfriends, mom, dad, grandma... all logged calls. | |
| Telia would then call this poor phreaker to their local Swedish office, | |
| sticking the endless list under his/her nose, commanding: "TALK, or we | |
| will turn you in to the authorities", carefully not to mention that all | |
| information on the printout would be absolutely useless in court. The | |
| only conclusive evidence would in fact be those calls traced back all | |
| the way from America or wherever the phreaker called; in that way | |
| rigorously documented. Naturally, the common phreaker had no legal | |
| experience and wouldn't know about this. Instead he would talk, giving | |
| out detailed information on his/her techniques worthy of a full-time | |
| high-educated security consultant. After this session the phreaker was | |
| given a bill of the calls that could indeed be proven in court. If | |
| he/she didn't pay it - Telia (or any other operator) would end up | |
| turning him/her to the authorities anyway. So much for cooperation. | |
| Telia themselves would, if they felt it was necessary, go even further | |
| than the overseas operators, systematically exposing every weakness in | |
| the phreakers personal life, using the information in the computer log | |
| for psychological terror. | |
| This pattern of treatment of Swedish phreakers seems to be very much the | |
| same among all telecom providers in Sweden. Lately Telia, under command | |
| of security officer Pege Gustavsson made some noteworthy mistakes | |
| though: in their efforts to convict as many phreakers as possible, they | |
| called up companies receiving calls from "suspicious" individuals, | |
| warning them about this or that person calling them over and over again. | |
| This could only mean Telia was also systematically monitoring some | |
| Swedish hackers and had formed some security group to carry out this | |
| probation. Normally this should have been kept quiet, as Telia are | |
| absolutely not allowed to form their own abuse police forces, but at | |
| some instance they happened to call up a security company using | |
| phreakers as informants. Of course this security company didn't like the | |
| idea of having "their" phreakers traced around, and the matter was | |
| brought to public attention. Many independent sources agreed that Telia | |
| had violated the Swedish Computer Act, and hopefully this brought an end | |
| to this wild tracing. You shouldn't be too sure though, since Telia | |
| themselves never confessed of doing anything illegal. | |
| As you might have understood the Computer Act is quite an important | |
| factor in all legal discussions concerning Swedish hacking. This Act | |
| came out as a result of general attention focused upon the computers vs. | |
| privacy matter in 1973. As Sweden was one of the first countries to make | |
| use of computers in governmental administration, and as Swedish | |
| authorities were eager to register every possible piece of information, | |
| some politically influential individuals started a debate resulting in | |
| the founding of the Computer Act and the Computer Inspection Department. | |
| As a result Sweden is light years ahead of most countries when it comes | |
| to privacy matters. For example there is no problem in having the number | |
| identification possibilities on your line deactivated for good, and it | |
| won't cost you anything. You can also easily obtain free printouts from | |
| any computer register containing information on you, including the | |
| register at your local AXE-exchange. | |
| To sum this article up I can draw the conclusion that even Sweden has | |
| had its handful of bright hackers, each category bringing their straw to | |
| the stack. Even though Swedish officials and companies would hardly | |
| admit it, these hackers have obviously been very important for this | |
| country, at least in forcing system managers, security officials, | |
| software producers, policemen, politicians and so on to think things | |
| over. Sweden has also attracted outside attention in some cases, and | |
| will probably keep doing so. If you should pin- point one group that has | |
| meant more to the Swedish scene than any other, it wouldn't be any of | |
| the H/P groups, but rather the cracking pioneers Fairlight - a well | |
| organized and world-famous warez producer. | |
| Linus Walleij aka King Fisher / Triad | |
| triad@df.lth.se | |
| (Some handles have been changed to protect retired Swedish hackers from | |
| luser mail.) | |
| Swedish readers may be interested in the fact that I'm currently writing | |
| a lengthy text in Swedish (a book actually) providing a closer look at | |
| Swedish hacking history, which will be released on hypertext and ASCII | |
| sometime later this year. Over and out from Sweden! | |
| --------------------------------------------------------------------------- | |
| HACKING IN BRAZIL | |
| ================= | |
| Before talking about hacking here, it's good to describe the conditions | |
| of living. Right now, the country is a mix of Belgium and India. It's | |
| possible to find both standards of living without travelling long | |
| distances. The Southern part of the country concentrate most of the | |
| industry, while in the west one can find Amazonia jungle. There are many | |
| Brazils, one could say. | |
| Beginning with the hacking and phreaking. | |
| Hackers and computers enthusiasts have several different places for | |
| meeting. When this thing started, by the time of that film "Wargames", | |
| the real place to meet hackers and make contacts were the computer | |
| shops, game-arcades and "Video-texto" terminals. The computer shops were | |
| a meeting place because many of those "hackers" had no computers of | |
| their own and the shop-owners would let them play with them as part of | |
| a advertising tool to encourage people buying it for their kids. | |
| Today that is no longer needed, since prices dropped down and people | |
| make a team already at schools or sometimes just join a BBS (most people | |
| who buy a modem, end up thinking about setting up a BBS). By the way, | |
| most schools are advertising computer training as part of their | |
| curricula, to charge more, and like everywhere, I guess, people no | |
| longer learn typewriting, but computer-writing, and many brazilian | |
| newspapers dedicate a section on computer knowledge once a week, with | |
| advertising, hints, general info and even lists of BBS's. | |
| A few years ago, the "Video-texto" terminals were also big meeting | |
| places. That was part of a effort to make popular the use of a | |
| computer linked by modem to get services like msx-games, info on | |
| weather, check bank account and so on. Just like the Net, one could do | |
| e-mail, by some fancy tricks and other things that could be called | |
| hacking. The difference was that it was made by the state-owned | |
| telephone company and each time the trick was too well know, it was | |
| changed. The only way to keep in touch was keeping in touch with the | |
| people who used the system like hell. It's no different than what it | |
| happens with the computer gurus. The protocol used for that, X-25 is the | |
| same used for the banking money transfers, but don't think it was | |
| possible to do anything more than checking how much money one had and a | |
| few other classified data. People who used that at home (not too many, | |
| since the company didn't think it would be such a hit, and didn't | |
| provide for it) could spend their fathers money discovering funny things | |
| about the system, like messing with other people's phones and so. One | |
| could also use the terminals at the Shopping Centers to make phone | |
| calls to their friends without paying. The guy at the other end would be | |
| heard by the small speaker. | |
| Phreaking here in Brazil is something secret. Apart from the trick | |
| described in the section "Letters to read by" at the summer 1994 of the | |
| 2600 Magazine, where one would call through locked rotatory telephone, | |
| little is known about phreaking. One thing is that people who enrolled | |
| in Telecommunications Engineering could call Europe and USA with ease, | |
| but they would not tell you how. It must be said that all public phones | |
| have metal cables around the cables and that the phone machines are | |
| quite tough to break down. I guess it wasn't for beauty. | |
| The phones use some sort of metal coins called fichas, which must be | |
| bought somewhere. The trick is to use a coin with a string, so it would | |
| not be collected. But if the police caught... The police doesn't follow | |
| rules about that. Either they put a fine on the guy for that, or arrest | |
| him for vandalism or anything else they think of at the moment. It is | |
| hassle, anyway. My friend who was doing electrical Engineering told me | |
| that boxing in Brazil was impossible. The system is just not good enough | |
| to be boxed. Another friend of mine told me that in the Northeast part, | |
| where people are a little bit different and more easy-going, the phone | |
| system can be boxed, because some top-brass asked the company to let | |
| that feature implemented. The Phone company doesn't admit any knowledge | |
| about that. | |
| Internet access is something quite hard to get today. Until a few weeks | |
| ago, the system would not let the creation of a Internet site that was | |
| not part of some research project. So, only Universities and like were | |
| capable of putting people in the Net Universe. In the University of Sco | |
| Paulo, people in the post-graduation courses could get it with ease, but | |
| graduating students would have to show some connection to a research | |
| project. That in theory, because the students found out that one could | |
| use the IBM CDC 4360 to telnet without a Internet account. Also, all the | |
| faculties that had computer rooms full of AT 386 which where linked by | |
| fiber optics to this computer. Another one did the file transfers | |
| between the accounts and the computer at the computer rooms and that | |
| ftp was also possible without an account, but only to a few sites, like | |
| oakland and so. That lasted for about a year, until that thing was | |
| fixed in the router, but only at the Politechnik School. Says the legend | |
| that the guys were downloading too much GIF and JPG pictures of Top | |
| Models from a ftp site nearby. That spent so much bandwidth that the | |
| site started to complain and both things happened: the site stopped to | |
| store GIF's of wonderful women in swimsuit and the router was fixed to | |
| prevent ftp without a Internet account. One can still today connect the | |
| outside world via telnet and many people have accounts in Internet BBS | |
| like Isca BBS, Cleveland Freenet and like. The Bad Boy BBS was "in", | |
| until it went out of business. This kind of access is not good, though, | |
| for it is very slow, sometimes. Also, it is hard to download something | |
| bigger than 60 kbyte. The way I devised, downloading the file inside | |
| the bbs and uuencoding it. This way you could list the file and capture | |
| the screen listing, uudecode it after some editing and have a working | |
| .exe or .zip file. | |
| By these means one could, inside the Campus, do all downloading one | |
| wanted, from anywhere in the world. Outside the campus, it is possible | |
| to do it by phone lines, but: the Modem will not go faster than 2400 | |
| without character correction (no Zmodem at all). Which makes quite hard | |
| to download compressed files. One could an account: that would be | |
| possible by these means, but the amount of trash during the phone | |
| connection would make it real hard to type in passwords and like. To try | |
| doing any kind of thin g but reading letters by modem is some kind of | |
| torture. The real thing is to do it by "linha dedicada", a special line | |
| for computer transmission. It's much more expensive though, but if you | |
| have the money to spend with that... | |
| Perhaps the best way to get access to an Internet account though is to | |
| be part of the research project "Escola do Futuro" that among other | |
| things get schools linked by the Net. That's what I did and they pay me | |
| quite well to search for data in the Net, for the students of those | |
| schools. The University of Campinas is said to give all students a | |
| Internet account regardless of knowledge of what-it-is, as soon as the | |
| guy(girl) gets in. Of course here there's BITNET also. That's doomed for | |
| extinction, but this or that reason keeps people from closing it down. | |
| Most teachers use it, guess there's even some post-graduation work | |
| written about that. It's easier to access via modem, also. Old habits | |
| die hard. | |
| Outside the Campus, for common people, there are few opportunities. The | |
| only thing you can get, at least until the opening of commercial | |
| internet sites, something about to happen one of these days, is access | |
| by mail. You join one BBS with Internet access, and your mail is sent by | |
| a Internet account later during the day. This is not a direct access, | |
| as one can see, but it's a easy way to access by modem. Problem is that | |
| you have to pay if you use it too much. The BBS's that do it don't do it | |
| for free, also. Connection to the Compuserve is also possible, but it | |
| also costs a lot of money, for my point of view. | |
| Because of the newspapers, the knowledge about Internet is spreading | |
| fast and the number of sites is growing the same way everywhere else in | |
| the world. Even the military people are starting with it. There are plan | |
| s to enhance it and make better connections, and some informative | |
| material is being translated in Portuguese, like "Zen and the Art of | |
| Internet" and made available in the gopher.rnp.br. There are many | |
| mirrors from many famous sites, like Simtel20 and at least one Internet | |
| BBS, the "Jacare BBS" (Alligator bbs, available by telnetting | |
| bbs.secom.ufpa.br - 192.147.210.1 - login bbs. World Wide Web sites are | |
| becoming sort of popular also, but still available only to a few people | |
| who are lucky enough to get the access. Brazilian hackers are not very | |
| fond of sharing the knowledge of how to get access and other things, | |
| sometimes because of fear of losing it, sometimes because the greed of | |
| it would overcharge the system. There's no hacker magazine here, yet, | |
| and very few people confess their curiosity about hacking for knowledge | |
| for fear of not finding jobs. Anyway most would-be hackers either get a | |
| job and stop hacking for fun or keep their activities secret in order to | |
| pursue their objectives. | |
| Today, Brazilian Hacker Underground did change a little. Lots of | |
| magazines, dealing only with Internet Issues, are being published. There | |
| is a hacker zine, the now famous "Barata Eletrica". This and the hacker | |
| list I created is starting to unite the computer rats, here. But I had | |
| to stop hacking in order to write the e-zine. Too famous to do that. | |
| Another guy just started the thing. He did not learn with my mistake and | |
| is signing it with his name, also. Received lots of letters, even as far | |
| as Mozambique, praising the material, which is very soft, for fear of | |
| losing my net access. Twice my account was "freezed". The people at my | |
| site are paranoid. Suffered too much from break-ins already. Most BBS's | |
| are trying to turn themselves in Internet providers or else, to get | |
| e-mail access. There was a fear the State would control the thing, like | |
| they did with the Phone system. Can any of you guys imagine what it is, | |
| to pay 4.000 US$ dollars for a phone line? In the City of Sao Paulo, | |
| (look like L.A., one can say), that's the average price. Cellular is | |
| cheaper. Motorola rules. The public phone system was changed again. No | |
| more "fichas". At least for long distance calls. It's a small card that | |
| looks like plastic one side and magnetic material in the other. m still | |
| trying to do 2600 meetings. Oh, once in a while, there is a break-in | |
| here and there, and a hacker is interviewed in TV, but people are only | |
| now making the difference between the good guys (hackers) and the bad | |
| guys (crackers). With Win95, people are losing fear of exchanging | |
| virus-sources files. The lack of philes in Portuguese makes it dificult | |
| for people to learn about hacking. People who know about it, don't have | |
| enough time to write. I started to unite some guys to do a translation | |
| of "hacker crackdown", but that's another story. I shortened the name of | |
| the book to "crack.gz". Guess what's happened? My account is blocked up | |
| to this day. They told me I'll get my access back. One of these days. | |
| One of these days I'll re-write this article, and tell the whole thing | |
| in detail. | |
| Any Portuguese speaker that does not know about my e-zine, | |
| try a ftp.eff.org mirror. The URL: | |
| ftp://ftp.eff.org/pub/Publications/CuD/Barata_Eletrica | |