💾 Archived View for gemini.theuse.net › textfiles.com › 100 › nighhack.omn captured on 2022-01-08 at 14:01:40.

View Raw

More Information

⬅️ Previous capture (2021-12-05)

-=-=-=-=-=-=-

                     %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
                     %         NIGHT OF THE HACKERS      %
                     %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
                     %          By: Richard Sandza       %
                     %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
                     %              Typed by:            %
                     %     --==**>>THE REFLEX<<**==--    %
                     %     [Member: Omnipotent, Inc.]    %
                     %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
                     % This original article appeared in %
                     % the November 12,1984 issue of     %
                     % NEWSWEEK.  The result of the      %
                     % article was the piss-offment of   %
                     % the many hackers of America.  He  %
                     % wrote a follow-up article called: %
                     % 'REVENGE OF THE HACKERS', which   %
                     % can be found in this library too. %
                     % It just shows you not to screw    %
                     % with these guys!                  %
                     %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     As you are surveying a dark and misty swamp you come across what appears
to be a small cave.  You light a torch and enter.  You have walked several
hundred feet when stumble into a bright blue portal... With a sudden burst of
light and a loud explosion you are swept into... DRAGONFIRE... PRESS ANY KEY IF
YOU DARE.

     You have programmed your personal computer to dial into Dragonfire, a
computer bulletin board in Gainesville, Texas.  But before you get any
information, Dragonfire demands your name, home city and phone number.  So, for
tonights tour of the electronic wilderness you become Montana Wildhack (a
character in Kurt Vonnegut's book 'Slaughterhouse Five') of San Francisco.

     Dragonfire, Sherwood Forrest(sic), Forbidden Zone, Blottoland, Plovernet,
The Vault, Shadowland, PHBI and scores of other computer bulletin boards are
hang-outs of a new generation of vandals.  These precocious teen-agers use
their electronic skills with to play hide-and-seek with computer and security
forces.  Many computer bulletin boards are perfectly legitimate:  They resemble
the electronic versions of the familiar cork boards in supermarkets and school
corridors, listing services and providing information someone out there is
bound to find useful.  But this is a walk on the wild side, a trip into the
world of underground bulletin boards dedicated to encouraging -- and making --
mischief.

     The numbers for these boards are as closely guarded as a psychiatrist's
home telephone number.  Some numbers are posted on underground boards; others
are exchanged over the telephone.  A friendly hacker provided Dragonfire's
number.  Hook up and see a broad choice of topics offered.  For Phone Phreaks
-- who delight in stealing service from AT&T and other phone networks --
Phreakenstein's Lair is a potpourri of phone numbers, access codes and
technical information.  For computer hackers -- who dial into other people's
computers -- Ranger's Lodge is chock full of phone numbers and passwords for
government, university and corporate computers.

     Moving through Dragonfire's offerings, you can only marvel at how
conversant these teen-agers are with the technical esoterica of today's
electronic age.  Obviously they have spent a great deal of time studying
computers, though their grammar and spelling indicate they haven't been as
diligent in other subjects.  You are constantly reminded of how young they
are...

    "Well it's that time of year again.  School is back in session so let's get
those high school computer phone numbers rolling in.  Time to get straight A's,
have perfect attendance(except when you've been up all night hacking school
passwords), and messing up your worst teacher's paycheck."

    Forbidden Zone, in Detroit, is offering ammunition for hacker civil war --
tips on crashing the most popular bulletin-board software.  There are also
plans for building black, red and blue boxes to mimic operator tones and get
free phone service.  And here are the details for 'the safest and best way to
make and use nitroglycerin,' compliments of Doctor Hex, who says he got it
'from my chemistry teacher.'

    Flip through the 'pages.'  You have to wonder if this information is
accurate. Can this really be the phone number and password for Taco Bell's
computer?  Do these kids really have the dial-up numbers for dozens of
university computers?  The temptation is too much.  You sign off and have
your computer dial the number for the Yale computer.  Bingo -- the words Yale
University appear on your screen.  You hang up in sweat.  You are now a Hacker.

    Punch in another number and your modem zips off the touch tones.  Here is
the tedious side of all this.  Bulletin boards are popular.  No vacancy at
Bates Motel (named for Anthony Perkin's creepy motel in the movie 'Psycho');
the line is busy.  So are 221 B. Baker Street, PHBI, Shadowland and The Vault.
Ceaser's Palace rings and connects.  This is a different breed of board.
Ceaser's Palace is a combination Phreak board and computer store in Miami.
This is the place to learn ways to mess up a department store's antishoplifting
system, or make free calls on telephone with locks the dial.  Pure capitalism
accompanies such anarchy.  Ceaser's Palace is offering good deals on disk
drives, software, computers and all sorts of hardware.  Orders are placed
through electronic mail messages.

    'Tele-Trial':  Bored by Ceaser's Palace, you enter the number for
Blottoland, the board operated by one of the nation's most notorious computer
phreaks -- King Blotto.  This one has been busy all night, but it is now pretty
late in Cleveland.  The phone rings and you connect.  To get past the blank
screen, type the seconday password 'S-L-I-M-E.'  King Blotto obliges, listing
his rules:  He must have your real name, phone number, address, occupation and
intrests.  He will call and disclose the primary password, 'if you belong on
this board.'  If admitted, do not reveal the phone number or secondary
password, lest you face 'tele-trial,' the King warns as he dismisses you by
hanging up.

     You expected heavy security, but this teen-ager's security is, as they
say, awesome.  Computers at the Defense Department and hundreds of businesses
let you know when you reached them.  Here you need a password just to find out
what system answered the phone.  Then King Blotto asks questions -- and hangs
up.  Professional computer-security experts could learn something from this
kid.  He knows that ever since the 414 computer hackers were arrested in August
1982, law-enforcement officers have searching for leads on computer bulletin
boards.

     'Do you have any ties or connections with any law enforcement agency or
any any agency which would inform such a law-enforcement agency of this
bulletin board?'

     Such is the welcoming message from Plovernet, a Florida board known for
its great hack/phreak files.  There amid a string of valid VISA and Mastercard
numbers are dozens of computer phone numbers and passwords.  Here you also
learn what Blotto means by tele-trial.  'As some of you may or may not know, a
session of conference court was held and the Wizard was found guilty of
miscellaneous charges, and sentenced to four months without bulleting boards.'
If Wizard calls, system operators like King Blotto disconnect him.

     Paging through the bulletin boards is a test of your patience.  Each board
has different commands.  Few are easy to follow, leaving you to hunt and peck
your way around.  So far you haven't has the nerve to hit 'C,' which summons
the system operator for a live, computer-to-computer conversation.

     The time, however, has come for you to ask a few questions of the 'sysop.'
You dial a computer in Boston.  It answers and you begin working your way
through the menus.  You scan a handful of dial-up numbers including one for
Arpanet, the Defense Department's research computer.  Bravely tap C and in
seconds the screen blanks and your cursor dances across the screen.

     Hello... What kind of computer do you have?

     Contact.  The sysop is here.  You exchange amenities and get 'talking.'
How much hacking does he do?  Not much, too busy.  Is he afraid of being
busted, having his computer confiscated like the Los Angeles man facing
criminal charges because his computer bulletin board system contained a stolen
telephone-credit-card number?  'Hmmmmm... No,' he replies.  Finally he asks the
dreaded question:  'How old are you?'  'How old are YOU,' you reply, stalling.
'15,' he types.  Once you confess and he knows you're old enough to be his
father, the conversation gets very serious.  You fear each new question; he
probably thinks you're a cop.  But all he wants to know is your choice for
president.  The chat continues, until he asks, 'What time is it there?'  Just
past midnight, you reply.  Expletive.  'It's 3:08 here,' Sysop types.  'I must
be going to sleep.  I've got school tomorrow.'  The cursor dances.
'*********** Thank You for Calling.'  The screen goes blank.