💾 Archived View for gemini.spam.works › mirrors › textfiles › news › emmanuel.txt captured on 2023-01-29 at 09:53:21.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-

                 Q&A with Emmanuel Goldstein of
                 2600: The Hacker's Quarterly

                 (CNN) -- Emmanuel Goldstein is the
                 editor-in-chief of 2600: The Hacker Quarterly and
                 hosts a weekly radio program in New York called
                 "Off the Hook." 

                 1. How do you define hacking? 

                      Hacking is, very simply, asking a lot of
                      questions and refusing to stop asking. This
                      is why computers are perfect for inquisitive
                      people -- they don't tell you to shut up
                      when you keep asking questions or
                      inputting commands over and over and
                      over. But hacking doesn't have to confine
                      itself to computers. Anyone with an
                      inquisitive mind, a sense of adventure and
                      strong beliefs in free speech and the right
                      to know most definitely has a bit of the
                      hacker spirit in them. 

                 2. Are there legal or appropriate forms of
                 hacking? 

                      One of the common misconceptions is that
                      anyone considered a hacker is doing
                      something illegal. It's a sad commentary on
                      the state of our society when someone who
                      is basically seeking knowledge and the truth
                      is assumed to be up to something nefarious.
                      Nothing could be further from the truth. 

                      Hackers, in their idealistic naivet?, reveal
                      the facts that they discover, without
                      regard for money, corporate secrets or
                      government coverups. We have nothing to
                      hide, which is why we're always relatively
                      open with the things we do -- whether it's
                      having meetings in a public place or running
                      a system for everyone to participate in
                      regardless of background. The fact that we
                      don't "play the game" of secrets also makes
                      hackers a tremendous threat in the eyes of
                      many who want to keep things away from
                      the public. 

                      Secrets are all well and good, but if the
                      only thing keeping them a secret is the fact
                      that you say it's a secret, then it's not
                      really a very good secret. We suggest using
                      strong encryption for those really interested
                      in keeping things out of the hands of
                      outsiders. It's interesting also that hackers
                      are the ones who are always pushing strong
                      encryption -- if we were truly interested in
                      getting into everyone's personal affairs, it's
                      unlikely we'd try and show them how to
                      stay secure. There are, however, entities
                      who are trying to weaken encryption.
                      People should look toward them with
                      concern, as they are the true threat to
                      privacy. 

                 3. What in your mind is the purpose of
                 hacking? 

                      To seek knowledge, discover something
                      new, be the first one to find a particular
                      weakness in a computer system or the first
                      to be able to get a certain result from a
                      program. As mentioned above, this doesn't
                      have to confine itself to the world of
                      computers. Anyone who's an adventurer or
                      explorer of some sort, or any good
                      investigative journalist, knows the feeling of
                      wanting to do something nobody has ever
                      done before or find the answer despite
                      being told that you can't. One thing that all
                      of the people involved in these endeavors
                      seem to share is the feeling from outsiders
                      that they're wasting their time. 

                 4. Are you a hacker? Why? Or why not? 

                      Absolutely. It's not something you can just
                      erase from your personality, nor should you
                      want to. Once you lose the desire to mess
                      around with things, tweak programs and
                      systems, or just pursue an answer doggedly
                      until you get a result, you've lost a very
                      important part of yourself. It's quite
                      possible that many "reformed" hackers will
                      lose that special ingredient as they become
                      more and more a part of some other entity
                      that demands their very souls. But for
                      those who can resist this, or figure out a
                      way to incorporate "legitimacy" into their
                      hacker personalities without compromising
                      them, there are some very interesting and
                      fun times ahead. 

                 5. What kind of hacking do you do? 

                      My main interest has always been phones
                      and rarely does a day pass when I don't
                      experiment in some way with a phone
                      system, voice mail system, pay phone, or
                      my own telephone. I've always been
                      fascinated by the fact that we're only a
                      few buttons away from virtually anyone on
                      the planet and I hope that I never lose that
                      sense of marvel. 

                      One of the most amazing things I ever got
                      involved in was routing phone calls within
                      the network itself -- known as blue-boxing.
                      You can't do that as easily any more, but it
                      was a real fun way to learn how everything
                      was connected -- operators, services,
                      countries, you name it. And in the
                      not-too-distant past, there were so many
                      different sounds phones made depending on
                      where you were calling. Now they tend to
                      be standardized rings, busies, etc. But the
                      magic hasn't disappeared, it's just moved
                      on to new things ... satellite technology,
                      new phone networks and voice recognition
                      technologies. 

                      Many times these new technologies are
                      designed by the very people who were
                      hacking the old technologies. The result is
                      usually more security and systems that
                      know what people will find useful. While I've
                      spent a great deal of time playing with
                      phones, I get the same sense of fun from
                      computer systems and have invested lots
                      of time exploring the Internet. It would fill a
                      book to outline all of the hacker potential
                      that exists out there. And, of course,
                      there's radio hacking, which predates a lot
                      of the current technology. It's gotten to
                      the point where simply listening to a certain
                      frequency has become a challenge. It's
                      hard to believe that it's actually turned into
                      a crime to listen to some of these
                      non-scrambled radio waves. But this is the
                      price we pay when people with no
                      understanding of technology are the ones in
                      charge of regulating it. 

                 6. How much time do you spend at it a week? 

                      That's like asking how much time you spend
                      breathing. It's always with you, you do
                      more of it at certain times, but it's always
                      something that's going on in your head.
                      Even when I sleep, I dream from a hacker
                      perspective. 

                 7. Do you have a certain kind of site or
                 "target" sites that most attract you? 

                      We don't sit around with a big map and a
                      list of targets. In fact, we don't even sit
                      around together. Most hacking is done by
                      individuals who simply find things by
                      messing around and making discoveries. We
                      share that info and others add input. Then
                      someone tells the press and the
                      government that we're plotting to move
                      satellites and all hell breaks loose. 

                      I think most of us tend to be drawn to the
                      sites and systems that are said to be
                      impossible to access. This is a normal
                      human reaction to being challenged. The
                      very fact that we continue to do this after
                      so many of us have suffered so greatly
                      indicates that this is a very strong driving
                      force. When this finally becomes recognized
                      as a positive thing, perhaps we'll really be
                      able to learn from each other. 

                 8. What, in general, do you think attracts
                 people to hacking? 

                      People have always been attracted to
                      adventure and exploration. Never before
                      have you been able to get this without
                      leaving your house and without regard to
                      your skin color, religion, sex, or even the
                      sound of your voice. On the Internet,
                      everyone is an equal until they prove
                      themselves to be a moron. And even then,
                      you can always start over. It's the ability
                      to go anywhere, talk to anyone, and not
                      reveal your personal information unless you
                      choose to -- or don't know enough not to
                      -- that most attracts people to the hacker
                      culture, which is slowly becoming the
                      Internet culture. 

                      We find that many "mainstream" people
                      share the values of hackers -- the value of
                      free speech, the power of the individual
                      against the state or the corporation, and
                      the overall sense of fun that we embrace.
                      Look in any movie where an individual is
                      fighting a huge entity, and who does the
                      audience without exception identify with?
                      Even if the character breaks the rules, most
                      people want him/her to succeed because
                      the individual is what it's all about. 

                 9. Do you know enough hackers personally to
                 know what personality traits they share, if
                 any? 

                      Hackers come from all different backgrounds
                      and have all kinds of lifestyles. They aren't
                      the geeks you see on television or the
                      cyberterrorists you see in Janet Reno news
                      conferences. They range in age from under
                      10 to over 70. They exist in all parts of the
                      world, and one of the most amazing and
                      inspiring things is to see what happens
                      when they come together. It's all about
                      technology, the thrill of discovery, and
                      sharing information. That supersedes any
                      personality issues that might be an issue in
                      other circumstances. 

                 10. Do you think hackers are productive and
                 serve a useful purpose? 

                      I think hackers are necessary, and the
                      future of technology and society itself
                      (freedom, privacy, etc.) hinges on how we
                      address the issues today that hackers are
                      very much a part of. This can be the
                      dawning of a great era. It can also be the
                      beginning of true hell. 

                 11. What percentage would you say are
                 destructive as opposed to those in it out of
                 intellectual curiosity or to test their skills? 

                      This raises several points that I feel
                      strongly about. For one thing, hacking is
                      the only field where the media believes
                      anyone who says they're a hacker. Would
                      you believe someone who said they were a
                      cop? Or a doctor? Or an airline pilot? Odds
                      are they'd have to prove their ability at
                      some point or say something that obviously
                      makes some degree of sense. But you can
                      walk up to any reporter and say you're a
                      hacker and they will write a story about
                      you telling the world that you're exactly
                      what you say you are without any real
                      proof. 

                      So every time a movie like "Hackers" comes
                      out, 10 million people from AOL send us
                      e-mail saying they want to be hackers, too,
                      and suddenly, every 12-year-old with this
                      sentiment instantly becomes a hacker in
                      the eyes of the media and hence, the rest
                      of society. You don't become a hacker by
                      snapping your fingers. It's not about getting
                      easy answers or making free phone calls or
                      logging into someone else's computer.
                      Hackers "feel" what they do, and it excites
                      them. 

                      I find that if the people around you think
                      you're wasting your time but you genuinely
                      like what you're doing, you're driven by it,
                      and you're relentless in your pursuit, you
                      have a good part of a hacker in you. But if
                      you're mobbed by people who are looking
                      for free phone calls, software or exploits,
                      you're just an opportunist, possibly even a
                      criminal. We already have words for these
                      people and it adequately defines what they
                      do. While it's certainly possible to use
                      hacking ability to commit a crime, once you
                      do this you cease being a hacker and
                      commence being a criminal. It's really not a
                      hard distinction to make. 

                      Now, we have a small but vocal group who
                      insist on calling anyone they deem
                      unacceptable in the hacker world a
                      "cracker." This is an attempt to solve the
                      problem of the misuse of the word "hacker"
                      by simply misusing a new word. It's a very
                      misguided, though well-intentioned, effort.
                      The main problem is that when you make up
                      such a word, no further definition is
                      required. When you label someone with a
                      word that says they're evil, you never really
                      find out what the evil was to begin with.
                      Murderer, that's easy. Burglar, embezzler,
                      rapist, kidnapper, all pretty clear. Now
                      along comes cracker and you don't even
                      know what the crime was. It could be
                      crashing every computer system in
                      Botswana. Or it could be copying a single
                      file. We need to avoid the labeling and start
                      looking at what we're actually talking
                      about. But at the same time, we have to
                      remember that you don't become a hacker
                      simply because you say you are. 

                 12. Do people stay in hacking a long time, or
                 is it the kind of thing that people do for a few
                 years and then move on to something else? 

                      It can be either. I tend to believe that it's
                      more of a philosophy, a way of looking at
                      something. When you have the hacker
                      perspective, you see potential where others
                      don't. Also, hackers think of things like
                      phones, computers, pagers, etc., as toys
                      and things to be enjoyed whereas others
                      see work and responsibility and actually
                      come to dread these things. That's why
                      hackers like to hold onto their world and not
                      become part of the mainstream. But it
                      certainly can and does happen. 

                 13. What is the future of hacking? 

                      As long as the human spirit is alive, there
                      will always be hackers. We may have a hell
                      of a fight on our hands if we continue to be
                      imprisoned and victimized for exploring, but
                      that will do anything but stop us. 

                 14. Given increased attention to corporate
                 and government security, is it getting
                 tougher to hack or not? 

                      Hacking isn't really about success -- it's
                      more the process of discovery. Even if real
                      security is implemented, there will always
                      be new systems, new developments, new
                      vulnerabilities. Hackers are always going to
                      be necessary to the process and we're not
                      easily bored. 

                 15. Is the possibility of being identified and
                 even prosecuted an issue for most hackers? 

                      Hackers make very bad criminals. This is
                      why we always wind up being prosecuted.
                      We don't hide very well or keep our mouths
                      sealed shut to protect corporate or
                      government interests. But the same
                      security holes would exist even if we
                      weren't around, so I think the hackers
                      should be properly seen as messengers.
                      That doesn't mean that you should expect
                      them to just hand over all of their
                      knowledge -- it's important to listen and
                      interpret on your own, as any hacker
                      would. 

                 16. Are there hackers who are up for hire?
                 What are they paid? Who hires them, and for
                 what? 

                      Just as you can use hacker ability to attain
                      a life of crime, you can use that ability to
                      become a corporate success. Some are
                      able to hold onto their hacker ideals.
                      Others, sadly, lose them. It's especially
                      hard when young people who haven't
                      worked it all out yet are approached and
                      tempted with huge amounts of money by
                      these entities. It can be very hard to resist
                      and the cost is often greater than
                      anticipated. 

                 17. Have you had any contact with people
                 you consider cyberterrorists? Do you endorse
                 what they do? 

                      In all of the time I've been in the scene,
                      which is a pretty long time, I've never come
                      across anyone I consider to be a
                      "cyberterrorist," whatever that is. Most
                      people who talk of such creatures either
                      have something to sell or some bill to pass.
                      This is not to say that such a concept is
                      impossible. But I believe the current
                      discussions aren't based in reality and have
                      very suspicious ulterior motives. 

                 18. What about the people who hack into
                 Pentagon sites? Do you think they should be
                 punished? 

                      According to the Pentagon, there is no risk
                      of anything classified being compromised
                      because it's not on the Internet. If they
                      were wrong, I would like to see someone
                      prove that. If a non-classified site is
                      hacked, I don't see the harm unless
                      something is damaged in some way.
                      Remember, the security hole was already
                      there. If a hacker finds it, it's far more likely
                      the people running the system will learn of
                      the hole. If a criminal or someone with an
                      ulterior motive (espionage, etc.) finds the
                      hole first, it's likely to remain secret for
                      much longer and the harm will be far
                      greater. 

                      While you may resent the fact that some
                      14-year-old from Topeka proved your
                      security sucks, think of what could have
                      happened had you not learned of this and
                      had someone else done it instead. I'm the
                      first to say that people who cause damage
                      should be punished, but I really don't think
                      prison should be considered for something
                      like this unless the offender is a true risk to
                      society. The great majority of these cases
                      do not involve damage or vandalism, a fact
                      that largely goes unreported. What people
                      have to remember is that most of the time,
                      this is simply an example of kids being kids
                      and playing games like they have always
                      done. 

                      Obviously, the tools have changed, but
                      that's really not something the kids are
                      responsible for. If some kid somewhere can
                      access your medical records or your phone
                      records, he or she is not the one who put
                      them there. The true violator of your
                      privacy is the person who made the
                      decision to make them easily accessible. 

                 19. Your real name is Eric Corley. Why do you
                 use the name Emmanuel Goldstein? 

                      I believe everyone should be given the
                      opportunity to name themselves. That
                      name should reflect something about who
                      you are and what you believe in and stand
                      for. Emmanuel Goldstein is that for me, and
                      for those who want to learn why, get a
                      copy of George Orwell's "1984" and see for
                      yourself. Interestingly, our first issue of
                      2600 was published in January 1984. A
                      complete coincidence.