💾 Archived View for spam.works › mirrors › textfiles › bbs › mondo.txt captured on 2023-06-14 at 15:54:57.

View Raw

More Information

-=-=-=-=-=-=-



                            Riding the BoardzZz

                     A Guided Tour of the Underground

                (An article taken from MONDO 2000 Issue 8)

   You are going to hear the Real Voice of the kid down the block. He's
handsome, what they call clean cut. He has a way to go before he passes the
law's marginal threshold of eighteen years, and he's been online for over
two years. You'd never guess that he can talk like this.
   He starts out talking tough, and ends with high idealism that teachers
hope to generate in their kids. But his contempt for the education that
America offers him is total. His education is taking place on the wire.
He's growing up in cyberspace, growing up literate in a text-based culture
that the kids have created for themselves. And at school, he says, the
computer illiterates are grooming him for the car wash. Does he scare you?
Very good. This is what the best young minds are hacking from what they
percive to be present reality. And as one of the Boards tells you as you
log in: Future? No future! Listen now.

                                             - St. Jude

I dial... and at the delicious sound of the tone... punch in the magic
numbers that will permit me to make thousands of dollors worth of calls,
courtesy of my new-found host. Another night on the line.
   For me, this all started a few years back, at reform skewl. A very good
phriend introduced me to the wonderful world of Cybercrime. He dazzled me
with tales of breaking into files of the head of the skewl and forwarding
telephone calls for Grand Central to the homes of disliked acquaintances.
Being the mischievous little fucker that I was, and having the fortune to
be blessed with a sharp mind, I saw a golden oppertunity: to wreak havoc in
a new and intellectually stimulating way. When I obtained a computer the
following year, I had no trouble keeping myself occupied.
   The top of one of my favorite anarchist newspapers reads, "Information
Is Strength. Knowledge Is Power"-truer than ever in what we're told is the
Information Age. Fortunately, by the time I had learned enough to be a
significant threat, I had also learned to be fairly responsible.
   As you know, the hacker-as-villain was invented by the currupt swine in 
our government, and perpetuated by our media. As most of you probably also
know, the government is full of shit. Our old buddies in office fight to
keep people over those they supposedly serve. America truly is a melting
pot - the scum rises to the top and everyone on the bottom gets burned. But
I digress...
   Anyway, there are very few hackers who fit the villain description.
Those hackers who are belligerent and destructive are generally ostracized
by the rest of the HP (Hack/Preak) community. There was a recent post on a
board by some idiot who stated that you should juice a system for all it's
worth and then crash it, destroy everything on there. The responses he got
from other hackers ranged from insults to outright threats. Assholes like
this represent a problem not only to victims they abuse, but also to the
rest of the underground community.
   That settled, we can get on with this. When you enter the world of the
computer undergound, you're going to have to nevigate through a virtual
ocean of jargon. A term which you may not know is "phreak." The word is "ph"
as in phone + freak. It comes from that ancient time of Peace, Love and
Happiness (not to mention Grass, Acid and Fellatio) known to us as the late
60's. Everyone who was anyone back then was some kind of freak - so we're
told. Those freaks who were fond of abusing the telephone system were
Phreaks.
   Probably the most famous phreak was Cap'n Crunch, who placed a phone
call around the world to himself using the wonderful (and now obsolete for
most U.S. phonelines) Blue Box. While I'd love to tell you about Cap'n
Crunch and the phorephathers of phreaking, I'm merely going off on a
tangent. If you'd like to learn more, get yourself a copy of "Secrets of
the Little Blue Box," which appeared in Esquire in 1971.
   Anyway, a phreak is to phones as a hacker is to computers. Phreaking
includes breaking into and dialing out from PBXs, tapping phones, ETF
(Electronic Toll Fraud), and most other exploratory or experimental
activity involving phonelines or phone networks.
   A phreak is one who phreaks.
   OK. Here are some other terms:

BBS or Board - a computer Bulletin Board System. An underground BBS is a
place where members of the computer underground can call and exchange
files, as well as infomation.

boxing - Using a "box." Boxes are devices made to manipulate the phone
system. The Black Box allows anyone calling a similarly equipped phone to
avoid any charges. The Red Box simulates the tones made by a pay phone to
indicate that money has been inserted, thus allowing unlimited phree calls
from many payphones. There is a multi-use everything box, the Rainbow Box,
which is most useful in Europe, available from our Dutch friends.

codez - Phone numbers and authorization codes allowing one to make free
phone calls by way of extenders, such as PBXs.

codez kid - A term used for people who exist in the computer inderground
merely to find codes for making free calls. They are looked down upon by
real hackers and phreaks, because of their ignorance.

carding - Purchasing with a fraudulent credit card.

HPCAV - An abbreviation for Hack Phreak Card Anarchy Virus, which sums up
major interests in the computer underground. Virus, of course, refers to
computer viruses and Trojan horses. Another popular term is HP,
Hack/Phreak.

pirate - (Also called a cracker) One who cracks the copy protection on
copyrighted software.

PBX - Private Branch Exchange, a local phone network usually internal to a
corporation. Phreakers find an access number into a PBX, then dial an
authorization code to get an outside line, for unlimited planetwide calls,
toll-phree.

social engineering - Conning favors or infomation (such as passwords or
codes) from authorized personnel by pretending to be a fellow employee or a
hapless customer. Contrary to popular belief, this is the way many
accounts, passwords, and other nice things sought by hackers are obtained,
rather than by brute-force hacking.

VMB - Voice Mail Box. You know what this is. Hackers/Phreaks/codez kidz use
them several ways. One, this is a way others can contact hir, since a
hacker will never give out hir real number - that would blow hir anonymity,
the most sacred thing to any HP. Second is for codelines. A codeline is a
VMB that is run by a phreak/codez kid who puts voice messages with news,
calling card and credit card numbers, codes, accounts on various systems,
and other current goodies.

   There are several varieties of underground boards. First, there are the
HP boards. On a good HP board, one would expect to find many HPCAV files to
download. This sort of board also supports a message base where one can
correspond with other members of the computer underground on everything
from hacking to music.
   These message bases are by no means limited to the board itself, either.
There are scores of nets in exstence, linking only a few local boards, or
dozens of boards all over the country. There are even some nets in the 
underground that are international - linking underground bulletin boards
from countries all over the world.
   The other main type of board you will find in the computer underground
is the Pirate or "Warez" board. A "Ware" is copyrighted software, and the
warez boards are centered around software collecting, cracking, cracking
groups, and related activities, with less of an emphasis on HP. I will go
into more detail about "warez dOOdz" and their little subculture later.
Most of them are even more ingnorant than codez kids.
  Not all boards fall solely into one of those categories; many have
aspects of both. There are also boards that are more specific than the 
above, like boards that deal stricly with viruses and Trojan horses. And,
while there are many people who are interested in both HP and also like to
play games, there is an element of antipathy in the HP scene toward people
who devote all their time to getting more games and who really don't know
jack-shit about anything else. Also, there's the hardware elitism factor.
   You see, games distributed in the pirate world are often huge - we're
talking upwards of half a dozen megs a pop for some of them. This places
importance on high speed (9600bps and up, preferably HST or dual standard)
modems and extremely obese (from a few hundred megs to up in the gigabytes)
hard drives. What has happened is that users are restricted on the pirate
boards just because of there data rate. I know people who would be among
the most productive there, but are denied membership because they transfer
files at 2400 bps. Not only that, but it seems that any rug rat with
parents rich/stupid enough to shell out $900-$1200 for a modem is
immediately eligible for membership. This is ridiculous. I've seen
supposedly elite warez dOOdz who can't even operate their fucking PCs
without a menu-driven shell program. Pathetic, eh? I shit you not. I think
the intelligentsia of the pirate community better do something about this
crap before it's too late.
   Now, in the pirate scene and all its lameness, there is an island of
intelligence. This is the people who crack the games. Cracking is the
process of removing or defeating a copy protect or other protection from
copyrighted software. On any decent pirate board, all the games and other
software will be cracked - most of this thanks to cracking groups who
compete with each other. This competition guarantees both a wide variety of
new games for the warez geeks and losses of millions of dollors for the
software companies who should be getting something out of this, but don't.
If you log onto any decent pirate board, you will see captions such as "0
day warez," which means that many of the games sold down at your local
Softdick Software store are available to pirates as soon as or even BEFORE
they are available to customers. Heh heh, it's good to be a computer
criminal, yes?
   Now that I've covered the quality underground boards, I should probably
fill you in on what I refer to as the "SubLame" scene. I call it that
because in the underground, there is elite at one end of the spectrum and
there's lame at the other. Codez kids and warez dOOdz are examples of
lameness. A great hacker who really knows his shit is elite. Technically
only the top 2 to 5% qualify as elite, but in a real sense, elite means any
high-caliber hacker. In the SubLame scene, they don't even make it onto the
spectrum.
   Picture a sublamer: you enter the room of a junior high/high school
male. Clothes and garbage hide the floor. The walls are shingled with
bullshit band posters. In one corner of the room, you can hear the slow
peck-peck of a keyboard - the little geek has never really learned to type.
Look over there and see the back of a head of scraggly long hair, and a
neck full of pimples. You can almost see his breath. Congratulations,
you've met him in the flesh. Lucky you.
   Ofcourse this is only a stereotype. There are girls - few and far
between - even some genuinely cool people. Who knows, there may even be
some people who read MONDO and therefore must be cool, right? I myself
started out by calling these boards, but I've evolved.
   These boards are the easiest to find and get onto. There are billions of
them out there, kinda like mosquitoes. They are generally put up by some
local kid without much to do. One way to distinguish them from decent HP
and Pirate boards is the precentage of LD - long distance - users. HP and
Pirate boards will have more than 50% LD users. Sublamer boards are
populated almost entirely by local callers. Many of the users have met and
know each other personally. They even get together for social events
organized through the BBS, meet at the mall, or go to the movies.
   Another thing about these boards is that most of them are warez
wanna-bes. They generally have copyrighted stuff online and always try to
get new warez. Most of them have "security," which translates into not
letting you have access to the "elite" shit unless they "know yer cool."
This means they call you voice (rare) or you sound cool to them in your
application for access. They want to make sure "you're not a Fed or
anything, dude," because they seem to think that the average federal agent
has nothing better to do than go after fourteen-year-olds trading
copyrighted games. Man, do they live dangerously.
   As for the message subs (subjects), the content of the conversation will
obviously be geared to what they devote thier time to, such as who won the
ballgame last night, how far they've gotton with their (usually fictitious)
girl friends, who can kick whose ass, and bif Madonna's tits are. But there
is a characteristic unique to the sublame boards, and that is warring.
   Warring is, ofcourse, the arguments and insults exchanged between users
on a board. Sysops on most underground boards will tolerate varying amounts
of this and will penalize or kick users off if it gets out of hand.
However, in the realm of sublameness, warring is encouraged. Many have a
WAR Sub, which is a message sub board which exists exclusively for users to
insult each other (and their mothers). To give you a little insight into
the psyche of the average sublamer, let me tell you that on many boards the
WAR sub gets as many messages as all the other message bases put together.
   This scene is mildly amusing nonetheless. And they do have a few ties to
the real computer underground. Every now and then you will see one of them
on a supposedly elite board. The geek in question either slipped through
security due to a careless sysop or managed to get access to a warez board
because his parents bought him a 12-million-baud modem. These few people
are usually the ones who get the "Elite Warez," which are uploaded to all
the local boards.

    THE WRITER SPEAKS SERIOUSLY:

You know, a few years ago I could not change directory in dos. I knew
nothing about computers, nor phones, nor did I have a clue about the
workings of our high-tech society. Then I got a computer, and along with it
- a modem. That modem was the door to a universe of pure infomation, a
frontier just waiting to be explored.
   A hacker is a pioneer, traversing packet-switched networks, bridges,
outdials and trunks all over the physical world. The hacker explores and
maps out this virtual universe for hirself and hir peers, so that they may
reap the knowledge that is there in unspeakable abundence. Every
underground board is an outpost, a spot where the pioneers can rest,
exchange infomation, form groups and hear the current news.
   This is how we learn. The traditional concepts of learning and teaching
are rapidly becoming irrelevent in this society. All the years of school
with all the bullshit of my brainwashed peers and ignorant "teachers" - we
all know what a farce this has become. Especially in a country that is
continually whittling away the meager budget for education so it can have
more bombs for murder, more satellites and agencies for spying on its own
people. This is a new school: a learning environment where everyone can
work at hir own pace, and no one is "graded" by biased or unfair "teachers."
This is a place where people exist without skin color, creed or physical
disabilities; where you are judged on one thing alone: your mind.
   Next time you see in the news that some fifteen-year-old kid had his
door kicked in and his family held at gunpoint while the Secret Service
took away his computers and other possessions, which will never be
returned, remember this article. Think about Steve Jackson Games. Think
about a hole generation of young people confused by this fucked-up world,
who just want to learn, just want to understand how things work, what makes
things tick. Think about all that, and then you decide who the criminals
are.

  End.