Guest User

Untitled

a guest
Jun 30th, 2016
172
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 63.95 KB | None | 0 0
  1. _
  2. | \
  3. | \
  4. | | \
  5. __ | |\ \ __
  6. _____________ _/_/ | | \ \ _/_/ _____________
  7. | ___________ _/_/ | | \ \ _/_/ ___________ |
  8. | | _/_/_____ | | > > _/_/_____ | |
  9. | | /________/ | | / / /________/ | |
  10. | | | | / / | |
  11. | | | |/ / | |
  12. | | | | / | |
  13. | | | / | |
  14. | | |_/ | |
  15. | | | |
  16. | | c o m m u n i c a t i o n s | |
  17. | |________________________________________________________________| |
  18. |____________________________________________________________________|
  19.  
  20. ...presents... Confessions of a C0dez Kid
  21. by Dark Sorcerer
  22.  
  23. __//////\ -cDc- CULT OF THE DEAD COW -cDc- /\\\\\\__
  24. __ Grand Imperial Dynasty __
  25. Est. 1984 \\\\\\/ cDc paramedia: texXxt 395-08/09/2004 \////// Est. 1984
  26.  
  27. ___ _ _ ___ _ _ ___ _ _ ___ _ _ __
  28. |___heal_the_sick___raise_the_dead___cleanse_the_lepers___cast_out_demons__|
  29.  
  30. What seems like a long time period at age thirteen seems significantly
  31. shorter when you're over double that age. With that in mind, the entire
  32. "hacker phenomenon" should be viewed as an extreme bit of ephemera, the result
  33. of a naive convergence between technology and what can be stereotyped as
  34. 1980's teenage angst and rebellion. The "hacker kid" became (in a matter that
  35. Jean Baudrillard would be proud of) not only a reflection of ourselves, but an
  36. ideal we aspired to as well... and was really only a viable archetype for less
  37. than ten years. This should be kept in mind by any third-party who's
  38. attempting to put this scene in some sort of historical perspective. This
  39. file specifically relates experiences of those of us who saw John Hughes
  40. movies at an actual movie theater back in the 80's. ("Hackers" generally
  41. meaning self-described phone phreaks and those who obtained unauthorized
  42. access to corporate computer networks, not just people good with computers).
  43.  
  44. These ramblings were inspired by my recent discovery of some old BBS
  45. buffers and text files I had booted up on my old Apple II while recently
  46. visiting my parents' house. Luckily (or unluckily) for you, I have a
  47. near-photographic memory of all of these events.
  48.  
  49. This surely has thousands of corollaries from around the U.S. My
  50. question is: where are you all now?
  51.  
  52. My father had been transferred to Peterson Air Force Base in Colorado
  53. Springs, CO at the beginning of the summer in 1986, right during some extreme
  54. hormonal changes on my behalf. I was twelve years old at the time, and had
  55. absolutely nothing to do, with no kids in my neighborhood. In lieu of this,
  56. my mother signed me up for a BASIC programming class for "gifted" (or perhaps
  57. just geeky) kids at one of the local high schools. Of course, the class was
  58. really more about playing video games and networking with other fledgling
  59. geeks than it was about programming. But the last day of class was devoted to
  60. something I'd always been interested in: the modem.
  61.  
  62. I'd been fascinated by modems for years and finally my father had
  63. purchased a NetWorker modem during late 1984 for our Apple II, but due to only
  64. having one local BBS to our old house in Iowa and my father's unwillingness to
  65. pay for CompuServe I had quickly lost interest in it. To call this modem
  66. primitive by today's standards would be an understatement; while it lacked the
  67. classic acoustic coupler design (made famous by "WarGames", therefore becoming
  68. engrained in the public mind as what a modem looked like) it did not have any
  69. sort of auto-connection feature. This meant that when you dialed in and heard
  70. a carrier tone, you had to press a switch exterior to the computer to connect
  71. to the desired baud rate (110 or 300). This 300-baud monstrosity was about
  72. the cheapest modem on the market, but at $200 (in 1984 dollars) was still
  73. relegated to at least middle-class youth and their associated parents.
  74.  
  75. We briefly touched on the subject of bulletin-board systems (BBSes) and
  76. our instructor provided the numbers for a couple of local systems, which I
  77. proceeded to call when I got home. They were fairly typical and boring for
  78. the time: systems frequented by off-duty COBOL programmers run on a variety of
  79. home-grown systems, perhaps TRS-80's or something running CP/M, exchanging
  80. messages on the dry subjects of sports and politics. However, I did manage to
  81. stumble on a list of other local bulletin boards, and of course the ones that
  82. intrigued me were ones with the following names:
  83.  
  84. Valhalla (?)
  85. Elite Connection 548-9519
  86. Underground Star 390-0783
  87. Adventurer's Cove 598-6669
  88.  
  89. At the time, there was not nearly the stigma associated with hacking or
  90. piracy in the general computer community that there is now, and there was very
  91. little concern about what the "proper" uses of computers were in the general
  92. BBS community. Many people were not even aware they were breaking the law by
  93. having pirated software around the house, and software was freely copied at
  94. computer users' groups and the like. Many older BBSers were 60's types with
  95. some sort of anti-establishment bent, and even in 1986, you were still
  96. considered more than just a little weird if you had anything to do with
  97. computers. Even sysops of "respectable" boards (the ones where old guys
  98. talked about politics) might know a bit about making a Blue Box or have a copy
  99. of the latest game you wanted. I would imagine that thousands of other people
  100. were therefore exposed to what is now called "computer crime" in such a
  101. benign, clueless way.
  102.  
  103. Calling the aforementioned boards would end up causing a dramatic change
  104. in my life, but I had no idea at the time. The first system I ended up
  105. calling was Valhalla, a part-time BBS (the type that was NEVER up during its
  106. purported hours of operation, usually run by a junior-high school kid who
  107. didn't have the money for his own phone line.) But on this particular
  108. occasion, the board happened to be up. I dialed in and proceeded to log in as
  109. normal; the Sysop (one "Loki Odinsson") ended up breaking into chat mode
  110. immediately and offered to verify my access on the spot and call me back
  111. voice. He was running a part-time BBS off of a Commodore 64 with one floppy
  112. disk drive, and apparently I was his only user thus far along with his best
  113. friend, who had chosen the handle Thor Odinsson. The details of the
  114. conversation are hazy, but I do remember him making allusions to "hacking MCI"
  115. and him somehow providing me with a list of long-distance Commodore 64 pirate
  116. BBSes, with exotic names like "The Gates Of Hell and "Underground Empire".
  117.  
  118. I proceeded to call The Gates of Hell next. I logged in, and remember
  119. navigating through the message boards, where people cursed at each other on
  120. "The War Board", engaged in the then-raging Apple II vs. Commodore 64 debate,
  121. and wrote stories on the "Sex Board" (I'm sure in retrospect, a bunch of sex
  122. stories by what surely were a bunch of 15 year old virgins would be highly
  123. comical.)
  124.  
  125. Scared of the phone bill, I logged off after ten minutes, and proceeded
  126. to call the other numbers local to me. The Elite Connection was next, and its
  127. new user log in page had tons of scary information about "entrapment" and how
  128. each user must provide their actual voice number for verification. I did as I
  129. was told, curious to see if anyone would actually call me. (No one ever did.)
  130. The message boards on the Elite Connection were filled with vague references
  131. about hacking and phreaking, and the system did not seem terribly active.
  132. However, there did seem to be a raging local war between the Warlock (the
  133. sysop of the Underground Star) and The Master Kracker, a local Apple pirate,
  134. each of which saying they were going to kick each others' asses and the like.
  135. The Warlock also seemed to misspell every other word in his posts, for some
  136. sort of dramatic effect. This also seemed to be an extension of the Apple vs.
  137. Commodore 64 thing, with the Elite Connection's C64 using sysop Night Runner
  138. backing The Warlock with Apple II pirate The Assassin backing The Master
  139. Kracker. The Apple users were part of some local group called "PPPG" (Pikes'
  140. Peak Pirates' Guild.) The C64 vs. Apple thing was very predominant during
  141. this time period, and was, in my opinion, steeped in class conflict. In
  142. retrospect, the C64 was not a bad computer, and had much better graphics/sound
  143. and (important for every teenage geek) consequently, video games. But the
  144. Apple was more predominant in upper-middle class America, with all of the
  145. logical consequences not worth going into here.
  146.  
  147. At this point, I was getting tired, so I proceeded to log off and call
  148. the Underground Star, which was filled with more of the same sort of thing. A
  149. couple of days later, I called the Elite Connection back, and made a
  150. solicitation for anyone who wanted to trade "APPLE GAMES". I had made posts
  151. on BBSes before, but still had no idea how to transfer files over the modem.
  152. When I called back the next day, I had an e-mail from The Assassin, whose real
  153. name was John, to give him a call at 574-2872. I gave him a call, and as it
  154. turned out he was a sophomore at the same high school I had gotten my
  155. introduction to BBSes at. He was also lacking a 1200 baud modem, which at the
  156. time meant being restricted access to all forms of pirate BBSes due to its
  157. slow speed. Being a 300-baud only user in 1986 was the equivalent of being an
  158. untouchable in India; you generally only associated with other untouchables
  159. and no one wanted much to do with you.
  160.  
  161. John was friendly and patient with me, and he had many new games that I
  162. wanted. He sent me a copy of Dalton's Disk Disintegrator which allowed for
  163. the compression of an entire Apple II floppy into one file, and then we did a
  164. 300-baud transfer of the Activision game Hacker, which took about two hours.
  165. If you've never seen text slow by at 300 baud, suffice to say that most
  166. college graduates can probably read text faster than 300 baud can scroll by.
  167. He also sent me a copy of a couple of other programs he seemed very impressed
  168. with himself for owning - Time Bomb and Microhacker. He also made references
  169. to "hacking MCI" and I asked him for further clarification. The clarification
  170. went something like this:
  171.  
  172. "Dial 630-TIME, and start entering codes starting with 10000, followed by
  173. a number. If the number goes through, you have a good code. If not, redial
  174. and start with 10001, etc." In retrospect, dialing codes incrementally,
  175. starting with the same value every time, was incredibly bad advice, although
  176. no one ever seemed to get busted by MCI locally.
  177.  
  178. After we had finally transferred Hacker after a couple of aborted attemps
  179. and staid conversation, The Assassin had started to grow a bit impatient with
  180. me, probably annoyed by this twelve year old kid who kept asking him what
  181. other games he had. (He proved a bit short with me on subsequent phone calls
  182. to his house.) However, now I was armed with the knowledge on how to make
  183. free phone calls, plus I had a couple of weird-sounding hacker programs in the
  184. form of Microhacker and Time Bomb. Microhacker was a tool written by a Denver
  185. local to hack "MetroPhone" (I had no idea what that was) which didn't work due
  186. to its requiring a modem with autoconnect capabilities, and Time Bomb allowed
  187. you to format someone's disk after a specified number of boots and display
  188. what was invariably a smart-ass message, something that would allow for much
  189. jocularity with the kids at school who always wanted to come over and copy
  190. games from me. The Assassin also gave me a copy of ASCII Express, which
  191. allowed exchange of files with the Xmodem protocol in addition to being one of
  192. the most obscure, hard-to-learn, and powerful terminal programs ever
  193. developed.
  194.  
  195. I decided to call 630-TIME. I dialed the number, and after several
  196. seconds a weird droney sounding tone greeted me. I dialed 10000, followed by
  197. a random long-distance number in Denver. The number immediately rang, and a
  198. stock corporate-announcer female voice stated that "The access code you have
  199. entered is not valid." This voice was a bit unnerving, so I did not try to
  200. "hack" any more codes that night.
  201.  
  202. Since I had nothing to do, I started calling the Elite Connection,
  203. Underground Star, and several other local boards on an almost daily basis,
  204. although I didn't make that many other voice connections due to my owning an
  205. Apple II, and most of the bulletin boards local to me were Commodore 64 in
  206. nature. This quickly proved to be boring, as most of the boards didn't get
  207. more than a few posts in a day. As the summer dragged on, I became more
  208. impertinent and started to lose fear of "hacking MCI." Finally, one day the
  209. sysop of the Elite Connection, Night Runner, broke in after I had tried
  210. (C)hatting with him. He also proved to be mostly friendly and offered a
  211. "PHREAK CODE" (I was mostly using an old Apple II+ computer, and did not have
  212. a lower-case modification key) as well as telling me to call a better board in
  213. the Dallas, TX area that was more active and dedicated to hacking, the
  214. "Thieve's Underground" (sic.) In hindsight, he was probably just sick of me
  215. calling every single day and tying up his line. He also offered me access to
  216. the "Elite!" section of his BBS, where people would post information on
  217. hacking and phreaking, piracy, and other things.
  218.  
  219. Somewhat nervous, I called 630-TIME and entered the code Night Runner had
  220. offered, followed by the number for the Thieve's Underground. Unlike previous
  221. attempts, the number did not immediately ring, but hung there for some time
  222. until a remote ring could be heard. (We were not even on ESS1A in Colorado
  223. Springs at that time, and it sometimes took 20 or more seconds to dial a LOCAL
  224. number - we were in Crossbar, with a couple of areas even in Step by Step. If
  225. I had even known about a Blue Box at the time, I could have actually used that
  226. instead of these MCI codes.) I then got carrier and proceeded to connect to
  227. the Thieve's Underground. It was definitely the most hardcore BBS I had ever
  228. seen at the time, again requiring a "real phone number" for verification and
  229. certification that "you are not a member of any law enforcement agency".
  230. Additionally, it required you to define some "hacker terms" which I failed at
  231. miserably: what was COSMOS? What was TELENET?
  232.  
  233. Needless to say, I was rejected from the Thieve's Underground. But from
  234. that point forward, I was determined to find out what exactly the terms were
  235. that I didn't understand. But of course, I was still concerned with getting
  236. all of the new games I didn't have access to and that would only be possible
  237. with the fabled 1200 baud modem.
  238.  
  239. In the meantime, I'd also been granted access on a board called Skeleton
  240. Island in Richmond, VA, (I believe at 303-747-8920) a board that was a
  241. complete throwback to what looked like it must have been about 1982. The
  242. sysop, "The Skeleton", was running custom-built software on an Apple II
  243. computer with a ten megabyte hard disk, completely devoted to text files! It
  244. was here that I first started reading about the history of hacking, as amongst
  245. all of the files there were all-caps transcriptions of old TAP Magazine
  246. articles, some of the first things I had read about hacking. (The board
  247. wasn't exactly updated regularly, so what were considered newer hack/phreak
  248. periodicals such as PHRACK were left out.) In TAP Magazine's mind, evil was
  249. personified in the form of the pre-antitrust Bell Corporation, and I read
  250. about how Bell harassed its employees as well as phreaks, even driving one to
  251. suicide. I read about how to construct a Blue Box and a Black Box, Cheshire
  252. Catalyst's "Hacker's Anthem", and some file called "A Man Called Boris" about
  253. a Russian expatriate who was ripping off the Soviet government by thousands of
  254. dollars by insuring mail to dissidents, who would be refused delivery, forcing
  255. the government to pay up. There was some article on how to coat stamps with
  256. Elmer's Glue and reuse them, as well as a huge BBS list from about 1983, and
  257. information on removing copywrite protection from games.
  258.  
  259. It's undoubtedly true that no small amount of kids were influenced by the
  260. anti-establishment, libertarian philosophies that permeated these types of
  261. boards. The range of anti-authoritarianism ran the gamut from left-wing
  262. socialism to good 'ol boy giving the middle finger to the US government, but
  263. libertarianism was the dominant theme. In addition, it still wasn't *that*
  264. risky to engage in hacking and phreaking, so it had the allure of a restricted
  265. activity without the risk. The demographic was pure 1980's - almost strictly
  266. white adolescents, with no small amount of passive (or even overt) racism.
  267. Certainly, no effort was made to incorporate this raw teenage angst into a
  268. more far-reaching critique of power or authority of any sort, but it did make
  269. it "OK" to feel pissed off at the world around you. Hackers were basically
  270. punks and misfits with computers, and were usually smarter than the rest of
  271. their peers. Being exposed to what seemed like such powerful information did
  272. not help many of us adjust to life in the "real world", where you had to learn
  273. some sort of bounds of acceptable behavior. But in the beginning, it was
  274. merely benign curiosity about the world that got almost every kid who has a
  275. story like this involved with "computer crime", not some sort of malicious
  276. intent - that was what always confused the authorities.
  277.  
  278. I had continued down the boring path of being a 300 baud, mostly local
  279. user, calling the same boards too many times, although I did learn how to scan
  280. our local Telenet ports for remote systems. Unfortunately, I had little idea
  281. how to hack into them (I did obtain access with a couple of typical
  282. username/password combinations like JOHN/JOHN and TEST/TEST), completely
  283. clueless as to what I was doing, especially with what to do once in the
  284. system.
  285.  
  286. I continued my path in 300-baud loserdom until Christmas of 1986, at
  287. which point I received a 1200 baud Prometheus ProModem as my Christmas
  288. present. It wasn't the Apple-Cat that I wanted, but to have 1200 baud was
  289. incredibly exciting nonetheless. Now I could actually call "real" BBSes,
  290. (most of which would either hang up immediately or echo an insulting message
  291. like "Call back when you get a real modem" if attempting to connect at 300
  292. baud). After some consternation (ASCII Express stopped giving me my "->"
  293. prompt I was used to with the new modem, expecting the Hayes "AT" command set
  294. instead) with configuration, I proceeded to call The Roadhouse BBS in Anaheim,
  295. California, which had always refused to let me "Run AE" at 300 baud, but let
  296. me in with no problem at 1200 baud. Now I could get all of the latest games -
  297. the first one I downloaded was Shard of Spring - and the MCI code I used to
  298. call insured that it was all free, free, free.
  299.  
  300. This also was my earliest memory of a paranoid way of thinking that I
  301. still get tinges of to this day - the feeling that every "kodez kid" had when
  302. your phone would ring IMMEDIATELY after you would hang up after calling for
  303. free; that sinking feeling that they were "tracing" you that whole time,
  304. calling you right back to let you know your number was up! Even worse, you'd
  305. sometimes start thinking that they "traced" you, but you wouldn't know until
  306. the police came knocking at your house two weeks later. There was always an
  307. inclination to say that the next time you'd use those damn codes would be the
  308. last, at least until you realized how expensive long distance was back then
  309. (even night-time rates were often more than $.20 a minute, quite a bit for a
  310. 13 year old kid with no job.) There was really no way to stop once you
  311. started.
  312.  
  313. I wasn't too worried about the codes though - no one else had been busted
  314. for using them, although I did receive a scare when someone who said they were
  315. from the (FBI? Mountain Bell? I can't remember) called my house, saying they
  316. were logging all calls to the Elite Connection since so many bootleg phone
  317. calls had their destination there, and I was calling it a lot, even though it
  318. was local. I still don't know if this was complete bullshit or not, although
  319. that's my inclination with the benefit of hindsight. At the time though, the
  320. person calling did seem "official", and if it was a joke on the part of the
  321. Sysop, they didn't make an effort to make it very humorous - surely any good
  322. teenager would have punctuated a hoax like that with a bit of humor. But
  323. sadly, even the "FBI" calling my house didn't seem to deter much of the
  324. behavior I was going to get involved with over subsequent years.
  325.  
  326. I was now determined to get involved in the pirate scene, with its
  327. promise of unlimited "wares"; games would be available to me right after being
  328. released on the market! One of the first boards I called was the Trade Center
  329. in New Jersey (201-256-4202), the headquarters of the Apple pirate group
  330. Digital Gang. Digital Gang, as I remember, was composed of about half
  331. absolutely brilliant programmers (one in particular was named Tom E. Hawk, who
  332. did extensive modifications to the Dalton's Disk Disintegrator utility) and a
  333. couple of locals in 201 named The Triton (Eddie) and High Voltage (Tony). The
  334. former was rumored to be a high school dropout, who was some fat rich kid who
  335. had a lot of money to buy software and run the Trade Center, and High Voltage
  336. was another 14 year old rich kid who lived nearby. I knew that I had to get a
  337. reference from a "real" pirate board in order to get accepted on other pirate
  338. boards - you needed references of other boards you called as well as other
  339. "reputable" pirates to get accepted. I had no idea how to start doing this,
  340. but you could send a donation to the Trade Center, which I assumed would get
  341. you access. I sent in a paltry $5 donation and The Triton granted me access
  342. to the Trade Center, which gave me a slight bit of clout in the pirate world.
  343. I'd also gotten a lower-case modification for my Apple II+, so I could use
  344. that computer without that sure sign of rodenthood - having to post in all
  345. caps.
  346.  
  347. With 1200 baud, I immediately started to trade all of the software I
  348. could get my hands on. I quickly left the realm of some of these 714 pirate
  349. boards I was calling (because they accepted 300 baud users) and started
  350. calling some of the "top tier" pirate boards in the country. Despite an early
  351. rejection from Remote Hideout (818-999-3680) I was accepted on every other
  352. board I called. There was an awesome board in 213 called the Norse Wanderer
  353. that had custom BBS software, and you had to be voted on by other users on the
  354. board (the sysop actually let me on without being voted on, one of the early
  355. "breaks" I got in the scene.) There was The Citadel at 213-493-2011, which
  356. was ALWAYS busy but always had the latest wares with no credit system - you
  357. could call and leech for hours if you wanted. There was Club Zero in 213 as
  358. well, run by Pac-Rat. The Abyss at 818-993-7422 , which I had to call at 300
  359. baud due to its being a "202" only board (202 was the Apple-Cat's proprietary
  360. half-duplex 1200 baud standard), but which had some great discussions on
  361. religion, politics, and music, which was sysoped by Dark Cavalier (I'd chosen
  362. "Dark Sorcerer" as my alias at the time, as it seemed like there were a lot of
  363. other "Dark whatever" type aliases, i.e., Dark Prophet, Dark Dante, etc.)
  364. There was Red-Sector-A at 313-591-1024 run by the Necromancer and best of all,
  365. the Curse at 612-544- 3980. The Curse was run by The Incognito and was a
  366. message-only board that was very popular. The Incognito had lots of really
  367. cool modifications to his board, as he had taken to programming after being
  368. busted for credit card fraud (sometime in 1984, I believe - he wrote a text
  369. file about it called "The Day The Secret Service Raided My House" or something
  370. along those lines, in addition to authoring "How To Spot A Loser On A BBS").
  371. There was an area where you could simulate logging in to vintage-era Apple II
  372. pirate boards like the South Pole, the Arabian Dezert, and Sherwood Forest, as
  373. well as hack/phreak boards like Plovernet, World of Cryton, and Blottoland.
  374. These boards seemed ancient at the time, but in fact it had really only been
  375. three years since they had gone down (again, the time-perspective of a 14 year
  376. old is very different. Three years seems like nothing to a post-college
  377. grad.)
  378.  
  379. There was also a blank "graffiti wall" area, which I remember as being
  380. the current home of a war between The Martyr, a pirate from Braintree, MA who
  381. ran a board called Brave New World, and assorted other pirates like Touch Tone
  382. and Sorcerer's Apprentice. I remember anonymous comments like the following:
  383. evidently The Martyr said he had some sort of "connections" and was going to
  384. fuck up the other members, which solicited comments about The Martyr evidently
  385. being in a wheelchair, in addition to being incredibly ugly (Sorcerer's
  386. Apprentice said that "I can't wait until your ugly face is in a 34 sector
  387. BFILE for all us ][ folks out there and a full-blown GIF for the IIGS
  388. people"). In what could have been an unrelated incident, Touch Tone made
  389. claims to being in the Mafia which elicited similar sorts of disdain. It was
  390. all highly entertaining.
  391.  
  392. There were also quite a few "AE" systems still floating around (as well
  393. as Cat-Fur systems, which didn't apply to me). This was simply ASCII Express
  394. in remote mode, where you could call a remote system and transfer files back
  395. and forth after entering a password. The most famous of these was probably
  396. the Metal AE at 201-879-6668, (pw: KILL) which to my knowledge was the
  397. absolute last surviving such system in the country (the sysop even kept it
  398. running on two floppies after his 10 meg drive crashed!) These systems could
  399. be highly entertaining due to their graffiti-wall, free flowing nature. A
  400. typical 10 or 20 meg AE system would probably be 20% software (usually older,
  401. but good for picking up some older stuff that you missed earlier on), 20-30%
  402. textfiles, and a bunch of blank two-sector text files people would upload with
  403. "file names" ragging on other users or sometimes with a really mean or racist
  404. content to them (remember, things were much less sensitive 10-15 years ago,
  405. and these are pissed off white suburban kids we're talking about.) The sysop
  406. of the Metal AE, Lustfer Death, was also infamous for busting into chat mode
  407. unexpectedly and asking questions like "Got any codes" or "Why do you smoke
  408. pot"), the latter evidently just for entertainment value.
  409.  
  410. The whole pirate scene was fun, but lost its lustre pretty fast, even for
  411. a video-game crazy 13 year old. For one, I started realizing that most of
  412. these games weren't really that entertaining. Most pirates with talent
  413. usually got more into programming, which was somewhat alluring but I didn't
  414. have much exposure to it, much less the patience. Plus, by mid-1987 the
  415. number of Apple II games was starting to get slower and slower, and the
  416. quality of games was getting less and less, as it became obvious less original
  417. development was going on on the Apple, with most of the games being ports from
  418. the Commodore 64. It started to be pretty clear that the Apple II platform
  419. (with the exception of the IIGS, which was incredibly expensive and was not
  420. Apple's top priority) was becoming less viable. In addition, it seemed to
  421. start getting more difficult to obtain codes for our local MCI ports, as the
  422. whole need for extenders was lessening as "Plus One" service became available.
  423. I started to get interested in the Amiga family of computers, but had to
  424. resign myself to the aging Apple II in the meantime.
  425.  
  426. Then, something happened that changed my point of view of the "computer
  427. underground" forever. Some user had posted regarding a system on the Trade
  428. Center called WizNet that wasn't just another BBS with a regular dial-up line
  429. - it was an entire bootleg BBS that had been set up on a Prime system out on
  430. Telenet, and had a chat room in it. What's more, most of WizNet's users
  431. weren't just software pirates who programmed or possibly used phone codes,
  432. they were hackers in the true sense, and they seemed to be so much more
  433. interesting and mysterious than most of the pirates in the waning Apple II
  434. scene. WizNet (programmed by The Wizard) would invariably go down a couple of
  435. days after it was put up as it would be discovered by an unlucky sysadmin, but
  436. it was about the coolest thing I'd witnessed in the computer scenes yet.
  437.  
  438. At the time, Telenet had just closed a major security flaw which hackers
  439. called "pad-to-padding" which allowed you to basically dial in to a Telenet
  440. port and connect recursively to another Telenet port, allowing you to "listen
  441. in" as a silent guest to whatever the remote user might be doing. I
  442. unfortunately missed the tail-end of this, but it had resulted in a virtual
  443. gold mine of network accounts and passwords on Telenet. There were tons of
  444. "NUI's" (Network User ID's) floating around, a few of which were shared with
  445. all of the known world, which allowed connecting to any port on Telenet. And
  446. a few of these ports were called Altos and Altgers, two chat systems in
  447. Hamburg, Germany, which were frequented by hackers all over the world and were
  448. linked to by WizNet. These quickly became overrun with morons, but until
  449. about the summer of 1988 or so were frequented by all manners of hackers, and
  450. at the time, the thought that you were conversing with people via a system on
  451. another continent from all around the world seemed like something out of a
  452. futuristic cyberpunk novel. Again, this broke down the conceptions that you'd
  453. typically have as a suburban teenager, only confined to the options present at
  454. your high school. Suddenly you were talking to hackers like Shatter from the
  455. UK, or Logex from Mexico, and you might find out that the Mexican phone
  456. switching system is more advanced than the one you're on.
  457.  
  458. Hackers tended to be a little more of a snooty, elitist group than the
  459. pirates did, and they were more heterogenous in nature. It was a sport
  460. accessible to anyone with a modem and a terminal; you didn't need a high-speed
  461. modem or a gazillion meg hard drive to compete. This was natural given my
  462. hardware, which was becoming less impressive by the day. But generally, you
  463. had to know your shit, and the learning curve was pretty steep. It wasn't
  464. enough to know how to get _into_ systems, you had to know VAX, Primos, or UNIX
  465. inside and out to garner any respect. And no one was really telling you how
  466. to get _in_ to these systems to begin with, despite the rash of accounts
  467. unearthed by the pad-to-pad phenomenon. If you wanted to start hacking, you
  468. generally had to do three things: (1) Find systems to hack. This was
  469. accomplished by scanning Telenet or Tymnet, or by scanning every night for
  470. local systems with a "wardialing" utility. Any major metro area would usually
  471. yield a ton of potentially hackable systems if you wardialed every night. (2)
  472. Know what system you were in. Generally, there were UNIX, VAX/VMS, Primos,
  473. HP3000, and maybe a few older systems like TOPS-20 (which was remarkably
  474. hacker-friendly in that it would allow you to view a list of valid usernames
  475. without being logged in, necessitating only the guessing of passwords). (3)
  476. Know how to get in. Generally, this was pure trial and error, or you could
  477. try "social engineering" (i.e., bullshitting the users). Mostly, you started
  478. with default accounts that you knew would be likely to exist on the system,
  479. and tried a bunch of passwords until you'd get in. Maybe if you were lucky,
  480. you'd get an unprotected root password - (yeah, right!). (4) Network with
  481. other hackers. To be fair, there were a lot of hackers that never called
  482. BBSes, solitary weirdos of the Kevin Mitnick variety. (I remember hearing of
  483. one legendary hacker named "Sir Qix" during this time as well who supposedly
  484. never saw the light of day). But having friends to talk to and teleconference
  485. with every day made things a lot more fun, and at the end of the day, it was
  486. mainly a social scene - albeit a strange one.
  487.  
  488. And the teleconference... this was always one of the highlights of the
  489. hack/phreak experience. If you were diligent, you could find a PBX that would
  490. allow calls to Alliance Teleconferencing (0-700-456-1000, I believe) which
  491. would allow you to talk to over fifty people at once. Alliance conferences
  492. could go on for days and days, usually dwindling to two or three participants
  493. in the early morning Pacific time, at which point the usual suspects were
  494. waking up during Eastern time, building the conference until it reached a
  495. dozen people or so the next evening. There were always rumors of Alliance
  496. bills coming to customers in shoebox-sized containers and the like. Alliance
  497. did have one defense mechanism, though; those whose numbers showed up too
  498. frequently on fraudulent bills would get "blacklisted", which would result in
  499. the entire conference going down. There were also bridges, which were the
  500. equivalent of unofficial "party lines" in the 1980's sense of the word. You'd
  501. dial in to a bridge, and talk to whoever had dialed in as well. I had a
  502. couple of decent conversations on these bridges, but usually they'd get taken
  503. over by "bridge trolls", usually 13 year olds who would get on and play
  504. touch-tone music or something equally as annoying.
  505.  
  506. But as stated before, it wasn't necessarily easy to get accepted among
  507. hackers. I did have one thing going for me though, and that was that I could
  508. write at what seemed to be a much higher level than my actual age. No one
  509. ever seemed to understand how this scene encouraged creativity and
  510. intellectual development like none other. Knowledge was a prerequisite for
  511. admittance to higher echelons of the hacking circle, as you were generally
  512. expected to behave and learn as if you were in the very top of the Bell Curve
  513. in terms of IQ. And the topics of conversation would often extend far beyond
  514. computers, reaching into the realms of history, politics, or music (I was
  515. first exposed to all matter of punk, new wave, and dance music through people
  516. in this scene, many of whom might have lived somewhere cool like New York City
  517. or Los Angeles and weren't relegated to the Whitesnake-style crap I had to
  518. deal with on the local radio.) I don't think this drive to increase knowledge
  519. was engendered by any other youth subculture scene before or since - and it is
  520. certainly not a byproduct of the American public school system. You were
  521. exposed to youths who were actually reading Nietzsche and understanding it -
  522. and solely due to intellectual curiosity, not out of some coffeehouse
  523. intellectual pretention.
  524.  
  525. But of course, being only fourteen years old at the time, my first
  526. exposure to this scene was one of dismal failure in terms of acceptance. I
  527. met the sysop of the Dallas Hack Shack on WizNet, who let me call his board
  528. and granted me access. Unfortunately, I must have been ferreted out as a
  529. newbie, because my subsequent phone calls revealed that my access had been
  530. revoked after a single call. However, I'd been rejected from BBSes before and
  531. this left me undeterred. Later on, I remember I was going to be offered
  532. membership into some new group called xTension, run by a rodent-turned-elite
  533. named ParMaster. When asked what my skills were on Altos, I jokingly replied
  534. "being elite" which was evidently taken seriously by a humorless Necrovore,
  535. which resulted in me being denied access in to the group. How the irony of
  536. that one escaped him, I never understood. There was obviously a whole new
  537. realm to explore out there, and I was committed to be a part of it. Armed
  538. with my NUI's that everyone else in the world had, I started scanning Telenet
  539. intensely, as well as wardialing every night for local systems. I gained
  540. access to numerous UNIX, VAX, and Primos systems through binges of all-night
  541. scanning and attacking common username/password combinations, which I then
  542. shared with others or posted to boards. I took a keen liking to Primos
  543. systems due to their possession of a unique utility - NETLINK. NETLINK
  544. typically allowed any Prime system on an x25 network to access any other NUA
  545. (Network User Address) on the network, so these systems could serve as a
  546. launch pad to other systems. I remember PRIMOS being very difficult to learn,
  547. although in retrospect, UNIX is still a lot harder. Necrovore actually wrote
  548. an exhaustive compendium of PRIMOS CPL commands, a text file that can be found
  549. on www.textfiles.com to this day under the "hack" section.
  550.  
  551. There was another problem brewing, though. It seemed as though my local
  552. MCI ports, which had been fairly regular sources of free phone calls, were
  553. almost completely dry. No one seemed to be able to get much out of them, and
  554. any codes obtained were generally dead within 24 hours. I also had growing
  555. reservations about doing the typical "autoscanning" with a modem from my home,
  556. due to heightened security in our then-new digital switching system that
  557. allowed for easier identification of callers. Luckily, I'd found a new
  558. service (On my own, although there were many others who were already using it)
  559. in the form of MidAmerica Communications, or 950-1001, a popular service with
  560. Rocky Mountain region phreaks. The first code I ever tried on this system,
  561. 548951, ended up lasting me over three (!) months, and the connections were
  562. crystal clear. But I did take to hacking these codes by hand from my local
  563. 7-11's payphone, as all 950 calls were free. And I did find out a couple of
  564. years later, when the Secret Service raided my house, that I actually had a
  565. DNR (Dialed Number Recorder) on my phone line for a brief period of time
  566. before I took to hand-scanning, but I had conveniently stopped scanning at the
  567. same time, so my usage was disregarded for some reason. At the time, it
  568. seemed as though many people were starting to see the handwriting on the wall
  569. - that Automatic Number Identification and enhanced security features found in
  570. the new digital switching systems were eventually going to render hacking and
  571. phreaking unviable. But I knew that was at least a couple of years off, and I
  572. hoped that I would be able to have fun at least until my 18th birthday....
  573.  
  574. I'd managed to hack into at least twenty systems that first summer of
  575. 1988, and was feeling quite pleased with myself. I seemed to have a lot of
  576. newer on-line friends, although I hadn't met two of the hackers I would end up
  577. talking to for hours on end every single day yet. (If you ever read this, you
  578. know who you are). I was particularly proud of several UNIX systems I broke
  579. into in Finland, which I accessed with the NUI's I had and just reeked of
  580. exoticism. There also seemed to be a sort of "hacker's revival" movement, as
  581. more people were getting involved again after a series of busts that occurred
  582. in 1987, the most notable being a 17 year old named Shadow Hawk, aka Herbert
  583. Zinn. The spearhead of this movement was on a board called the Phoenix
  584. Project in Austin, TX, run by an extremely knowledgeable hacker named The
  585. Mentor. The Mentor, whose real name was Loyd Blankenship, has been forever
  586. immortalized as the one who penned the angry "Conscience of a Hacker" (which
  587. somehow has made it into academic texts on computer security and hacking) as
  588. well as the "Beginner's Guide To Hacking", which no doubt influenced hundreds
  589. of ne'er-do-wells to undertake hacking as a hobby. (He also famously penned
  590. the Steve Jackson Cyberpunk game, which resulted in Steve Jackson Games being
  591. comically raided by the Feds in early 1990). The Phoenix Project was about
  592. the only place where anyone could get access, and questions could be answered
  593. by the cream of the crop members of the hacker community, the Legion of Doom.
  594. I remember one file written by The Prophet which was an introductory text on
  595. UNIX hacking that was particularly excellent. There were some new
  596. technologies, such as 9600 baud modems, that had allowed users to run bigger,
  597. better boards and transfer more data. This also marked the summer that many
  598. people I knew started experimenting with one of the darker sides of the
  599. hacking scene, "carding", or credit card fraud.
  600.  
  601. "Marijuana is the flame; heroin is the fuse; LSD is the bomb." -Joe
  602. Friday on an LSD scare episode of _Dragnet_
  603.  
  604. Generally, the hacker's entrance into fraud can be compared to the
  605. classic propaganda of marijuana eventually leading to hard drugs and
  606. culminating with shooting heroin. What starts off as benign curiosity,
  607. causing a lot of consternation and paranoia, eventually becomes banal,
  608. especially in the sped-up, attention-deficit deprived world of the teenage
  609. hacker. If the hacker has no desire to learn about the systems or networks in
  610. question, hacking quickly becomes not an end but rather a means to bigger and
  611. better thrills. Most pirates were content to learn about their own computers,
  612. dabbling in phone fraud as a means to stay in touch with their cohorts. Some
  613. hackers did draw the line at credit card fraud, merely content to explore the
  614. systems they break into. But many... and they were not statistically
  615. insignificant numbers in terms of the whole community... ended up getting
  616. bored with breaking into remote computer systems and turned to outright theft
  617. for bigger thrills.
  618.  
  619. Theft had always been a part of the hacking experience, at least in part.
  620. "Dumpster diving" was considered a great way to garner discarded passwords and
  621. technical manuals, and there were many of us who broke into our local Bell
  622. office in hopes of finding manuals and technical equipment. "Tapping cans"
  623. was also popular - you could find those big round "cans" on telephone poles
  624. and monitor phone calls with a phone and a $5 visit to Radio Shack. But the
  625. temptation to engage in outright fraud was definitely engaged in to no small
  626. degree, spurred on by the ridiculously easy availability of credit card
  627. numbers. Most Americans seemed unaware that during this time period, anyone
  628. who needed to check your credit rating (say, the used car dealership where you
  629. placed a benign inquiry about a purchase last week) could do so through an
  630. account with TRW or CBI. TRW seemed to be the de facto standard for hackers
  631. in the early to mid 1980's, but it seemed to have been supplanted by CBI in
  632. the later 1980's. Some enterprising hacker had actually figured out the
  633. number seed for the generation of CBI accounts, which effectively had opened
  634. up every CBI account in the country for potential abuse. (This also happened
  635. with ITT calling cards on the infamous 950-0488 extension and American Express
  636. credit cards during the late 1980's. It makes you wonder if companies have
  637. taken to more sophisticated number generation schema in the new millennium.)
  638.  
  639. But at any rate, credit card numbers ran like water, and if you had a
  640. modicum of clout in the scene (hacking CBI was only marginally harder than
  641. hacking "codez") you could feasibly pull the credit card history of anyone you
  642. didn't like, especially your high school English teacher that was pissing you
  643. off and giving you a hard time. And it seemed like for a while, EVERYONE was
  644. carding everything under the sun. There was some kid named Lord Zeus who had
  645. at least a dozen US Robotics HST modems, valued at $500 a pop.
  646. Unsurprisingly, a lot of the hackers in New York City I knew, including one
  647. The Guardian who ran an Amiga pirate board called FBI BBS, were carding entire
  648. computer systems. There were reports of kids getting busted and having tens
  649. of thousands of dollars in stolen hardware in the closet of their houses, with
  650. their parents blissfully unaware of what was going on.
  651.  
  652. Because carding did seem so easy, most people did take at least one crack
  653. at it. Generally, the myth on the street was that if you don't get too
  654. greedy, and don't use the same drop address more than once, you could get away
  655. with it forever. But even in my increasingly warped mind, it still seemed a
  656. bit hard to justify, so I just stopped trying to justify it. I succeeded in
  657. carding a $600 1.5 megabyte RAM upgrade for the Commodore Amiga (I was the
  658. proud new owner of an Amiga 500 computer, and RAM was ridiculously high during
  659. this period due to a fire at a semiconductor plant in Japan) from some company
  660. in California, which had eventually brought down some heat on my neighborhood,
  661. in addition to some clothes from Eddie Bauer and some jewelry. In retrospect,
  662. I believe this was the start of my incurring some seriously bad karma, which
  663. eventually culminated in my arrest which was to occur only about a year and a
  664. half later. However, the feeling of getting away with something like that - a
  665. true high-tech crime - was incredibly thrilling for a young teenager still in
  666. Junior High school. Mostly, credit card numbers were just fun to have lying
  667. around, and could be a source of endless amusement.
  668.  
  669. Case in point: party lines and phone sex lines. Phone sex lines, in this
  670. age of virginity, were not taken seriously at all, but what better fun than to
  671. call an 800 sex line with someone else's credit card and harass the poor woman
  672. on the other end? And how about putting the local Pizza Hut on a three-way
  673. call with some woman you've just requested to simulate giving a blow job? At
  674. a friend's request, I left the number of a mutual acquaintance who had been
  675. pissing us off lately on a gay phone sex line, which resulted in him getting
  676. dozens of solicitations for gay phone sex over a several day period. And
  677. everyone I knew in the scene was doing all of these things as a matter of
  678. course. That wasn't even the start of the possible revenge that could be
  679. extracted by a knowledgeable hacker: some of the elite had access to local
  680. LMOS systems, and were able to forward phone calls from whatever source they
  681. wanted to your line if you pissed them off bad enough. Hackers with LMOS
  682. access were able to turn on the call waiting on the phone line of some sysop
  683. they didn't like, making his board disrupted every time someone else tried
  684. calling in. One hacker we knew, Fry Guy, made a bet that he could make a
  685. payphone local to my friend's house into a regular phone (i.e., not needing a
  686. quarter to dial out) and succeeded in doing it within several days. I'm sure
  687. there were no small number of public high school teachers that ended up
  688. getting a dozen toilet seats in the mail from Sears after failing a certain
  689. apathetic computer enthusiast in one of their classes.
  690.  
  691. There were kids who were engaged in outright ripoffs and serious fraud -
  692. kids that inspired serious investigation from the likes of the FBI and Secret
  693. Service. The most intense example I remember is a Florida hacker named
  694. Maximum Overdrive who had succeeded in his local Western Union to the tune of
  695. at least fifty thousand dollars. Not only could he get the credit card
  696. numbers of the people whom he was wiring "from", when Western Union decided to
  697. verify by calling their home address he could forward the victim's number to
  698. one he specified and pretend to be the person wiring the money. It was during
  699. this stage in my hacking career when I believe my head started to get a little
  700. concerned again. I was beginning to have ethical issues with the wholesale
  701. rip-off of corporations. Even though I already had an inkling of the American
  702. corporate power structure and how the "insurance companies just pay for it
  703. all", I was still not comfortable associating with individuals who seemed to
  704. have little desire other than to scam as much free money and computer hardware
  705. as they could possibly get. This sets the stage for what Lord Digital was
  706. talking about in his sequel to "Fall Of The Modem World" - the stage when the
  707. power you have starts to get out of hand. When you're engaging in high-tech
  708. grand larceny as a fifteen or sixteen year old, you don't learn the boundaries
  709. that other kids your age have to learn. You just blow through every barrier
  710. that's presented to you and when that's coupled with fragile adolescent egos,
  711. some serious emotional and mental maladjustment can be the result.
  712.  
  713. There was another hacker called The Video Vindicator that I also talked
  714. with a few times (we'd struck up a mutual interest in electronic music - I
  715. remember him playing the old techno track "Spice" by Eon to me over the
  716. telephone.) The Video Vindicator was an admitted techno-vandal, who liked to
  717. crash every system that he broke into. He ran a pretty good board in Northern
  718. California called Shadows Of Iga and was by all accounts, an extremely
  719. intelligent kid. But the last I heard of him, he got out of California Youth
  720. Authority at age 19, stole a car, managed to evade jail at least once, and was
  721. living "on the run", writing text files about how to fence stole jewelry,
  722. break into houses, and the like. I had the typical angst-ridden teenage
  723. experiences shoplifting and engaging in burglary and generally did not like
  724. them - I didn't seem to have the stomach or nerve to engage in serious crime,
  725. but in the adrenaline and testosterone-riddled time, it was easy to see how
  726. people were getting pressured into doing more extreme acts by the day. These
  727. were kids who knew how to encrypt stolen credit cards - straight up Cyberpunk
  728. Mafia type of shit. These were kids writing programs that would decipher the
  729. mathematical algorithms that corporations would use to generate credit card
  730. and calling card numbers, just for fun.
  731.  
  732. It seemed like the scene was starting to get a bit sketchier all around.
  733. In addition to knowing aforementioned fledgling Mafia members, it seemed like
  734. all sorts of people were getting busted for carding and phone fraud. A local
  735. user to me had gotten busted by 950-1001, a fate that only escaped me because
  736. of my temporary moratorium I'd placed on scanning for phone codes from my
  737. house. I'd ended up taking all of my notes and disks with sensitive
  738. information on them over to a friend's house, afraid that I was the next one.
  739. But of course it never came, and another vow to stop what I was doing was left
  740. unfulfilled. At the end of the day, I was at a point where the scene had
  741. consumed my life and none of us could do _anything_ else. Fledgling interests
  742. in sports and academics had long been discarded in favor of complete devotion
  743. to the hacker subculture, and I had little desire to go back. I was branded
  744. as the classic "bright but an underachiever" role in school, something I knew
  745. that all of my peers had also experienced. Everything in my life now embraced
  746. this one-dimensional anti-authoritarian view, but despite my best intentions,
  747. everything always seemed to confirm the worst of what I had suspected. Kids
  748. at my school were generally mean, and I had already witnessed all of the
  749. typical detritus of the suburban wasteland I lived in; parties where there
  750. were gang-bangs, 15 year old kids smoking weed, drinking Old Milwaukee, and
  751. sniffing cocaine. It didn't offer much appeal. But it didn't matter, because
  752. in this scene, you truly had a purpose and you truly were someone important.
  753. And it wasn't related to ANYTHING that was going on in the "real world". You
  754. just couldn't expect anyone to go back to the real world after being a member
  755. of the hacker subculture. It seemed like you were a member of this secret
  756. fraternity, with all of the power (at least in your own mind) and crazy
  757. aliases and code words out of what seemed like a comic book adventure.
  758.  
  759. "I'm not crazy! You're the one that's crazy!" -Suicidal Tendencies in
  760. "Institutionalized"
  761.  
  762. As one could imagine, most hackers didn't exactly have the most
  763. fulfilling home and personal lives, and I was no exception. I was threatened
  764. at home with being sent to a Christian school if I didn't clean up my act,
  765. which never materialized into anything but empty threats. I felt constantly
  766. at odds with my parents, who thought I was slipping into some sort of weird
  767. drugged Satanic cult or something, perhaps due to the long hair and obscure
  768. musical taste I'd cultivated. Nothing could have been further from the truth;
  769. I was actually ridiculously drug-free, having only been drunk one time in my
  770. life. I had no desire to smoke weed or get drunk like a lot of the other kids
  771. I knew at school were doing. I was mostly angry, and most of my non-computer
  772. time consisted of listening to the likes of hardcore punk like Black Flag or
  773. Minor Threat.
  774.  
  775. Adults might have wanted you to just get your head out of your ass, but
  776. everything in your life reinforced the following associations: "Real World" =
  777. boring, angry, stupid, and pointless. "Hacker World" = happy, exciting, where
  778. your friends were. School was something to be slept through if you actually
  779. had no choice but to go, which would then be followed by another night of
  780. all-night teleconferences and the latest scene gossip. Most importantly, it
  781. was FUN. You knew you were doing things that no one else knew how to do. And
  782. you were learning more every day. I spent endless hours on the phone every
  783. day.
  784.  
  785. However, the handwriting on the wall seemed to be getting more and more
  786. pronounced. It had started to become pretty obvious to those in the know that
  787. it wasn't really safe to scan or use stolen calling card numbers from your
  788. house at all anymore, as people seemed to be going down for that left and
  789. right. (Getting busted for phone codes is a notoriously lame thing to get
  790. caught for anyway.) Like it or not, even the "elite" hackers who disdained
  791. the "kodez kidz" needed to make free phone calls. New technologies like ANI
  792. and Caller ID threatened to make the activities of wardialing and scanning,
  793. long staples of the hacking scene, obsolete overnight. A hacker named Lorax
  794. and his brother in Michigan had gotten nailed simply for scanning the 800
  795. prefix for carrier, along with them stupidly leaving a message for the owner
  796. of a hacked HP3000 to "please give us a call if you want help with your
  797. security. He called them, all right.
  798.  
  799. It was clear that the whole scene had been based on this ephemeral
  800. convergence of (1) naive computer security; (2) the availability of
  801. telecommunications equipment on the mass market and (3) a very libertarian
  802. culture of computer users who disliked governments and regulations of any
  803. sort. It was no longer acceptable to talk about pirated software on most
  804. BBSes like it had been during the nascent scene in the early 1980's period.
  805. But I was still having a good time, and was starting to get to the point where
  806. I was a pretty good hacker. I had probably only cracked into fifty systems in
  807. my life, but had learned quite a bit doing it. And the vague group I knew,
  808. PhaZeTech, had a system called Colonial that was essentially taken over by the
  809. group, which served as a fertile UNIX learning ground. Perhaps the system
  810. administrators viewed us as sort of a helpful ant colony and never kicked us
  811. off, as we ended up doing a bit to maintain the system. There was no reason
  812. to think it would stop anytime in the near future, as I'd stopped scanning for
  813. codes from my house some time in the past.
  814.  
  815. But then another "convergence" came back to kick my ass. I'd recently
  816. been sent an Apple Cat modem by a user named Zippo Pinhead on the good-faith
  817. notion I'd pay him $30 for it, which I never did. (I really _did_ mean to,
  818. Bob, but I was a broke-ass 16 year old and just never got around to it, and
  819. you didn't really seem to care anyway.) I'd always wanted the legendary
  820. Apple-Cat, due to its ability to mimic any tone, as well as scan for codes at
  821. least twice as fast as any Hayes modem. The temptation to let it scan for
  822. codes was just too much, and in addition, the bad karma from not paying for it
  823. was also a factor. Despite my better judgment, I was starting to get REALLY
  824. sloppy.
  825.  
  826. My sloppiness ended up being epitomized by another really stupid-ass
  827. mistake; leaving my real name and phone number on a board in Arizona called
  828. The Dark Side run by a user named The Dictator who as it turned out was
  829. running a sting operation for the Secret Service in exchange for some computer
  830. hardware. (To this date, I hope The Dictator is burning in hell, and I hope
  831. your life is a complete piece of shit, you traitorous loser. How cool is that
  832. Amiga hardware you got now, seeing as how you exchanged your soul for it,
  833. motherfucker?) But anyway... I'd seen The Dictator around, as he was calling
  834. virtually every board in existence and advertising his BBS, so I blindly left
  835. my number on his system. Naturally, I was immediately corroborated with the
  836. Dark Sorcerer who'd been seen around, probably posting some hacked VAX
  837. (incidentally, John Lee, aka Corrupt, ruined a hacked VAX I posted at 215 379,
  838. pw BACKUP/BACKUP, that I had gotten into by trying to run some BBS on it, and
  839. this guy ended up on the cover of Wired Magazine. Weird when people you knew
  840. through the scene started becoming minor cause celebres in the nascent
  841. wannabe-Cyberpunk type scene.) This resulted in a DNR (Dialed Number
  842. Recorder) placed on my line around December of 1989, and of course I was using
  843. my new Apple-Cat to scan for codes during that time. I could kick myself for
  844. days just thinking about how stupid all of this was.
  845.  
  846. The climax came on January 11, 1990, when the following showed up at my
  847. house: Secret Service agents, local cops, and US West phone security guys.
  848. And right before my parents were going to church for their bell choir
  849. practice. Ugh. Not exactly my finest hour. And yes kids, they do play "good
  850. cop, bad cop" just like in the movies. It was somewhat comical, but I felt
  851. proud that at least I didn't start bawling or narcing out everyone I had ever
  852. known, as a lot of others were prone to do (guess my nerves had been toughened
  853. up somewhat.) The charges against me ended up being somewhat impressive, as
  854. I'd been using multiple 950 services (oops) all of which were small companies
  855. anxious to prosecute me, in addition to having some floppies on them with
  856. about seven hundred credit cards in the form of CBI buffers (double oops) as
  857. well as suspicion I'd been involved in a couple of local credit-card
  858. shenanigans (which never materialized into real charges.) To make matters
  859. worse, they wanted to confiscate the Apple computer, which I had actually done
  860. all of the scanning on, which my little sister was currently writing a huge
  861. paper on. We had to convince them to take my Amiga instead. I ended up
  862. having to go down to the police station, taking a mug shot, and spending a
  863. couple of nights in the Zebulon Pike Youth Detention Facility, shooting hoops
  864. and wondering what was going to happen to me.
  865.  
  866. The end result: Most of the charges got dropped, and I had to do fifty
  867. hours' community service, as well as pay about $3500 in restitution. Luckily,
  868. I ended up doing my "community service" for my youth minister, an ex-rock and
  869. roller who took pride in the fact that he just let me read all of the books in
  870. his office (my first exposure to Hunter S. Thompson, by the way.) It was a
  871. small compensation, but at least I didn't have to load furniture at Goodwill
  872. every weekend for two months like a lot of other people I knew who got in
  873. trouble. And my probation officer thought I was the greatest novelty - here he
  874. was dealing with kids who were stealing cars and selling weed, and he gets
  875. this gangly "hacker" out of nowhere.
  876.  
  877. I was pretty much out of the scene immediately, sans a few friends. But
  878. it didn't much matter, as the scene was quickly coming to an end anyway. The
  879. Operation Sun Devil busts in early-mid 1990 effectively killed off the
  880. vestiges of the 1980's hacker scene, as most of the "elite" members of the
  881. Legion of Doom and MOD had been snared in this raid. Probably almost half of
  882. the people I had known had gotten busted, had retired, or were simply getting
  883. older, getting cars and going to college. There I was, sixteen years old, yet
  884. the disappointment was something to this day I feel like only extremely old
  885. people feel; like how it must feel when half of your friends are dead. I did
  886. manage to pull off a few shenanigans after getting my computer back (my
  887. ever-unaware parents let me continue to use the computer periodically, for
  888. "school work" of course). I hacked into our local Water Supply Department VAX
  889. and gave away the account some time later, which strangely resulted in an
  890. article in the local paper a month later about how the Water Supply Department
  891. needed a new computer, with my account that had been active forever strangely
  892. cancelled. I got the occasional Alliance call from some old people I knew,
  893. and I quickly found I had little in common with most of them. It seemed like
  894. most were either drifting off into computer-science major irrelevance, or were
  895. still able to pull off some capers due to non-busted status. But no one
  896. seemed to be quite as crazy as they were even a year ago, as security was
  897. getting better and better and "hacking" was starting to just mean hacking
  898. voice mail systems. (Although the Tymnet heyday was still to come. Does
  899. anyone else remember that cheezy chat system "QSD"?)
  900.  
  901. Computers seemed to lose their lustre. All of a sudden I had to be
  902. normal, go to parties and try to fit in somewhat. The disappointment at not
  903. being a part of the scene any more was quite a bit to bear. I still had some
  904. calling cards, CBI accounts, and a few token relics of the hacker era in order
  905. to amuse my "real world" friends, mostly. But by and large, everything was
  906. gone. Before I knew it, a lot of the people I had known were in college, and
  907. some of them had dropped out to become professional programmers at age 19 or
  908. so, already knowing way more than most of their professors. After a year or
  909. so of re-adjustment, I attained some sort of normalcy. I used LSD
  910. extensively, and later Ecstasy and ketamine. Drugs were sort of an effort to
  911. get that "peak feeling" that I used to get, and were incredibly entertaining
  912. and insightful, although they lacked the long-term intellectual stimulation
  913. that computers were able to provide, eventually becoming somewhat banal in
  914. their own right. But that, as they say, is a different story.
  915.  
  916. This brings me to the end of this file: if you made it this far, how
  917. come? And where are the rest of the people I used to know in that scene now?
  918. All grown up, I'd imagine. The ones who didn't get busted probably got their
  919. PhD's and didn't stray too far from the Republican Party. But the ones who
  920. were a little more worldly, what happened? Was it a period of intense
  921. self-scrutiny, reading thousands of books, spending endless hours of
  922. self-reflection... and was intellectual curiosity what that scene was all
  923. about?
  924.  
  925. .-. _ _ .-.
  926. / \ .-. ((___)) .-. / \
  927. /.ooM \ / \ .-. [ x x ] .-. / \ /.ooM \
  928. -/-------\-------/-----\-----/---\--\ /--/---\-----/-----\-------/-------\-
  929. / fun4us \ / \ / `-(' ')-' \ / \ / nofun4u \
  930. \ / `-' (U) `-' \ /
  931. `-' the original e-zine `-' _
  932. Oooo - today, tomorrow - / ) __
  933. /)(\ ( \ FOREVER / ( / \
  934. \__/ ) / Copyright (c) 2004 cDc communications and the author. \ ) \)(/
  935. (_/ CULT OF THE DEAD COW is a registered trademark of oooO
  936. cDc communications, 1369 Madison Ave. #423, NY, NY 10128, USA _
  937. oooO All rights left. Edited by G. Ratte'. __ ( \
  938. / ) /)(\ / \ ) \
  939. \ ( \__/ Save yourself! Go outside! Do something! \)(/ ( /
  940. \_) xXx BOW to the COW xXx Oooo
Advertisement
Add Comment
Please, Sign In to add comment