💾 Archived View for spam.works › mirrors › textfiles › hacking › kfyi-593.hac captured on 2023-11-04 at 13:23:21.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-

kfyi-593.pt1000666 000000 000000 00000036074 05400446102 011143 0ustar00000000 000000 KFYI Phoenix, 910 AM
Kim Kommando Show 5-22-93
Segment One

Cast of Speakers:
KK: Kim Kommando
MR: Mind Rape
MY: Mercury
B : Bruce
--: Any caller
A : Announcer

Intro Music...

A : And now another hour of Arizona's most exciting news/talk radio 
    continues as KFYI shows you how to take command of your computer. 
    Now here's KFYI's PC expert and syndicated columnist Kim Kommando.
KK: And here we are. We're gonna be taking command of that computer for
    the next two hours. 6 to 8 PM here on 910 KFYI. Any computer question.
    All you gotta do is pick up the phone and dial now. You are gonna be
    renting the nerds for the next two hours. 258-5394. 258-KFYI. We've got
    two lines open. You don't have to read the manuals. You don't have to 
    ask your friends and neighbors what kind of computer software that, that
    you should buy. Because you what? They may not have the right answer. All 
    you gotta do is pick up the phone and give us a call. 258-5394. 258-KFYI.
    Any computer question. And I guarantee you that we'll know the answer or
    do our best to have the right answer for you. And again, we have one line
    open. 258-5394. And joining us today, two very special guests. Well, Bruce
    is here. Bruce is our, our techno-extrodinaire. He knows the bits and 
    bytes of the universe.
B : Personally.
KK: Personally knows them. He can call them by name. But our special guests. 
    Their names. The first one is Mind Rape. Yes, his mother and father are 
    proud of that name, but I don't think that they gave it to him. And then
    we also have Merc. Short for Mercury. And these two gentleman, what, what
    they do. Now there's good uses of technology. And this is the stuff like 
    word processing. And you can write a book. You can help your business 
    grow. You can make yourself more productive. You can give your kids an
    advantage for the future. And those are the good uses of technology.
    And, if we think about it, we got computer chips in our washer machines,
    in our toasters, in our coffee machines. Just about any place you look 
    around there is a computer chip somewhere lurking in the mist. But what 
    about the bad things that technology does? I mean, Merc, we got a phone 
    call about a, probably about 6 months ago now, a guy called in and said,
    "You know Kim, computers are terrible. My father used to work, believe it
    or not, at a shoe factory." I remember the caller. "At a shoe factory and
    computers displaced everybody there. My father is 60 years old and he has
    no job. No money. And I have to support him. And I don't think what you 
    are doing is a service by, by having a computer show." Well I said thank
    you very much and, you know, on to the next caller please. Thank you.
    Well, some other bad uses of technology is quote unquote hacking. And 
    what hacking is is when you, when you use your computer to do unscrupulous
    things, in my opinion. And certainly hacking is not what a lot of people 
    would call the best  way to use of technology. But yet, the hackers exist.
    They've been around. You've seen the headlines. You know, "Billions Stolen
    From a Bank." You know, and normally we're talking about, about people 
    that aren't so, you know that they're not old, folks, you know normally 
    they're in their teens and they get a little bored and need something to
    do, in my opinion. And, and hence comes the word hacking. And so joining
    us, we have a, we have two gentlemen here. The first one's Mind Rape, 
    again. The second one's Merc. And gentleman, I'd like to to say thanks 
    for coming down. And, ah, I guess I am just gonna start out by asking you 
    what is, what is the worst thing that you have done. And I am going
    to pose the question to you Mind Rape. And ah, now you're a married man. 
    I see a ring on your finger. Ok. You have a family?
MR: Ah, Yes.
KK: Ok. And ah, ah, you have any kids? You got kids?
MR. Yes
KK: Ok. How old are you kids?
MR. That's not really important here.
KK: Ok. Well, I know, I just want to establish the fact that you are a family
    man. You got values. You got morals.You're married. You're not just 
    fooling around, you know, and, and, so on and so forth. What do you think
    is the worst thing that you've done by hacking?
MR: Ummm, as in worst as in the best accomplishment that I have done?
KK: Well I don't if I would, I guess, I don't know if, if we would call it an
    accomplishment, but if you want to use the word accomplishment, I 
    understand. But, what do you think it is, and I'll use your words, what is
    your best accomplishment that you have done with a computer.
MR: Ah, I would have to say, taking control over a major phone
    company system.
KK: Ok. So you took control of the phone system. What does that mean when,
    when you say you took control.
MR:  We accessed their systems and, umm, we were full, we had full system 
     privledges, we controlled everything. We were God.
KK: Ok. You were God. quote unquote?
MR: Uhuh.
KK: Ok. And, and, you accessed their systems. Could fool around with the
    billing? I mean, Could you make free long distance calls? Could you...
MR: We could have. That wasn't the point.
KK: What was the point?
MR: Just to see if we could do it.
KK: Ok. Then once you got in there what'd you do? Did you do anything malicious?
MR: No! No. No, that is, we do not, Merc and I do not believe in that. 
    That is totally unethical.
KK: So its kinda like a game then? To see if you can get in?
MR: Ah...Yeah...
MY: No...
MR: You wouldn't call it a game?
MY: No, its more of a way of life. A philosophy.
KK: Ok. So this is a philosophy. Now that's an interesting word to use...
    its a philosophy.
MY: It is.
KK: Ah...Explain that.
MY: Well, first before I can explain it, I would like to readdress your 
    previous definition of hackers. A hacker isn't necessarily someone 
    interested in breaking the law. I don't think you can build a case 
    that someone who broke the law is a hacker. They might have used hacking
    skills to accomplish their goal, but that does make them a hacker in our
    guild.
KK: Ok. So you don't think hacking is bad.
MR: No.
MY: I think their are positive uses of hacking skills.
KK: Ok. And, well, there are, you know, positive uses of guns. I mean.
MY: That's correct. That's a good point.
KK: There's positive uses of a lot of things. So you, so you don't think 
    this is a bad thing.
MY: I think there can be negative things that hackers can do. I think there 
    can be positive things. I think you have decide, ah, what you plan on 
    doing with your skills, and just like any skilled person, whether its 
    someone's who interested in electronics or chemical engineering or 
    whatever it is, you use your skill for negative or dishonest or criminal...
KK: But what do you get, what do you gain from getting into...
MY: You gain...I'm glad you're asking me that finally. Ummm...
KK: Finally? We've only been on the air a couple minutes. <laughter>
MY: You gain...You gain knowledge.
KK: You gain knowledge.
MY: There's a great amount of learning.
KK: What about reading an encyclopedia? I mean...
MR: Oh yeah!
KK: Reading a book?
MY: We do that too. Library...
MR: That's our...
MY: That's a hacker's heaven.
MR: That's our main resource. That's where we originally started at.
KK: Ok. If, you know, if you're out there listening and you have an opinion 
    about hackers or maybe you're a hacker, we loved to hear from you. I got 
    one line open. 258-5394. 258-KFYI. And especially if, you know, you have 
    an opinion about hackers, if you think its wrong, or, err, or maybe that 
    something has happened to you, or somebody has gotten into your computer
    and has done something that you don't think is ok, well, I want to hear 
    from you. 258-5394. 258-KFYI. And so, you know, so you consider this a 
    knowledge bank. I mean, you know, I guess I'm kinda sitting here saying
    I use a computer all the time. Ok.
MR: Uhuh.
MY: Uhuh.
KK: When you guys sat down, you said, gosh, you know, we're surprised to 
    see a woman.
MR: <laughs>
KK: Ok, you expected some... What did you expect?
MR: Well, most woman aren't really interested in, ah, computers. 
KK: Ok.
MR: There's nothing wrong with that. Ok, I mean, nothing wrong with women 
    using computers. But its a shame that not a lot of them take advantage 
    of it.
KK: Yeah, I mean computers are really cool. I mean they really are.
MR: Yeah.
KK: There's a lot of stuff you can do with them, and they are really just 
    wonderful. So tell me about the library.
MR: Ah, like we mentioned before, the library is our best resource. That's 
    where we originally started at.
MY: A plethora of information at the library.
KK: Ok, Give some examples.
MY: There are books at the library explaining how phone switching systems 
    work - telephony, computer science, programming manuals.
KK: Ok, so this isn't just dialing into, ah, lets just say, the phone system 
    computer.
MY: Uhuh.
KK: This isn't just dialing in. 
MY: Right.
KK: Now we gotta do some research before we can get in.
MY: Right. In fact, I've said in the past that if someone made real movie 
    about what hackers do it would be the most boring movie ever made.
MR: Yeah.
KK: Ok. I mean. I mean. Do guys have like a...I'm sorry I'm going to ask you
    this. But, do you have a life? I mean, you're married, you got some kids.
    I mean don't ya, I mean isn't there a better use of your time? I mean...
MY: Well, do you have a life if you are doing what you want to do with your 
    life?
KK: Ok. Alright, I don't what to say other than I think I could find a better
    use for my time. Lets go right to the phones. Lets go to John in Phoenix.
    John, you're on 910 KFYI.
--: <dead air>
KK: Hello John?
--: Yes!
KK: You're on the air John.
--: Oh. Ok.
KK: Welcome to the show.
--: Thank you very much. Ah, concerning, ah, I was listening to the 
    conversation when you first came on discussing with that gentleman,
    ah, concerning hacking.
KK: Mind Rape and Mercury are their names. Yes.
--: Ok
KK: Mind Rape.
--: Ok. I went to school and took quite a bit on computer courses for 
    programming and operation. And, ah, in hacking, I've found, that that's 
    one of the more...there's a lot of education involved in that. You getting
    into...its just like getting into a new library. You go into another 
    system...
KK: Now John...
--: A lot of people that hack aren't in there to cause damage. Just to see and
    look.
KK: John, have you hacked around? Have you done it?
--: I have hacked before.
KK: Ok. And why did you do it?
--: Just to see if it could be done. Just to take a look. Just like seeing an
    interesting book, you pick it up and you start reading it.
KK: Ok. So its really just something that you feel that, ah, its a challenge 
    for ya. Its something that you'd just like to try. Kinda like trying to 
    ride a motorcycle. I mean, I'd like to try a lot of things. I'd like to 
    try and paint, I mean. So you think that trying to get into somebodies 
    computer is, is a worthwhile venture?
--: It is to a certain degree as long as the ethics involved in it...as long
    as their is no mischief involved, any damage. I've hacked into IBM systems
    before. And, ah, that's how I learned how full network systems run. I got
    my first job...
KK: You know, John, you could read a book on networking and learn.
--: There's reading a book and doing it are two different things. Like reading
    a book on how to drive a car does not teach you how to drive a car.
KK: You know, John, I appreciate you calling in and sharing your success story
    with hacking, but I still gotta stand by that, you know, there's a privacy
    thing here. You know, Merc you're wearing shirt that says "I Love The Feds".
MY: That's sarcasm.
KK: <laughs>
MY: One thing that the caller said is people's system. Now that kind of leaves 
    a feeling of individuality. Umm...its true, when you hacking into someone's
    system you're not looking at someone's face. Or, or ah, you're connecting 
    to a system of an unknown individual, which is in a lot of cases. So I'd 
    like to start off by saying I'm not interested in hacking someone's 
    personal long distance phone codes. Or I'm not interested in stealing 
    service from the phone company. And I'd even like to state there are legal
    ways to call long distance for free. Just to make a point, believe it or 
    not, its true.
KK: Ok. It's legal?
MY: Right. There are legal ways to call long distance for free.
KK: Well,I don't think we need to go through that here, now.
??: <laughs>
KK: Merc, I have to ask you why is the Attorney General knocking on your door?
MY: Oh. Oh, that was a long time ago.
KK: Ok.
MY: Well, we were stumbling...stumbled across a system that...well, we didn't 
    know who owned it. It ended up being owned by the State Department of 
    Revenue. 
KK: <laughs>
MY: And they're a little touchy about accessing their systems. And, ah, its a 
    shame that it had such poor security.
MR: Yeah. Imagine if someone else got into it.
MY: That wasn't...that didn't have the ethics that we have.
KK: See, I don't...see I don't...you know, its a shame. You know, its 
    a...there's a lot of things that there's a shame out of.
??: Uhuh. <probably MY>
KK: I mean, it's a shame if I'm walking down the street somewhere and I get 
    mugged because I wasn't looking around. Ok?
??: Uhuh. <probably MY>
KK: I don't know if I...I guess, I'm taking a real hard stance on this because
    I think that what you're doing is, you're, ah, I mean technology is so 
    great, that, and its so powerful that what your doing is showing the bad 
    side of technology, and that's not good.
MY: What, what...
KK: I mean, you know...I mean, you know, you're outlaws.
MY: What, what bad things have happened by ethical hackers? Not a lot of,
    not a lot of bad things.
MR: Actually good things have happened.
MY: There have been a lot of good things. Would you rather that it, that if you
    were a student at a university, would you rather your system was secured by
    someone who used to be a hacker and understood the security holes and flaws,
    or would rather your system was secured by someone who just graduated, just
    got out of school, was green behind the thumbs, so to speak?
KK: Well I don't know if the universities will actually do that. There's, you 
    know, there's several programs on the market. We've got one line open. If 
    you want to join in, 258-5394. 258-KFYI. Just because we're talking about 
    hackers doesn't mean you have to. All you gotta do is pick up the phone 
    and give us a call. Let's go to Scott in Tempe. Scott, you're on 910 KFYI.

<Scott was having a problem with his new modem. I edited out his waste of time>
<as well as the commercial break that immediately followed this call.          >

<This ends the segment one, the first half hour of the program.                >
kfyi-593.pt2000666 000000 000000 00000063210 05401755474 011154 0ustar00000000 000000 KFYI Phoenix, 910 AM
Kim Kommando Show 5-22-93
Segment Two

Cast of Speakers:
KK: Kim Kommando
MR: Mind Rape
MY: Mercury
B : Bruce
--: Any caller
A : Announcer

Intro music 1: Each time I see a little girl, of 5 or 6 or 7, I can't resist 
a joyous urge, to smile and say, thank heaven for little girls...
Intro music 2: Eric Clapton

KK: And thank heaven for those little girls. Cause when those little girls 
    grow up they do computer shows. What do you think? I'm Kim Kommando. 
    We're talking about hacking. We're answering all those computer questions
    here today. We got one line open. 258-5394. 258-KFYI. Let's go to Bob in 
    Tempe. Your on 910 KFYI, Bob. <Zaphod>
--: Hi. How are you?
KK: Great.
--: I was wondering, ummm, they keep talking about this hacker ethic and
    I was kinda wondering what that was.
KK: Sounds like an oxymoron, doesn't it, Bob?
--: Well, not really. I mean, you can have lots of ethics I suppose you know, 
    say ah, there can be a difference I guess between destroying things and ah
    just wanting to see what's going on, curiosity.
KK: Ok, well, you...you guys answer that question.
MY: I'd like to answer that. First of all, we're not the ones that invented 
    the term Hacker's Ethic. In fact, that's an old, ah, term. That's been 
    around since...
MR: Since the 60's.
MY: Since the 60's...since it originated at MIT. Ummm, if you would like to 
    explore of the philosophy of the Hacker's Ethic ah, I would say read a 
    book called "Hacker's" by Steven Levy. That's...
KK: Which brings up, which brings up a good point. Ok? And ah, and, Bob, I'm
    gonna ask ya...you know, your welcome, your still on the air so you can 
    join in. Ok?
--: Ok.
KK: Ah, what about going to school?
MR: Well, I have attended school.
KK: What about...I mean, you know, certainly there's a lot of knowledge you 
    can gain by going to school.
MR: Well one of the problems is I did attend ASU for awhile. And, umm, and 
    the classes were extremely baby-fied.
KK: Did you graduate?
MR: Phht...no...
KK: No. Ok.
MR: I...The teachers were idiotic. They treat you like you know nothing. Which
    is understandable, ok? But I even tried to get into higher end courses 
    that they require like master degrees and stuff.
KK: Ok.
MR: And no. You have to take these courses. And I'm trying to tell them, I 
    know so, I know so much and I'm even willing to test out of these courses.
    They stilled refused. So I tried.
MY: I can second that. I've called up ASU in the past and asked to take some 
    advanced classes. Classes in which I probably could have taught their 
    instructors a thing or two about. And they insisted that I complete their
    MBA program before I go on to that class.
KK: Yeah, you know, but that's, that's a ah, that's a sign of youth.
??: Well...
KK: And I'm not that much older than you guys sitting here
MR: Uhuh.
KK: You look like you're in their twenties. I'm in my twenties.
MY: I would like to state I do have a degree in computer science. An 
    associates degree. But I didn't continue on to get the masters or the 
    bachelors.
KK: Ok. Ah, because, I, I have a bachelors in computers.
MR: Uhuh.
KK: I mean, I went through ASU. And, you know, there's a point in out lives 
    when we think we know everything.
MR: No. We don't. That's why we wanted to go to school. Because we wanted to 
    learn more. But as it turns out their sitting there telling me how to 
    format a disk, ok, when I already knew how to do, done this since I was 9
    years old.
KK: Ok, well, I can't believe that. You know, what about DeVry? What about 
    another school? I mean, certainly there are others ways...
MR: Its not just the school itself, its the teachers also.
MY: I guess the point we are trying to make is we've learned more on our own...
MR: Yeah.
MY: ...than we ever could have done going to a school.
KK: Now you're telling me that nothing...that you've never done anything bad,
    quote unquote. You've never, you've never used the computer, or the 
    hacker...
MY: To steal I'd say...
KK: To steal. 
MY: Right.
KK: Ok. Have you disrupted somebody's files to make them look a little crazy.
    Ah, just, just fooling around....I mean you weren't doing anything 
    malicious.
MR: Umm...no one is perfect. No one's perfect
MY: I've done that to other hackers to just play jokes and stuff though.
KK: But you know sometimes...
MY: But not to students to confuse them.
KK: You could have gotten into the Bell system, the phone company system.
MR: Uhuh.
MY: Could have.
KK: And ah, and maybe disrupted some of their files.
MY: Eh...Right...
KK: You know, and we're talking about a billion dollar a year company.
MY: I guess the mentality behind that is, is you could go out and buy a gun 
    to shoot someone but you don't because you have ah, ethics or I suppose 
    you have a conscience and...so we all have the free agency, the capacity
    to do anything be we choose not to because of free will.
KK: Ok. Ok, well, there's another term associated with hackers called 
    cyberpunks.
MR: No.
MY: No, we hate that term.
MR: No. No, I am not a cyberpunk
MY: It's new age. It's trendy. It's...
MR: It's a fashion statement that's what it is.
KK: Ok, well, a pocket protector is a fashion statement too, but, I mean...
MR: Well, we don't seem to be looking like we're wearing one <laughs>
KK: No, no pocket protectors there. Let's go to...Let's go to Mike in Phoenix.
    You're on 910 KFYI, Mike.
--: Yeah, just some general questions for these hackers. Ummm, found this kinda
    of interesting. I've been messing around with computers now for maybe about
    3 years. Been messing around mainly with Autocad. In other cases I get on 
    my modem and I horse around...just for the ah, bulletin boards services. 
    I've always been curious...how do they gain access. Can they give me some
    ah...
KK: So you want, so you want tips!
--: I'm just curious how they do it.
KK: You want hacker tips.
MY: Maybe he wants to know ways to keep it from happening to him.
--: That's very possible.
MY: Nothing wrong with knowing that.
--: No I'm just curious...
KK: Well it works both ways.
--: ...how do they around codes. How do they get access to the numbers.
KK: That's an interesting question. How do you do it?
MY: Different...different ways. It depends...
KK: Give me an example. Tell me how...
MY: If he's attached a major network, say the Internet or ah, Sprintnet say, 
    then there's already ways to connect to a system without going through a 
    login. There's mail ports, there's finger ports. Ummm...I'm primarily 
    someone who's interested in networks. For someone...
KK: You like networks.
MY: I love networks.
KK: Are they easier?
MR: No.
MY: Easier to hack? No. Because there are so many predecessors before us that
    they are more secure. But there are more ways...more different ways to 
    connect to them.
MR: You can literally go around the world.
KK: Ok. Explain that. Go around the world.
MR: For example, you can literally go around the world. All the way to Taiwan. 
    Right out of...
MY: I maintain...its not really amazing, its nothing...its no major 
    accomplishment that we made. Its the people who, who run the networks
    that really are the, ah, the great people as far as that accomplishment 
    goes. But, anyone who has, who has any experience working on the Internet
    knows that all you have to do is specify an Internet address and you can 
    immediately connect to any host, connect to any domain.
KK: Ok, and bypass any, ah, you know with Internet there are no real charges.
    But what about, like a online service like Compuserve?
MY: Ummm...Well I think...Well this is my opinion, I'm not gonna...I don't 
    want to hurt anyone here, but I think Compuserve...its just a blatant 
    ripoff.
MR: Its basically a joke. That's what it really is.
MY: There's...its a self contained system they have mail gateways on it to 
    the Internet. But what can you get on there that you...
KK: But there's, But there's a lot...
MY: ...can't get for free.
KK: Well, yeah. But there's, But there's a lot on there that you can get.
    Ok. Cause I use Compuserve all the time. But before we get into it...Mike,
    do you...do you think its ok to hack?
--: Do I think its ok to hack? 
KK: Yeah.
--: It depends what you're getting on to.
KK: Ok.
--: Ummm....I'm sure there lots of stuff you can get onto where you can't 
    create damage if you just do it for entertainment.
KK: Ok.
--: Then that would be ok. I think if maybe you get onto something, for 
    example, umm, a police service of some sort you could cause some damage
    and, ah, hurt other people unknowingly. Ummm...<garbled - she talks over
    him>
KK: But, but, you know, but the bottom line is if you think you're just...you 
    think that if you're at home, ok, you got a computer and a phone line.
    And, ah, you know, its a little slow around the household, you got...
    you're bored. And you're curious to see if you could do it. You think 
    its ok to go into somebody else's computer and take a look. Its kinda, 
    you know, cause sometimes computers are like your homes. I mean, there's 
    so much personal information on a computer.
--: I know a little about hacking. Although I haven't really gotten into it. 
    I know enough if you really want these boys out, there are ways to keep 
    them out.
MY: That's true. I would....I would say that most of systems that get hacked
    are systems that where the administrator never cared.
--: Yeah.
MY: And didn't take the time, the small amount of time it would have taken to
    secure the system.
--: But tell me about the networking. How do you get ummm. <laughs> How do you
    find the numbers for these things. How do you get access to these things?
MY: There are public Internet dialups.
--: Really?
MY: For instance, there's a new place in the valley that just ah, free public
    Internet access. And I guess I can't say that because you can't name names
    on the air, so I won't. But, ummm, you can access the Internet if, if you 
    are at a major university
KK: Ok.
MY: So...
KK: So, I mean, so if you know if you have access to Internet you're telling 
    me that I can go...
MY: Or government or military sites that are all connected to the Internet too.
KK: Ok. And so and its not very difficult to get in there.
MY: Oh, I wouldn't say that. But I'd, I'd say there are times when you find 
    systems that aren't secure. And...
KK: How long does it take you to get into one? On the average?
MR: It depends on the security of the system...
KK: Let's say just the average...
MY: On the average, how many times in a day, could I hack into...how many 
    sites could I hack into in a day, would ya say?
KK: Yeah.
MY: At the most, I would say four sites on the Internet.
KK: 4 sites in an 8 hour day?
MY: Ahh...well, maybe I didn't spend 8 hours doing it constant...I mean, 
    sometimes I'm not sitting there doing it, maybe I have a program doing
    it for me.
KK: Oh, so, so you can write programs. Well, I want to know about that. <laughs>
    This is interesting. I, I...this is interesting. We got...Mike, thanks for
    the call. We've got one line open. If you want to join in, 258-3954. 
    258-KFYI. I'm Kim Kommando on 910 KFYI.

<commercial break>

Intro Music: ACDC

KK: We're back answering all those computer questions here on 910 KFYI.
    Let's go right back to the phones. Let's go to Sharon in Phoenix. 
    You're on 910 KFYI, Sharon.
--: Hi.
KK: Hi.
--: Ah, I didn't know your boys were gonna be on and I got a DOS question and a
    comment.
KK: Oh no, that's cool. We'll take it. But no, let's hear your comment.
MY: Maybe we can answer it I don't know.
--: Yes.
KK: Hey, well, you know, give me a break here! You know, I do this every week 
    without ya. Ok, I mean... <laughs>
MY: Ok, I'm not trying to take your job, go ahead. <laughs>
MR: We want her job, man. <laughs>
--: Tell your boys to cool it.
KK: Cool it over there. Listen to Sharon.
--: <laughs> I think that what they're doing is akin to being in a 
    neighborhood, you know, that they're familiar with and looking in the 
    living room window or dining room window providing they don't...
KK: So they're peepers!
--: Right. Now if they open the files and actually read them, then they are
    looking in the bedroom window and then it changes a little bit.
??: <laughs>
KK: You know what, I gotta tell ya, the guys are getting excited here. You 
    say bedroom window and they're get excited.
--: Right. Exactly.
KK: You know, that's a good point Sharon.
--: Now what they're doing, if they tell somebody that there was something
    terribly illegal going on in that living room and that it should be fixed, 
    I'd say harmless fun, and thank you, you know, for letting us know. If 
    they let the security people know. On the other hand, if they keep going 
    in and keep looking then it isn't harmless fun anymore, then its invasion
    of privacy
KK: I, I agree with you Sharon. I think it is an invasion of privacy.
--: But on the other hand, kids will be kids and, you know when I grew up, they
    used to tip over the outhouse and they used to dump things. And...you know
    what I'm saying.
KK: Yeah. Yeah, you're right.
--: I don't mind, I really don't mind them doing it. And I certainly don't 
    want to see them go to jail for 20 years because they looked.
KK: But if, but if they look inside, and...
--: If they reach in through the screen and take anything...
KK: They should be put away.
--: Put them away.
MY: I...
KK: Put them away.
MY: I have a statement to say about that. 
KK: Go ahead, Merc.
MY: I mean, I understand the angle she's trying to take with this. And I agree
    when you're young, you do things, childish things, like tip over outhouses
    though I never have had the privledge myself. But all that...
KK: Get to the point, Merc. Come on.
MY: We take hacking very seriously, its not a childish type of thing. We have 
    reasons for what we do, and we also have things that motivate us, and, 
    umm...
KK: We're...We're going to talk about those motivations. But let's here that 
    DOS question first, Sharon.

<editted out Sharon's DOS 6.0 - the usual upgrade problems>

KK: ... And I appreciate you calling in, because you know what, Sharon, you
    brought up a great point, that, it is like you're looking in someone's 
    home ok, when you're hacking, ok because, you know, you're looking inside
    computers. Now, you know, Mind Rape. Nice name. <laughs> Bye the way...
    nice name...
MR: Its nothing sexual.
KK: Well, Mind...Rape...you know, I mean, you have to come up with a better one.
    But anyway, you look like a nice guy. What are you running around with a 
    name called Mind Rape for? I mean, its ah...
MR: Well, basically, it ah umm...phttt...it can be taken several ways. One, it
    describes who I am and how I see things. So basically my mind itself has 
    been raped.
KK: Now you consider yourself ethical?
MR: Pardon me?
KK: You consider...err...both you guys. You think you're ethical.
MY: We like to be. We like to be considered ethical. Yes.
MR: Yes.
MY: We believe we have ethics.
KK: Ok, now, now do you know what the definition of ethics is? I mean, can 
    you...can you tell me what the definition of ethics is right now?
MY: I didn't look at it in Webster before I came, so I probably couldn't give
    you his version of it. But ours is maintaining our own level of, of
    professionality in what we do and not...we're not out to hurt or...
MR: Profit...
MY: ...profit...we're not in it for profit and...
KK: We're going to talk about what the definition of ethics is, when we come 
    back. I'm Kim Kommando of 910 KFYI.

<commercial break>

Intro Music: Van Halen

KK: We're back answering all those computer questions. We're talking about the
    ethics of computing. The ethics of hacking not computing. We're here with 
    Mind Rape and Mercury, or short for, Merc. And we're talking about what's
    all happening and how they are able to get inside the computers. And 
    before we went to that break, I asked you the definition of ethics. Ok, 
    Merc? And you, you told me during the break that you wanted to work on it,
    you know, that, that you didn't give the right definition. Ok, so you tell
    me what it is.
MY: <muffled> again...again...<clear> Something wrong with the microphone. 
    <laughs>
KK: I know, go ahead shoot. Your on now.
MY: Short in it. Again, I'm not...I'm not...
KK: High tech place...I'm not the person who invented the term Hacker's Ethic
    But I know what it means as far as what I do and what I shouldn't do. And
    things that I shouldn't do is...well, ah...for any reason, for reasons of
    revenge or what don't destroy systems. Don't get involved for personal gain.
    Just be in it for the learning experience.
KK: Ok, for the experience. That's, that's what ethics means to Merc. Ok, lets
    go to ah, lets go to Bob in Scottsdale. Err...lets go to Gail in Phoenix
    Your on 910 KFYI, Gail.
??: Hi Gail.
KK: Gail?
--: Yes.
KK: You're on the air.
--: I'd like to ask Mind Rape, given his view of ethics, what ah, he was
    prosecuted for and what was the outcome of his case.
KK: Good question, Gail. Go ahead.
MR: Is your name by any chance Gail Thackeray?
KK: Now we don't give out last names here, its not important. Let's, let's go
    ahead Mind Rape. You're blushing a little bit. Why are you doing that?
MR: Well, I have been busted before.
KK: Ok.
MR: I have been prosecuted for telephone abuse.
KK: Telephone Abuse. Gail?
--: Isn't that theft?
KK: Yes. That's theft. Ok, now you got prosecuted for that. But you, you've 
    been telling me, here, for the last forty minutes that you don't do 
    anything wrong. That, that, you know...
MR: No, that was. That right there...
KK: Yeah but...
MR: It takes, sometimes it does take a bust to really show me what's...what 
    isn't right.
KK: But Mind Rape, for the last forty minutes, you, or so, you've been on the
    air. You've sat here and said, Kim... And you've said it to us, the 
    listeners, ok, I do it for the experience. I do it because I want to learn.
    Because I tried to go to ASU and I couldn't learn, you know, I couldn't 
    learn a damn thing. I didn't know anything...I couldn't learn anything
    because I already knew how to format a hard disk. But now, but now you're 
    telling me...now...now... You lied to us...
MR: No. No. I, as I mentioned before, no one's perfect either. I mentioned that
    at the very beginning of the show. No...not...
KK: Ok, well tell us why you got prosecuted.
MR: Ah, I was basically doing telephone fraud, which is abusing long distance
    service. Making free phone calls.
--: Free to whom? Someone paid your bill.
KK: Yeah. Us the consumers paid your bill eventually. I paid your bill Mind 
    Rape. Who'd you call?
MR: <laughs>
KK: How come I didn't get the benefit of the phone call?
MR: Well see, I don't have the resources to learn. Ok. I would go to ASU, I 
    would go to Devry. But one of the things is, I don't have the money. ok...
    And if there was...
KK: Oh my...get out of here...
MR: No seriously, if there were teachers and stuff out there, that willing to
    work with me, in such a way...
KK: No, I want to know why you were prosecuted now.
MR: Why I got prosecuted? For abusing telephone service and stuff.
KK: Ok, so how did you get nailed. ANd what happened to you? Did you go to jail?
    Did you get a fine?
MR: No, I'm, ah, currently serving probation. 
KK: Ok.
MR: Which is, you know, decent of them to allow me to do, to do that.
KK: Gail, you got a comment?
--: Yes. If he had a burning desire to learn about high performance race cars,
    no one would forgive him for stealing them and joyriding in them and taking
    them away from their owners. But he feels that he has a right to do the 
    same thing with computers.
MR: No, the telephone abuse, I would have to say, it was wrong. Ok. That was 
    my mistake.
--: What about exploring other people's computers without their permission or
    knowledge? And not caring about what happens to the computer while your 
    exploring?
MY: Well, again, your using the word people's. I mean, we're not interested
    in individual's systems.
KK: What they're saying, Gail, what they've been saying here, is...
MY: What about a government system that maintains list of information on 
    private citizens?
KK: Gail. But Gail, Gail, they're denying going into people's computers. Ok?
    Alright, They're saying they only go into companies so its ok.
--: Well...
KK: Now, I don't, I don't agree with them. I agree with you. I think your 100%
    right.
MR: We're not out there to steal information. Ok? We're out there to further 
    what we know. And some of the tactics, some of the tactics we have done...
--: You're out there to explore what interests you. And you don't care system 
    it is that you're on. And you don't care what happens to the system that 
    you are exploring. Because, when you explore it, you cause unforeseen 
    problems. And you're there to explore whether that happens or not. And you
    don't really care, do ya?
MR: Would you rather have me hack into a government site, or some KGB agent 
    hack into a government site?
--: I'd rather that nobody hacked into it. But I can't accept...
MR: But it happens...it happens...
--: ...the KGB's desire to do it as an excuse for your willingness
    to cause harm.
MR: Ehem...
MY: Back to the ethics thing, though, I... 
KK: No. We're gonna, we're gonna talk about the ethics thing...
MY: I would like to say though, as far as breaking into systems, that
    every time...
KK: Merc, I gotta put you...
MY: Go ahead.
KK: We're going to talk about the ethics thing. Because, you know...and I'm 
    gonna read you the definition of ethics, ok? And I'm gonna tell ya what 
    ethics is. Or what Webster's says ethics is. And what I think as a moral 
    person, with a value system, that pays taxes, that abides by the law, 
    what we think about ethics. What's important to us. I'm Kim Kommando here 
    on 910 KFYI.

<commercial break>

Intro Music: George Thorogood

KK: And we're back answering all those computer questions. We're talking about
    hackers. We've got one line open. 258-5394. 258-KFYI. And I'm gonna read 
    you, Mind Rape, Merc. I'm gonna read you what Webster's here...I'm gonna 
    look it up, Webster's Encyclopedic Unabridged Dictionary. Its a big, a big
    red book. What they say ethics is. Ethics is a noun. The body of moral 
    principles governing a group, a complex of moral held rules of conduct 
    followed by an individual or group and if you're ethical, ok, is that if
    you're upholding these rules, the standards of a profession. And I beg to 
    argue with you. Now, I've programmed. I, I have a degree in programming.
    I've had to program for Fortune companies in my life. I mean, you know, 
    I...now this is all...me being on radio just didn't happen overnight I've 
    worked for IBM. I've worked for ATT. I've worked for Unisys. In different 
    capacities. Now, I know that there's standards for computing.
MY: Uhuh.
KK: There are various bodies of conduct. Anything from where to put the pick 
    statements in a Cobol program, alright?
MY: Right.
KK: To ah...
MY: I'm a Cobol programmer, I know what you're talking about.
KK: Yeah, and They're a pain, right? Those pick statements...I hate em.
MY: Heh...
MR: I hate Cobol.
MY: I guess the, ah, the keyword in that was a group, followed by a group. I 
    guess we could safely say that our ethics, obviously, ah...I'm not gonna...
    When I say ours, I don't mean MR's and mine, I mean the ethics of the whole
    hacker community, and its not a small community either. We're talking 
    about thousands of people. I wouldn't say millions.
KK: Ok, but...but do you think its ok if, if a group of people... Do you think
    its ethical for a group of people to look inside my bedroom window?
MR: That's a different situation actually. 
KK: Why...
MR: That is your bedroom window. That is your house.
KK: Ok, but my, but my computer
MY: I don't know. It depends... Are you changing your clothes with the window
    open?
KK: Oh, So if I have the window open, its ok.
MR: <laughs>
MY: I mean, Well, don't blame me if I drive by and if I look and see you 
    standing there. Its the same thing, if people leave their systems wide open.
    Ah...and I'm not saying blame them. I'm saying there, ah, that we provide 
    a service, and its agreed, its not a service that a lot of people like to...
KK: You're unethical. You're unethical.
MY: In your terms of ethics, yes. I'm not.
KK: Ok, then say it. In my terms...
MY: In your terms I am not ethical.
KK: You are not ethical.
MY: Right. Because you obviously follow a different set of ethics than I...
KK: I, I follow what the dictionary says. And I say what the world...
MY: No, the dictionary said group, and your group and my group are not the 
    same group.
KK: Alrightie... Well we're gonna, we're gonna, you guys hang...you guys are
    gonna hang around for a couple more minutes. And, ah, the Hell's Angels 
    aren't very ethical sometimes either, but anyway, I'm Kim Kommando here 
    on...
MY: Great bunch of guys though...
MR: <laughs>
KK: ...910 KFYI. And ah, Daryl, Tom, Steve you hang on the line. we're gonna 
    be getting to your phone calls after the, ah, news, here, at the top of 
    the hour.

Exit Music...

<commercial break and news at the top of the hour>

<This is the end of segment two.>
kfyi-593.pt3000666 000000 000000 00000052725 05402640340 011150 0ustar00000000 000000 KFYI Phoenix, 910 AM
Kim Kommando Show 5-22-93
Segment Three

Cast of Speakers:
KK: Kim Kommando
MR: Mind Rape
MY: Mercury
B : Bruce
--: Any caller
A : Announcer

Intro Music...

A : And now another hour of Arizona's most exciting news/talk radio 
    continues as KFYI shows you how to take command of your computer. 
    Now here's KFYI's PC expert and syndicated columnist Kim Kommando.
KK: We're talking about ethical computing. We're talking about whether or not
    ethics, ah, can exist in hacking. I don't believe so. Ah, but we have two
    gentlemen here in our studio, ah, Mind Rape is his name. And also Merc.
    And, ah, we've been talking about hacking and before we go back to our 
    conversation, let's go to Steve in Phoenix. Your on 910 KFYI, Steve.

<edited of Steve's Windows/Parity problem>

KK: Alrightie. We appreciate you calling in. If you want to join in the 
    conversation, we got one line open. 258-5394. 258-KFYI. And just because
    we're talking about hacking, doesn't mean you have to. I'll answer any 
    computer question. Maybe you're out there shopping, you don't know what to
    buy. Well, here's the place folks. You don't need to get ripped off. All 
    you gotta do pick up the phone. 258-5394. 258-KFYI. And, and ah, you know, 
    before we went to the news, Merc, here agreed that, that ah, he was 
    unethical in my definition, which is the Webster's dictionary definition.
    But let me ask you what about...what's the, what's the, what's the deal 
    with the, ah, the UFO's? Tell me, tell me Mind Rape, what's the deal?
MR: Actually Mercury is more up to date on, ah, UFO's. That particular part...
MY: Ummm...this comes third hand. It's really...sketchy.
KK: Now you haven't done this?
MY: This is...ah, not me personally. This is common knowledge, though, that has
    been on the TV. And it was done by LOD. It is something that happened with
    LOD.
KK: What's LOD?
MY: Legion of Doom. Its a hacking...
KK: Legion of Doom.
MY: ...hacking group that mostly comes out of Austin, Texas. 
KK: Ok.
MY: Most widely publicized hacking group probably...
KK: Tell me what the Legion of Doom...you guys have great names. I mean, I 
    thought Kim Kommando was pretty good. Ok. But ah, you know...<laughs>
MY: Its all for show really.
KK: Ok, ah, mine's legit though. I was born with this thing
MY: Ok.
KK: Tell me about the Legion of Doom
MY: Well, this is two people in the Legion of Doom. Or two hackers in the 
    Legion of Doom. Eric Bloodaxe and Scott Chasin. And, bye the way, Scott
    Chasin is his handle and its not a real name. <laughs>
KK: Ok.
MY: Ummm, but they had, ah, a segment on channel 10. A dateline about, oh, two,
    three, four months ago.
KK: Ok, tell me what happened. What's the point? Alright.
MY: Well on TV they showed some, ah, screens of someone connecting to the 
    nic.ddn which is the Network Information Center for the Data Defense 
    Network. And they showed, ah, some printouts of, ah, the sites that they
    had found on there. And the printouts that they had hacked...they had 
    hacked into some of these sites. And some of the printouts read inventory
    on file referring to UFO inventory parts and also, ah, autopsies on report,
    or something like that.
KK: Ok, so, ok so the bottom line is though, that this Legion of Doom went in 
    there and they found information on UFO's that maybe the government doesn't
     want to share.
MY: I wouldn't, I wouldn't speculate myself. I guess the main reason that the 
    whole thing came out into the open was because, ah, the White House made 
    an official request to the Legion... I don't know if it was Legion of Doom
    or to their representatives for the information.
KK: Alrightie. Let's go to Tom in Glendale. You're on 910 KFYI, Tom.
--: Hi.
KK: Hi.
--: Ummm, I want to touch back first on what you were saying about education.
??: <garbled>
KK: Ok.
--: I have known, ah, Mercury for a number of years.
KK: Ok.
--: As a matter of fact I got my associates degree the same time he did.
KK: Are you a hacker Tom?
--: No, I'm not.
KK: Ok.
--: First thing I would like to say is I would, ah, immediately recognize that
    he has, ah, vastly more knowledge than I do.
KK: Ok.
--: And I went on after him and got a bachelor's degree, ah, through, ah, 
    Devry's bachelor degree program.
KK: Ok. Well, he's got more experience in what?
--: He's got more basic computing knowledge.
KK: Ok.
--: Ummm...
KK: Well, you know, its kinda like...Tom let me give you an example. Ok?
    It's kinda like you were to read an, ah, automobile repair manual, right?
--: Uhuh.
KK: Versus puttin' grease on your hands. Ok? Now, who is gonna be better at 
    fixing the car? Alright? The guy that's got the grease or the gal that's
    got the grease under her fingernails.
--: With computers and computer programming and such it doesn't work that way.
KK: Well, I, I tend to ah...you know what? I don't agree with you Tom.
--: <garbled>...computer programming classes are great for teaching you the 
    basics.
KK: Yeah, but that's my point, is that, is that you can learn the basics from
    the classes. But as far as actually getting in there. Now, I can read a 
    book on programming. I have done this in my life. I can read a book on 
    programming and until I actually get in there and start making the loops,
    the goto's, and all the other good...you know, all the other stuff. Its 
    ah...you can get messed up. You know what I mean?
--: Yeah. But the problem with the computer education system is the classes 
    that are readily accessible...
KK: Well they don't teach...
--: Anybody, even myself with a bachelors degree will teach you enough about
    any programming language to get you in...basically enough to get you into
    trouble.
KK: Ok, so but you think its...
--: And by learning on your own...I've taught myself more about languages I 
    didn't take in school than I learned about the languages I took in school.
KK: Well, what about writing a software program?
--: I've been working on one for the past three years.
KK: Ok, what about, ah, you know, ah, taking some classes on, ah, object 
    oriented databases. You know, and actually sitting there and doing 
    something like that. You're gonna... You know there are better ways to 
    learn, Tom. You know, there are better ways than fooling around and trying
    to get into Bell system computer then and getting nailed for it for 
    telephone abuse. You know, I mean...
--: You're talking two different areas there! You know...
MY: Actually no...ah, if you did break into the Bell System Laboratories
perhaps you would find source code
you could
study that source code
and further your knowledge
of, of whatever that source code is. Whether it's a
SQL database or...
KK: You could break into my house and steal my journal and learn a lot about me.
MY: Probably be pretty interesting too.
MR: <laughs>
KK: Nah...its pretty boring let me tell ya. Anyway Tom, go ahead.
--: Something that's not being said here, is, you know, people are blending 
    definitions together...<censored by station>
KK: Watch you language sir.
--: I'm sorry. Ummm...Phreakers. 
KK: Ok.
--: Ok. Then you've got hackers...they...most hackers you would never even know 
    they were there.
KK: Alrightie...well, you know, and...and most hackers...and that's the point.
    Because they're going in, and if hacking was ok, you, you'd know they were
    there. You would...you would have easy access to these computers. You 
    wouldn't have to sit there for eight hours.
MY: Actually, you can, you can phreak and, and ah, not break the law. Phreaking
    only means that you're interested in telephone technology.
MR: That's the true definition of phreaking...is to study the telephone system,
    not actually abusing codes and such.
MY: If your only goal is to obtain a free phone call, then you haven't gone 
    very far.
KK: Well, you know what, I guess my, my...
MY: I pay for my long distance. 
KK: Well, that's good.
MY: Even if I'm at a pay phone.
KK: And I'm sure Mind Rape now you do. Don't ya?
MR: Oh yeah. <laughs>
KK: He sends that little bill to AT&T every month. Now, let's go to Daryl in 
    Sun City. Daryl your on 910 KFYI.

<edited out Daryl's DOS 6 questions>

--: Ok, then, about the hackers, then.
KK: Ok.
--: Ok guys. Umm...here's, here's what...I think that there's...because I'm, 
    I'm... Ok, I'm an ASU student. I'm a CIS major...
??: Ok.
--: ...but I'm in, I'm in lower division so I'm not in the major yet.
KK: Ok.
--: Now, now I'm actually taking classes, but you guys could just go...
    Why didn't...why didn't you guys just go to ASU? You guys spend a lot...
    You guys pay for your long distance, so you guys do spend money. Why not
    spend that and go part time and just take a stupid class show that you 
    could get an Internet account?
KK: That's good, Daryl...
MR: Because I, I...
--: And then, and then you can get the Internet account and then you can mess 
    with it legally and you can get a lot of experience out there. A lot of 
    people will let you into their systems and, and that.
KK: But not only get into Internet...
MR: What...
KK: Wait. Wait, ok? Not only get into Internet. I mean, Daryl, I mean your, 
    your a CIS major, ok?
--: Right.
KK: Ok. You're learning something aren't ya?
--: Right.
KK: Alright. You're taking some business law classes. You're taking marketing.
    Now, you're also taking some programming too. You're getting a well 
    rounded...
--: I will be, yeah.
KK: Yeah. I mean, but you're not there yet but you will, because you're in the
    lower division. Now you're learning at the same time. You got the Internet.
    You got a couple things going for you. You got a future ahead of ya. You 
    know, you're what, 18, 19 years old?
--: 19.
KK: 19 years old.
--: Almost 20.
KK: Ok. Almost 20. Its kinda like, remember when you were a kid you were 
    saying, I'm almost, I'm almost 16, I can drive.
--: <laughs>
KK: Ok. <laughs> But ya got a lot going for you. Now, Merc let me ask you a 
    question. Ok? Your...
MY: First I'd like to address his question.
KK: Well, no, let me ask you a question. 
MY: Ok.
KK: Its my show. Alright? You're sitting...
MY: Ok.
MR: <laughs>
KK: <laughs> I mean, you're sitting in my studio here. Ok?
MY: Ok.
KK: Ah, now, isn't there more to life? I mean, you're 25. You want to be 
    sitting here when you're 35? I mean, you know, 45? 55? What about a 
    pension plan? I don't think you're gonna be getting a pension for laying
    off the hacking.
MY: Well, that's weird. I never told you my age. You must be a hacker too.
KK: No, I'm not.
MY: <laughs>
KK: I've got tons of things to do with my time.
MY: Well, first of all, I did want to say I do have legitimate Internet account
    that I pay for.
KK: Ok.
MY: Ah, second of all, again, I, I believe we have already gone over the 
    education bit. Umm...I would just say that, again, we can learn more on 
    our own by studying on our own. And, ah, I have lots of friends who are 30,
    and 40, and they used to be like us and now they manage networks. Ah...
KK: So, so what they did was they went legitimate. They used...
MY: Right.
KK: ...they used the experience...
MY: I, I believe there is a graduation from hacking. I do. I believe there is 
    a time when get tired and bored of it and you go on and become something 
    even better.
KK: You become a real person. A tax paying citizen.
MY: I pay taxes. 
KK: You pay taxes?
MY: I'm a software developer.
KK: Ok, well...
MY: Commercial software developer.
KK: A commercial... Do you have, ah, any, ah, winning products out there?
MY: I have, I have a product on the shelf in many, ah, many states of the U.S.
KK: Well that's, see...well that's, that's...and now...but you're moving away 
    from hacking. Ok. You're moving...
MY: I believe I am...
KK: Ok. You're growing up. Ok, because their is research out there, that says
    you know that most hackers are, are boys in their teens. Ok. And, ah, Daryl
    I appreciate your call.
MY: That's, that's not true though.
KK: That's not true. What do you think the, the...
MY: Oh man, I'm always amazed by the type of people that you find are hackers.
    Old people...
MR: Uhuh.
MY: I'm serious. I know a person who is 50 years old and he hacks. 12 year old
    kids. Or, ah, women. Ummm, there are women hackers, even...
KK: Well, I'm sure there are. Ok?
MY: But even sometimes people you don't like later you find out that they're 
    hackers. We find it amazing, even if we don't like them, we respect them 
    because they're a hacker.
KK: Let's go to Bob in Scottsdale. Bob, you're on 910 KFYI.
--: Ah yeah. I had a question addressed to your labeling of, ah, their ethics.
KK: Ok.
--: Ok, ummm, basically what ethics is, is it all goes on morals, right?
KK: Its ah, its morals...
--: Its based on morals, but...
KK: Its based on morals and values.
--: Yeah.
KK: And these are standards...
--: Ummm, not necessarily.
KK: ...followed, umm...nope. I, I beg to bar..., I beg to differ with you
    because I read it out of Webster's. Ok, it says...
--: You can also look up morals in Webster and its also what a society defines.
KK: Ok, well lets...but we're not talking about morals, we're talking about 
    ethics, Bob.
--: Yeah, but morals is what ethics is devised around.
KK: Ok. No, we're about ethics here. We're not talking about morals. What 
    ethics says is that its the morals and values followed by a group.
--: Exactly.
KK: Ok, now Bob, do you think its alright if you're, if you're, ah, in your
    bedroom and somebody takes a look in your window? Do you think that's fine?
--: If I didn't take the prevention of closing my window then, I guess, then 
    I'm not aware of that happening.
KK: Ok, but...ok, you're not aware of it happening, but is it right or wrong?
    Is it right...
--: I mean, its...that's a easy, you know, to describe moral. But...
KK: Is it right or wrong, Bob? Is it, is it right or wrong that if somebody is
    a peeper and they're standing outside your bedroom and they look inside 
    your window? Is that right or is that wrong?
--: Is that right or is that wrong? It depends on what society you're in.
KK: I'm asking you. I'm not asking society, I'm asking you. You're the one 
    that called in and said that I'm wrong on the ethics issue.
--: No, I'm not saying you're necessarily wrong, I'm saying that you're 
    definition of it is not...
KK: I gave the...
--: ...strictly defined because that is not something that...its always gonna
    have really fuzzy lines and that's what the hackers are in. Because, as
    far as they can see, its, you know, its ethical as far as they go, as far
    as they believe is far enough. What you're trying to pin on them is that 
    anybody that hacks is morally wrong. They're not doing...they're not 
    applying to your ethics, not theirs.
KK: I don't think their applying to society's ethics. I don't think its right...
--: Society's ethics are changing every day.
KK: ...at all. I don't think there not changing that much that it makes it ok.
--: Yeah they are, with technology changing the way it is, it changes every day.
KK: No. That does not change. Technology does not change morals and values.
    Technology does not get into whether it is right or wrong to steal. It's 
    still wrong to steal. It's still wrong to get inside the telephone's 
    computer system and to steal from them. That's still wrong, its not right,
    and technology has nothing to do with it, Bob. Ethics is something that, 
    that we're raised with. If we lose, if we lose our morals, if we lose our
    values, as a society, what do we have? We got enough chaos in the world.
    Ok, I mean, take a look at what's happening in Bosnia. Ok, this is a 
    computer show, we're gonna talk about Bosnia.
MY: Blame it on the hackers. <sigh>
KK: Would you...We're gonna blame Bosnia. Ok, we're gonna blame Bosnia.
MR: It was interesting what you mentioned about, umm, that hackers are pretty
    much unethical in your opinion, but what about Bill Gates?
KK: What about Bill Gates? He's the chairman of Microsoft. Ok? I know who...
MR: He's a hacker. 
KK: I know...
MR: And a hacker too.
KK: And he's a hacker?
MR: What about Mitch Kapor?
KK: Ok, well I don't know those...
MR: He's a hacker.
KK: I have no information...
MR: Author of Lotus 123.
KK: I have no information...
MR: And the gentleman that started the entire computer revolution, or actually
    helped a big part in it, is Steve Jobs.
KK: Ok, yeah, and he was, he...
MR: He used to steal telephone service. He used to bluebox.
KK: Ok, Yeah. The deal with, with, ah, Steve Jobs and Wozniak. Ok, for those 
    of you that don't know this story, this is a true story. Its documented in
    the history books. If you sign on to Prodigy, the online service, and look
    at the history of computers you're gonna see the story in black and white 
    on your screen. Ok, what these two guys did, these are the founders of 
    Apple Computer. Ok? They went legitimate, but I'm gonna tell you what they
    did before they went legitimate. Is a...in Captain Crunch in the mid 
    seventies, there was a whistle. Ok, it was a prize in the cereal box. Now,
    it...there was a certain way that if you used this whistle, and you were 
    making a long distance phone call, you got the call for free. Alright? You
    didn't have to pay. Now this was a whistle in a cereal box. This was a 
    whistle in a Captain Crunch box. Ok, so what these two guys do is they 
    figure out a way to make the whistle. Well, they make the whistle, or that
    sound, using a modem, more or less. Now it gets into some technical stuff.
    Ok, what they do is they start figuring out a way way to sell this. Yeah 
    they sold it. Alright. Was it legitimate? No. Ok. Did they get in trouble?
    Yes.
MY: And they graduated on to better things.
KK: And then they went legitimate, they grew up from hacking. And they went 
    legitimate and they started Apple computer. And that's the deal with Steve
    Jobs and Wozniak. I mean that...we're gonna go right back to the phones 
    when we come back. I'm Kim Kommando on 910 KFYI.

<commercial break>

Intro Music: AC DC

KK: We're back answering all those computer questions. Ending the traumas and 
    tribulations. And, we're talking about hacking. Which I, ah, which I'm sure
    you know I don't agree with if you listened to the show. And, and ah, Merc,
    you asked if you could say something. What do you want to say?
MY: Actually, you asked me to say it.
MR: <laughs>
MY: I said, well, well if your a computer, you'd be 60-babe-a-hertz. I don't 
    know if anyone here has met Kim before, but she's pretty fine.
KK: 60-babe-a-hertz. They, they call me the computer babe. We're gonna go to 
    John in Mesa. You're on 910 KFYI, John
--: Hi, Kim This is an outstanding program, I'm really enjoying it.
KK: Well, thank you.
--: Ah, you're never going to convince <laughs> your guests, and those people
    who do that sort of thing. There's two things they could look at. They 
    don't want to look at the Ten Commandments They don't want to look at the 
    Preamble to the Constitution and the Bill of Rights.
KK: That's a good point, John.
--: And what the governments prescribed from doing literally is the whole 
    concept of what our, ah, what our civil law depends on. So...
KK: That's right. Take that away what do we have? Right?
--: That's right, if you lose that...
MY: Actually liberty is taken away.
KK: Ok, what do we got? You know, if you take away the laws, if you take away
    this, what do you have?
MY: How much, how much privacy has the government allowed us to have?
--: But we have an opportunity to stand up and fight the government all the 
    way to the Supreme Court. And no other country in the world has that...
KK: And that's...
MY: And, meantime, the people all on the bottom all get hurt.
--: <garbled>
MY: I know an individual who was posting on a bulletin board about a year ago.
    I don't even know his name, so it will be easy for me not to, to infringe 
    anywhere here. But he was, he had gone to the department of motor vehicles.
    He owned an auto store. He wanted a...the list of everyone in Arizona who
    owned a Honda so he could send out a mailing list. The government, or the
    department of motor vehicles, wanted to charge him three, three or four 
    thousand dollars to do it. And I think his business ended up, ah...
KK: That's a whole other issue, ok?
MY: But, but its a privacy issue. And that's what's he...
KK: I don't know, that gets into some...
MY: They should give it away for free or not at all.
KK: No. No. I, I... <laughs>
--: Ok, I really didn't call, call to...
KK: That's ok. You know what, John, I'm glad that, you know, that you called 
    in to at least say "Hey, I agree with you." Ok but, ah, and I do, I 
    appreciate that John.

<Edited out John's confession of FSA (Flight Simulator Addiction) and various>
<hardware questions.                                                          >

KK: And John, I appreciate you calling in tonight sir.
--: Ok, I sure thank you. Thank you for your program. Great program.
KK: Thank you John. We've got one line open if you want to join in the 
    conversation. 258-5394. 258-KFYI. Any computer question just pick up the 
    phone and dial now.

<commercial break>

<This is the end of segment three.>
kfyi-593.pt4000666 000000 000000 00000055045 05403140622 011146 0ustar00000000 000000 KFYI Phoenix, 910 AM
Kim Kommando Show 5-22-93
Segment Four

Cast of Speakers:
KK: Kim Kommando
MR: Mind Rape
MY: Mercury
B : Bruce
--: Any caller
A : Announcer

Intro Music: Joe Satriani

KK: And we're back answering all those computer questions, ending the traumas
    and the tribulations here on 910 KFYI every Saturday six to eight. I'm Kim
    Kommando. Let's go to Tom in Phoenix. Tom, you're on 910 KFYI.

<Edited out Tom's terrible fears and worries about DOS 6.0 traumas.          >

KK: Alrightie, we appreciate your calling in. If you want to join in the 
    conversation, we got one line open. 258-5394. 258 KFYI. Lets go to Gary in
    Phoenix. You're on 910 KFYI, Gary.
--: Hi Kim.
KK: Hi.
--: First of all, I agree with John. You have a, have a great show here.
KK: Well, thank you. I appreciate it Gary.
--: Also, I have a comment concerning hacking, just real quick here. I, I agree
    with you hacking is wrong, and ah, those who...
KK: Why do you think its wrong, Gary? Tell me.
--: Its morally wrong. I mean, its like the, ah, analogy of looking in 
    someone's window.
KK: Yeah, its just not nice, you know I mean...
--: Invasion of privacy.
KK: That's right.
--: And, ah, those that can't understand that will some day when they grow up.
KK: Yeah. <laughs> When they do grow up.
--: Yes.
KK: When they do go legitimate in their lives.
--: Right. Well, the reason I called is I have a question concerning Prodigy.
    I just heard a real interesting rumor, maybe you and Merc can answer it if
    its true or not. You know how Prodigy is different than on Compuserve or 
    Delphi where, on Prodigy, you have, ah, they send you the software. I 
    understand Prodigy has a lawsuit against them concerning invasion of 
    privacy, because with that software, they can go in and look at your hard
    drive and see what kind of programs you are running there, like Word 
    Perfect, Wordstar...
KK: Yeah, you know what, there is, ah...that's an interesting point and yes, 
    it is a rumor. Ah, I do not know if its true. Ah, I believe... Do I 
    believe it happens? Yeah, I do. Ah, because, you know, if you look at, in 
    the Prodigy directory after you use Prodigy...
--: Yes.
KK: ...there's, ah, there's something called a DAT file. And if you open up 
    that DAT file, its a file directory of everything that you got on your 
    computer. Alright?
--: Yes.
KK: Which means that it happens.
--: Uhuh.
KK: That somehow when you sign onto Prodigy it happens. Ok, they know that you
    got Word Perfect 5.1, they know you got Wordstar, you know, whatever. 
    Whatever, you know, whatever you got on there. Now as far as do they use 
    that information, ah, I really don't know. Ah, you know, Merc, what do you
    think?
MY: Umm, actually, I wouldn't ever take the chances. I would use the Internet,
    a non, a non-graphic space.
KK: Ok but, but you know, but if you're using Prodigy, Gary...
--: Yes.
KK: Ok, you know, the bottom line is, is ah, you know, it is a rumor but do I 
    think it happens? Yeah, I think so. Now is it, you know, is it a problem?
    Ok? I don't think so.
--: Would you classify it as hacking?
KK: Ah, if...
MR: No.
KK: Ah, I don't, I don't think so. You know, I wouldn't...that's not hacking.
MY: Maybe a one time hack for the programmer who wrote it to do that.
KK: But, you know, I don't, I don't think that... Do I think that's right? No,
    I do not think that's right. But Prodigy does do that. And is there...you
    know, has it been in the news? Yeah it does. Yeah, it has been in the news
    that they do make that DAT file. Now, I don't know what its used for. You 
    know, sometimes people say, well, you know, I've got an illegal version of
    Wordstar out there, ok?
--: Yes.
KK: Now Prodigy knows. So now I'm setting myself up, cause I'm, ah, you know,
    to go against some copyright suits because I got an illegal copy of 
    software on my hard disk. So, you know, ah, you know, I don't know if
    there's any right, right answer for this. Other than do I think it happens?
    Yeah. Yeah, I think it does.
--: Ok, so, you can't confirm it. And, and I just heard it, just amazed me they
    would be doing something like that.
KK: You know what, Gary? You know what I'm gonna do is? I'm gonna, ah, I'm 
    gonna write Prodigy a note this week. Ok?
--: Ok.
KK: And I'm gonna ask them your question and next week I'm gonna read you their
    response.
--: Great.
KK: Ok?
--: Ok.
KK: And, ah, we'll see what Prodigy has to say.
--: Sure, that would be good.
KK: In their words.
--: Ok.
KK: Alrightie, I appreciate your calling in sir.
--: Thanks. Fine.
KK: And, ah, if you want to join in the conversation we got one line open. And,
    and, Prodigy is an online service. Its pretty cool. You know, its got a lot
    of good things on it. And ah, you know, if your a first time user, Prodigy
    is really...its a, its a good product. Let's go to Bill in Mesa. Bill, 
    you're on 910 KFYI.
--: Howdy.
KK: Hi.
--: Yes, I have a friend. He, umm, has a bulletin board.
KK: Ok.
--: And he was running it for awhile. Somebody got in there twice and totally 
    wiped it out. My question is, ah, is there ways the public out here can 
    protect themselves? What are the common ways they get into their computers?
KK: You know what, Bill? You bring up an interesting point that we should cover.
    And I appreciate you calling in and asking it. Because the way that someone
    can get in your computer, number one, is if, is if you, ah, leave your 
    computer on, and you leave it tied in with the modem on. Ok, or, you know,
    you have the modem, you know, hooked in. You got the phone line in. So all
    somebody has to do is tie in, tie in through a regular telephone line. And
    if your computer is set up that way, then yes, they can get in your 
    computer. Ok? And its not a difficult thing to do as, as these two, ah, 
    gentlemen here have been, have been expressing. You know, how easy it is.
    Ah, if there's...as far as different things you can do, there's, there 
    certainly is security software. Most bulletin board services... I'm 
    surprised that he has had that happen. Because will ask you to, ah, to 
    enter in your, you know, your first, your last name, your ID, and, ah, and
    so on and so forth, like Mustang. But, ah, let me ask you Mind Rape, what 
    can, what can a person do to prevent somebody like you from getting in 
    their computer?
MR: Well, first off, if its, its a bulletin board system. Ok, I'm not surprised
    that someone has gotten in. Because most bulletin board system software has
    been poorly written. Even Wildcat.
KK: Well, its, its shareware, ok?
MR: Ok. And people who do this aren't really hackers. They go in there and 
    they, you know, eliminate people's drives. They destroy them. That is not
    a hacker. That is, ah, you know, a board crasher.
KK: They're not hackers?
MY: No, they're a crasher.
MR: They're a board crasher. They go in there purposefully...
KK: Oh, this is a different one.
MR: They harm the sysop. We don't want to bother sysops. We don't want to 
    bother system administrators. We don't want to damage anything. By doing 
    that, you upset the natural way, the natural way the system operates.
KK: Ok, now what can... I don't want to get into...
MR: Ok.
KK: ...what's the difference between crasher and a hacker right now. Let's
    answer the question. What can a person do, to prevent, you know, as a 
    precaution, So that somebody who is a crasher or hacker, or whatever you
    want to call, you know, yourselves...
??: Uhuh.
KK: What, what can they do to prevent themselves from getting... What can you
    do as a safety measure?
MY: I would say use a, ah, a software, a version of software that's known to 
    be secure. And I wouldn't dare say...
KK: What does that mean?
MY :I wouldn't dare say that all, all bulletin software is secure because I'm
    sure all of...everything out there has bugs in it.
KK: What about, like, you know...no, give me some names...
MY: Major BBS is fairly, ah, is fairly, ah, secure.
KK: No. Security software. Do you know any names of any...
MY: I meant,. I meant use a bulletin board software that's known to be more 
    secure.
KK: And what would that be?
MY: Major BBS for one.
KK: Ok. And, ah, what else?
MY: Breadfan.
KK: Breadfan. Does that answer your question Bill?
--: Well, how about Telix? Telix has like a quick host. And, is that gonna be  
    one that will have a lot of problems?
MR: Umm, Telix is a telecommunications program as you already know and it will
    not allow people to drop to DOS. Ok? It puts them in a terminal mode. You
    would have to actually run a program called Doorway that would allow them to
    drop to DOS and actually mess around on your hard drive.
--: So if I wanted to, ah, remote boot to my own computer, umm, I'd be able to
    do that, as long as I don't use Doorway.
MR: I would suggest a software called PC Anywhere.
KK: Or, there's another one called, ah, Carbon Copy put out by Microcom that 
    does the same thing though.
MY: Right.
MR: And its those kind of software will offer more security features.
KK: Yeah, cause what you have to do is you have to log in. Ok? You gotta log 
    in, enter, ah, you know, I think there's three or four levels of security
    You know, where you have to to enter in various levels of passwords in 
    order to get in there.
MY: And remove any defaults that, ah, that come from the manufacturer.
--: Do these people get together and compare different ways they figure out how
    to get into these kind of programs?
MY: Not as much as they used to.
KK: Do you swap stories? You do?
MY: With each other, maybe.
KK: I mean, is this like, I mean do you sit around the fire and say hey I got 
    into this computer, bud. Let me show you how to access...
MY: That's how most hackers get caught. Talking too much.
KK: Ok, so, so, ok, but they get caught.
MY: Right.
KK: Ok, they get...hackers get caught. Let's listen to that sentence. Hackers
    get caught.
MY: Right.
KK: Ok, now. Thieves get caught.
MY: Right.
KK: Hackers get caught.
MY: Right.
KK: Hackers are thieves.
MY: No.
MR: No. Dogs can get caught by dog catchers.
KK: Ok, but hackers get caught. Ok, that, that means they're not doing 
    something right. And Bill, I appreciate you calling in, sir. We've got one
    line open if you want to join in. 258-5394. 258-KFYI. Let's go to Ray in 
    Scottsdale. Ray, you're on 910 KFYI.
--: Hi gang, how ya doing.
KK: Good.
--: Ok.
MY: Mediocre.
--: Ummm... <laughs> I can see why. Ummm, just to let you know, this is Ray 
    Moore, the president of the PC User group. And I want to address your 
    guests Kim. First of all, their mixing a lot of metaphors and they're 
    trying to take the, ah, its just like in that last sentence, dogs get 
    caught. You know, we're not talking about dogs. We're talking about people 
    doing things they're not supposed to.
KK: People. That's right Ray. We're talking about people. We're not, we're not
    dogs. Ok.
--: They're also using the metaphors of walking by a window and if just happen
    to be walking by and you happen not to close the window and if they happen
    to catch a glance of, of someone changing their clothes, that's ok because
    its the persons fault for not closing the window. Well, they're not just
    happening to be walking by. They're deliberately going out there, they're
    looking for systems...
KK: They're peepers...
--: They're, well, they're worse than that. They're, they're trying to find 
    people home. But getting, getting away from the metaphors, they're 
    deliberately going out there, they're looking for systems online, and, 
    granted there may be a couple that don't have any kind of security, but
    that's very rare. But they're going and they're having to get past 
    someone's security, so if you want to use another analogy, breaking and 
    entering. And, ummm, that's another point that needs to be brought up.
    There's also, you're saying, ah, about the whole ethics issue, your saying
    well, its ethical to us. There's also the thing as honor amongst thieves,
    but would you say that thieves are ethical people?
KK: Would you? Come on, now...
MY: Well, thieves aren't, but we don't steal.
--: But that's not the point. There's, there's honor amongst murderers.
MR: Oh, I thought that was the point.
--: No. No. No. No.
MR: Thieves get caught. Hackers get caught. So the analogy there is supposed 
    to be hackers are thieves.
--: And you say no hackers, ah...thieves.
MY: I would say there have been hackers that steal but because they steal, 
    that doesn't make them a hacker. You can't...
KK: But Mind Rape, you got busted for stealing. Ok, you got busted once.
MR: Yes, I...
MY: That didn't make him a hacker though. 
KK: Ok, but, ok, you weren't a hacker then? What were you then?
MY: I'm not saying that thieves can't be hackers. I'm saying just because they
    steal that doesn't make them a hacker. There's more to being a hacker.
MR: Its a state of mind.
--: But what you're doing...
MR: Its a state of mind. Its the way we think.
--: No, its not a state of mind.
MR: Yes it is.
--: No.
MR: Its the way we get creative.
--: No, well...
MR: Most of your systems out there, some of them are really secure and stuff 
    like that, and it takes some creativity just to get in these systems.
--: It doesn't take creativity for a thief to go in and break into a car, or 
    break into someone's house, or break into something else?
MR: We don't care about valuables. We don't care about financial gain and stuff
    like that. All we want to do is learn.
--: But you can go to school for learning. And you're saying...
MR: Schools out there are sucky.
--: No. No, hear me out. Hear me out. You've had your chance to talk for a 
    couple hours here. You're saying hacking is a school. Is that what you're
    trying to say?
MR: It's a method of learning.
--: Ok, so is sitting down and trying to devise things on your own but without
    going into someone else's resources. Its like saying when criminals get 
    caught and they go to jail, and they learn how to be better criminals 
    because talk to more hardened criminals.
KK: That's right.
--: And you're saying that's a school. And what employer do you think is going
    to hire you and look at you and say well lets see your credentials and you
    say well I hacked into this system.
KK: Let's, let's, you know, let's put this on our resume.
--: Yes.
KK: Let's, let's put this on our resume. Let's say that...
MR: I don't mind putting it on my resume. But to address your question...
    One, I don't have the money for school, ok? Second of all, I don't have the
    money to buy a Cray and the software to learn from it. Ok? If you're 
    willing to give me money. Fine, I'll do it.
KK: Yeah, but...
MR: I don't have the money, so, I have to find these resources on my own. Even
    if it does, or takes, illegal means to do it.
KK: If it takes, even if it takes illegal means to do it.
MR: But I want to learn! Is that the crime, here? Wanting to learn?
KK: Not at all. But there are...
MR: But, but, It seems like it is!
KK: Learning is a wonderful thing. Learning is great. I mean, every...I propose
    education everywhere, where ever I go. I'm on the board of the Consumer 
    Education, you know, board of Software Publisher's Association, just for 
    consumer education. So we get computers out there so people can use 
    computers.
MR: Let me give you...
KK: There are other ways to learn other than getting inside of a computer.
MR: Computers allow me to access information very fast. Ok? I learn very fast.
    And by using computers, it allows me to work at my own pace. Which is, you
    know, very fast. And, in school they move very slow. They cover chapter in
    three weeks. I can cover that chapter in five minutes.
KK: You can't beat formal education.
MR: Formal education doesn't work.
KK: Yes it does.
MR: It doesn't work for me.
KK: Look around you. Look around you.
MR: In high school, I was a very bored person. I got good grades in high 
    school, but yet I was a very bored person. I had nothing to do. So I turned
    to computer and started learning from that.
KK: Ok, and computers can do a lot for you.
MR: That's right.
KK: Computers can do wonderful things....
MR: Even in my computer class, my teachers encouraged me to explore.
KK: That's good.
MR: Because I...the computer classes were too simple. So they said here, learn
    from these books. Well, I'm done. Well, here here...
KK: Well, I'm sorry that you're brighter than the most people out there.
MR: Its not just me. Its a lot of hackers. A lot of these hackers are in the
    same situation.
KK: But, the bottom line in all this, ok, is that you can go to school. There 
    is a such thing as financial aid. Ok. You can find a class, you can 
    befriend a dean at a university. Ok. I was one of these people that thought
    I was to smart to go through computer classes.
MR: No, I'm not...
KK: Ok, let me finish. Alright? Ok. What I did was I started my own company 
    when I was going to school. Because I know the value of a piece of paper.
    Could I have worked for IBM without that piece of paper? No. Did I turn to
    hacking in order to learn? No. Ok, I did it the right way. And that's the 
    way that it should be done. It shouldn't be done going into somebody else's 
    homes. I'm Kim Kommando here on 910 KFYI.

<commercial break>

Intro Music: <should know it, dammit, but don't>

KK: We're back. And we're talking about whether or not its right to be hackers
    in our lives. Whether or not we should use this as a way to make ourselves
    better members of society. Whether or not, the, the ah, as Mind Rape says,
    he couldn't learn what he learns by hacking in schools. Well I have to 
    remind you, Mind Rape and Merc here, that in Arizona and in the 49 other
    states, here... And as one of our callers said, you know there's certain 
    rules that we abide by that allow us to live in the United States of 
    America, and it makes it a good country. Now in Arizona and the 49 other
    states, unauthorized access, two words, unauthorized access is a class 6 
    felony. Ok, its a felony. It's wrong. Its not right to do. Now, if you go
    in there and do something bad, ok, you're up on the felony echelon, here,
    ok. Unlike how you got busted for telephone fraud. Its a class 6 felony.
    Is it wrong for it to be a class 6 felony? I mean, is it wrong, 
    unauthorized access?
MY: Well, you have to remember, the people who made these laws are not the most
    computer literate people. You have to consider...
KK: So, our laws are wrong?
MY: Well, is it...
KK: Our laws are not good.
MY: Ummm, its not for me to judge. Its not in my opinion. I don't think all 
    laws are clearly written.
KK: Ok, so, our laws are wrong?
MY: Is that all it says?
KK: The laws are not right.
MY: Is that all it says?
KK: I don't have, I don't have it here in front of me.
MY: Its probably a lot more, a lot more, a lot more accurate than that...
KK: It is a class 6 felony. The bottom line is unauthorized access is a class 6
    felony. That's what it is. What you're doing is wrong. It's not right. It's
    wrong. And our laws are written by the people, for the benefit of the 
    people. Ok, it's a class 6 felony. And that's why you got busted. Let's go
    to the phones. George, in Phoenix, your on 910 KFYI.
--: Hi Kim. I'm really enjoying the program.
KK: Thank you.
--: Ummm, I have little bit, little bit different, ah, view from this, ah on 
    this, ah, hacking situation. First of all, these guys, to me, sound like 
    they're brilliant. And they're very bored.
KK: George, you have to be smart in order to hack. I agree with ya.
--: Exactly.
KK: Ok.
--: And they're very bored. And they really need a challenge. I would think
    it would be very advantageous for businesses, large corporations, to hire 
    these people to try to break into their systems so that they can find the 
    flaws in it.
KK: Which, yeah George, its happened.
MY: It's been done.
KK: That's what they're doing.
MY: I'll comment on that after...
--: No, I mean, paid...have the... I don't just mean do it on their own. I mean 
    for the corporations to hire them to do this so they can improve their 
    systems so they aren't able to break in, to be broke into.
KK: So we know we have a career for you guys, ok.
MR: I...
--: Exactly. I mean really, these guys... Who would look your house over to 
    tell you how to protect it from a burglar?
KK: That's right.
--: Somebody's that's done that in the past.
MY: There's...
--: Now these guys are not doing anything really bad, ah, with respect to 
    stealing and changing data and so forth, then they have knowledge we need 
    to, to umm, to use for our benefit.
KK: And George...
--: We're not just gonna say go away and they disappear. They're gonna, they're
    gonna be doing this, until they, you know...
KK: And George, I appreciate it. Because, you know, your absolutely right and 
    it has been done. In, ah, in San Francisco there was a company up there who
    actually hired hackers.
--: Uhuh.
KK: To break into their system and to tell them where the flaws were.
--: Exactly.
KK: So that this way they knew where all the parts were of that system that 
    could be broken into by the bad hackers in the world, if there is such a
    thing as bad hackers.
--: Uhuh.
KK: Ok, and, now, my personal feeling is that, that its not hackers...its, its
    not right. Its a class 6 felony. Its wrong. Its a wrong thing to do. It's 
    un...
--: Yes. It is wrong.
KK: Yeah. It's unauthorized access...
--: But if these guys have that ability, then there's other people that have 
    that ability that are not gonna be, ah, unscrupulous about it. They're 
    gonna make the adjustments. They're gonna make the changes. They're gonna
    steal the data. So what we need to do is get somebody that can teach other
    people how to protect their systems.
KK: And, you're absolutely right George. And I appreciate you for calling in and
    bringing up that comment. Take command of your computer. Well, it's 
    copyrighted 1993 by the Broadcast Group. All rights are reserved. I'm Kim 
    Kommando. We've been taking command of that computer. Every Saturday six to
    eight pm, here on 910 KFYI.

Exit Music...

<This is the end of segment four and the end of the program.>