Yet Another Article on Hacking 96
metalgeek writes "CNN conducted two interviews about hacking. One with Emmanuel Goldstein is the editor-in-chief of 2600: The Hacker Quarterly. The other is Dr. Charles Palmer, one one the head security guys at IBM. fairly well written
article over all."
Huh... (Score:1)
Tired of the misconceptions (Score:1)
A true hacker(and I'm sure I've heard this on slashdot before) chooses to help people and works to advance the tech community instead of setting it back. Wannabes caught up in malicious actions will be nothing short of lost, as karma has adverse affects on one's future
Emmanuel Goldstein (Score:1)
This system was used for copanies to set up global bulletin boards for corporations. They had an admin account made their own BBS. They got caught rather quickly as one could imagine. The bottom line was Eric Corely (Emmanuel Goldstein to the "hackers") was only mariginally involved in this hack. He was busy hand dialing for LD codes so he could connect to warez boards. blah.
They were to close to pure gold though! They could have read the messages there and gleaned the power of x.25 networks. They didnt even harness the power of monitoring x.75 gateways by connecting to debug ports on the mighty Tp3000 packet switches! Nothing like a hex dump of transactions from EDS!
He had a nice big of change from his parents and started this rag called 2600. He never knew how to actually hack. He is what we call a social hacker. He talks about stuff but has no idea how any of it is done. When confronted about his own skills , he talks vaguely about stuff that makes it seem like he is in the know.
He doesn't really *get* it. He only knows the most superficial public domain type of things that can be done thru hacking and only a vague notion how anything is done.
Kids think he is cool cuz he wears a ratty communist jacket and has a 2600 van painted to look like a old Nynex van (which is outdated cuz Bell Atlantic absorbed Nynex). He talks about hacking. He is like a rebellion figure to them.
Not that this is important , but Emmanuel also has serious issues of a Nambla type nature. So please advaise your kids before they get into that van or go to his house in L.I. for that yearly "halloween" party.
next you guys will be telling me Kevin Mitnick is a frigging superstar hacker. Go Kevin Poulsen! tell this guys what hacking is really about!
Old news (Score:1)
www.bluealien.org
First posted on April 05, 1999 (Score:1)
Here's a link to the story the FIRST time it appeared on slashdot.
http://slashdot.org/articles/99/04/05/1646251.sht
More interesting intro, and this article links to the hacker insurgency front page, of which this interview is only a feature.
Isn't it a requirement that you READ slashdot in order to POST STORIES?
Re:This is old. (Score:1)
Re:Goldstein VS MTV (Score:1)
Re:Reporters and 'Hackers' (Score:1)
"yes suzy, have that report for the tuesday show on my desk by tomorow morning, you know the one with the alien interview...make sure you get in all that detial about how they sirvive, and about their parralell universe...try and ask some questions about abductions and why thay do them"
later that day: "hello mr Joe Bow, im a reporter, Suzy Smith, and I am wondering, are you an alien from a parralel universe?"
"well, it must be your lucky day, I am!"
"okay well theres a few question i have..."
it may sound redicoulous but really thats exactly whats going on! and it too is riduculous...argh!!
Re:Then and Now: Apples and Oranges (Score:1)
Re:2600? hackers? (Score:1)
Breakthroughs vs break-ins (Score:1)
"Computers should be
These people agree... (Score:2)
1) They both believe maliciousness of any form is reprehensible and rightfully legally punishable.
2) They both agree that "true" hackers (those who follow the "hacker ethic") are doing it for the passion, the intrigue, the curiosity and discovery of it.
3) They both think that more encryption and education are the solution, not just closing their eyes and blaming "bad" people.
"hacker" is a state of mind...
Hacking is a felony? (Score:2)
Eek! According to that IBM guy, I can go to jail for that ray tracer I wrote, or that natural selection simulator where the program guessed the optimum input to a function that even I didn't know how to optimize.
Methinks that IBM guy is trying to redefine what "hacking" means.
I know, I know, it's a lost cause... the word has been stolen from us. I'm still pissed about it, though.
---
Re:IBM has no sense of Humor (Score:2)
That being said, most hacking is more along the lines of simple pranks. Any law enforcement official can tell you how pranks turn into felonies in the hands of a inept prankster, but for the most part pranksters go along their merry way, doing their work in the face of authority, and most people dont really care all too much.
The fact that we tell our children not to tag the walls of buildings or drive over the speed limit, or sneak into bars, or smoke weed, or whatever probably wont stop them from trying it. But that's not going to stop us from telling them.
-Rich
-Rich
I agree! (Score:1)
LINUX stands for: Linux Inux Nux Ux X
Goldstien isn't right on the ball.... (Score:1)
Goldstien, though his definition is closer to mine, he crashes on a few points that indicate a slightly misguided attitude. Particularly with statments like:
The true violator of your privacy is the person who made the decision to make them easily accessible.
This is DEAD wrong. If I leave my house unlocked that doesn't absolve anyone of wrong doing who walks in and searches through my stuff. Goldstien doesn't understand that virtual trespassing DOES exist, and IS just as wrong and RL trespassing. If *my* data is on *my* machine and I don't intend you to read it, then if you to do so, it's an invasion of my privacy on your part. Period.
Goldstien really needs a wakeup call in this.
My G-D, this is ANCIENT!!! (Score:1)
Re:Hacker News Network beats /. to the punch! (Score:1)
Re:2600? hackers? (Score:1)
Do you work for MTV? (Score:1)
Emmanuel is around my age and 411 or 1411 has been the USA number for INFORMATION ever since it was broken out from general "0" operator service, at least as far as I remember.
Blacklisted 411 is another mag, if that is what you have scrambled in your ill-informed little head. In the case of Blacklisted, the 411 means INFORMATION and they do not mess much with computer hacking, they publish physical hacks (though most of it is pretty ancient, still entertaining to read).
Re:2600? hackers? (Score:1)
Re:2600? hackers? (Score:1)
Re:Emmanuel Goldstein (Score:1)
Re:Just goes to show... (Score:1)
*grins* Mainly because I wasn't that drunk - I'd spent most of the night either chatting to Dark Tangent and co(horts
BTW: I was the journo in the hat and the coat who decided it was much more fun to join in the fun than to write about it
Simon
Re:Breakthroughs vs break-ins (Score:1)
Re:Just goes to show... (Score:1)
And I should care why?
Hacking is a state of mind - it doesn't mean you have to break into things to be "cool". It means that you thirst for knowledge, and you don't give up until you get it. And then you thirst for more.
It's a thirst that is never quenched.
You don't have to be part of some psuedo-cool subculture to be a hacker. If you're a loner, why identify with any group?
Simon
Re: hacker and crackers (Score:1)
Re:Correct use of the term "Hacker" (Score:1)
Think of it this way: If some criminal decided to call himself a locksmith, because he picks locks to break into people's houses and smash their televisions, is he really a locksmith? And should the real locksmiths get a new name because the media screwed it up? Of course not.
The same thing applies here: If some criminal decided to call himself a hacker, because he picks passwords and program bugs to break into people's computers and smash their information, is he really a hacker? And should the real hackers get a new name because the media screwed it up? Of course not.
--------
"I already have all the latest software."
Re:2600? hackers? (Score:1)
Im glad the magazine exists. Your foolish if you don't think emmanuel goldstein doesn't make money off that magazine.. he easily makes $120,000 profit from selling that rag a year. (cept when his distrbution company went out of business! woop he lost quite a bit of bread that year.. we are watching Corley!)
Plus he cons dummies into thinking he is a consultant in security! he hasnt hacked anything since he still had Hair! back when he was in 414 area code. He makes some nice change doing this. I can't knock him for it at all.
Just realize , his profit motivation is strong. This is is livelyhood. He must pretend to know to hack to continue to survive and add gravity to his vauge comments about H/P
Just goes to show... (Score:1)
As for Emmanuel Goldstein - what a star. Though he looks kinda different from when I had breakfast with him in a greasy spoon in Manchester, England after an all-night hacking run. 1996 - an excellent year
:-)
Simon
A little knowledge is a dangerous thing
Re:Just goes to show... (Score:1)
Emmanuel got one right..... (Score:1)
I don't know what that IBM guy is thinking.
Then again what can you expect from IBM, company songs, odd blue dress code.......
I can see where brainwashing would fit in.
Once again the evengelist and the Pragmatic (Score:1)
IBM has no sense of Humor (Score:2)
Car Salesman: But it goes 500Mph at 200 miles per gallon, and it only costs $500
Corporate type: Yes, but breaking the speed limit of 55 Mph is a felony
Car Salesman: Excuse me while I go shoot myself
Goldstein VS MTV (Score:3)
MTV'S "TRUE LIFE" - A REVIEW [2600.com]
Two poles (Score:1)
As an offtopic aside... 2600 seems to be sharing the same fate as Saturday Night Live. They both used to be great.
Reporters and 'Hackers' (Score:2)
How can a journalist ever figure out if someone really is a hacker ? Put yourself in their shoes for a second : you're used to writing about the adventures of Bill and Monica, or the latest 'hot news' about Britney Sprears, and then your editor tells you to do a story about 'hackers'. What would you do ? All you know about computers is how to turn them on and start Word. And then this nice person comes along, claiming to be one, and tells you a lot of stuff about 'hacking' and the cool stuff he has done. Your editor is never going to ask questions about this stuff, 'cause he knows even less about computers than you do. And you've got a deadline. What would you do ?
Maybe it's time for a site listing "Certified Hackers" (with their accomplishments) the media can get their soundbytes from :-)
Read first, post later (Score:1)
They were not written as such, they were interviews. And for once the respondents and the interviewer seemed to be fairly informed and reasonable although they had different perspectives.
--
Well this is slightly better (Score:1)
Re:Emmanuel got one right..... (Score:1)
Never once at my employment at IBM was I subjected to company songs or the odd blue dress code. I have heard of the dress code, but that has been defunct for a while
Re:IBM has no sense of Humor (Score:2)
I can certainly understand the challenge and excitement, and even the relative harmlessness of entering a forbidden place. I have not hacked into computers as such, but I have climbed over barbed wired fences and "hacked" my way up microwave towers. The two are comparable, IMHO, in that there was at least an attempt at security but it was obviously not foolproof, I did it primarily for a thrill, and there was no permanent damage. I imagine that it would be a thrill to enter my neighbor's house while he was on vacation, or to "slim jim" open a car door to demonstrate the weak security. In the great scheme of things these are not major crimes, but to call them harmless is to ignore the very real concerns of the property holders.
I don't know what the proper balance is. Is a harmless breakin akin to just checking your neighbor's door to make sure he left it locked, or is in equivalent to coming in and checking out his dirty laundry, or is it, as Mr. IBM would suggest, tanamount to stealing his silver. As a sysadmin, I would like to be able to treat every unauthorized access as an illegal act because I can't always tell whether something was damaged. Clearly there is an onus on me to make sure my door is closed and I have a good inventory, but when I catch someone inside poking around I think it's reasonable to call the cops or at least the person's parents.
--
Credentials (Score:4)
Finally. Would MTV please take note?
Still, given the industries recent propensity for requiring certification (CLP, MSCE etc), does this mean that there will be a H4X0rZ certificate?
And who will administrate it? Will there be one for NT, one for BeOS, and another for each implementation of *NIX? Must Red Hat start giving the Linux certificate?
Still, can't wait for the new business cards - John Smith, BSc (Hons), h4X0R d00d...
Exam paper for Linux h4X0r d00d accreditation: Pick ONE of the multichoice for each question:
Q1) Packet sniffing is:
a) Using an NIC on the network to examine other traffic not addressed to that NIC.
b) What your dog does to strangers' crotches
c) What the Postal service does to suspicious mail
Q2) A buffer overflow exploit is
a) A data storage area can be flooded with a bit stream, enabling hijacking of the IP register to execute custom code.
b) didn't malloc() properly.
c) Shoe shine boy cleaned your shoes twice & charged you ten times the going rate.
etc...
---------------
NT h4X0r d00d exam as provided by MS
Pick ONE of the multichoice for each question:
Q1) Describe the NT security model
a) Any breaches are hypothetical
b) Any breaches are hypothetical
c) CDC are liars
Q2) Describe B02K
a) A malicious hacking tool
b) A malicious hacking tool
c) CDC are liars
etc....
And there'd have to be a grade at the end of the exam:
0-45% ScriptKiddie. Go back to AOL, stop trying to pass B02K off as your own, and QUIT WANKING!
45%-60% Wannabe. Keep trying!
60%-80% h4X0r. Stay away from milnet, you still aren't covering your tracks.
80%-100% 31337 h4X0r d00d!!! |/\|3 ph33r U! P13323 d0n7 h4X0r u5!!!
Re:this is really old (Score:1)
-Grandpa_Spaz
hate to be the one... (Score:1)
-lx
Re:2600? hackers? (Score:1)
Like it or not print media still enjoys the highest protection of first amendments rights. 2600 Magazine pushes the limits when it comes to distributing information about how critical parts of the world we take for granted runs or is vulnerable.
It isn't the best magazine. It is not the bible. It is information for hackers written by hackers. It is certainly higher quality than most of the postings I have read here deriding it.
-weld
Re:Emmanuel Goldstein (Score:1)
The hacking community is more than just bit twiddlers and buffer overflow experts. That's neat but so is communicating the problems with current technology to the masses. Emmanuel has his best skills in this area. I don't see anyone else in the hacking community publishing a print journal (excpet maybe blacklisted 411) or holding a radio talk show. These are efforts to go beyond publishing on web sites and security mailing lists where it would be preaching to the choir.
-weld
Re:Reporters and 'Hackers' (Score:1)
Let's see if the FBI woulld sponsor it...:-)
Eric Corley has no idea how expensive hacking is (Score:1)
Fortunately I'm behind a firewall that makes doing even legitimate work very difficult, plus my shop is protected by relative anonymity amongst hundreds of computers on the LAN...
In addition, while there is no classified information accessable from the internet, there are often documents that could potentially cause the government to waste millions of dollars or even potentially risk the lives of servicemen and women if those documents were destroyed, altered, or misused. I even have an example. Safety reports are supposed to be official use only for many reasons, but there is one huge time/money wasting reason to keep some information for official use only. In order to ensure that people involved in accidents fully cooperate with safety investigators (to prevent future accidents), all information gathered by the safety investigation team is privledged information much like anything you tell a lawyer is privledged. There have been cases where information in those documents have led to multi-million dollar lawsuits that never should have happened, simply because the document was given to the wrong person.
This kind of abuse directly wastes taxpayer dollars, and has the potential to cause loss of life because if it keeps happening, people will not cooperate with safety investigations in the spirit of the 5th amendment of the Constitution.
These are only a couple of examples that point out the childishness of Corley's statements. He suggests that the ability to literally throw away millions of dollars in lawsuits and wasted work hours is a desired and legitimate end state simply to satisfy his and other's curiosity. I'm 100% in favor of "hacking" as a way to solve everyday problems with unconventional solutions, but I fail to understand why he says hacking private, corporate, or government sites is "ok" simply because there is no classified information on that site. In some cases, simple unauthorized distribution of unclassified information can be truly damaging and dangerous. Doing so in some misguided attempt to further a hacker spirit is not "ok", it's unethical and in many cases criminal.
This is of course my opinion, not that of my employer. Direct flames to
Re:Emmanuel Goldstein (Score:1)
this article is old (Score:1)
Re:Just goes to show... (Score:1)
I see women who love hackers.. why power. intoxicating.
its romantic
its adventure
its exciting.
it makes me piss my frigging pants!
Re:Just goes to show... (Score:1)
Re:Just goes to show... (Score:1)
There's no conflict there, that's why. Anything illegal makes the news - especially something which most people don't know a lot about. The more exotic it is, the more likely there's a story in it. However, the media doesn't define what hacking is - it just shows one aspect of it. (Take this from someone who was a member of the media for 5 years).
I see women who love hackers.. why power. intoxicating.
Hmmm... never needed to show my "hacking prowess" to impress a woman before... Then again, I guess some people need crutches like that.
its romantic
its adventure
its exciting.
So is a candle-lit dinner, or white-river rafting. I don't know of many hackers who hack because it's "romantic". The adventure/excitement side of it can be found in anything, if it interests you.
it makes me piss my frigging pants!
Maybe you should try something which doesn't have such an extreme effect on your control of your bodily functions.
Simon
Re:Just goes to show... (Score:1)
they are the voice of the national conscience. or at least they shape it.
they say hacking is cool , hacking is cool.
A true hacker (Score:1)
Re:Emmanuel Goldstein (Score:1)
That's so amusing - it was still possible in 1994.
Simon
Re:Credentials (Score:1)
man that one kept me laughing for a while!
I totally love jokes like that
so how do we make the point to the media that hackers are crackers and geniuses are hackers?
maybe hackers should change their name to hequorniguroz, and that way the media would stay away, A. because the hacker keyword has already gained popularity and 'buzz word' factor, and B) because they'll never spell it right!
But that wouldnt be smart, we cannot leave or own turf, its just not fair..we shall fight it to the DEATH!
err.yeah whatever... (cmon i know im not the only one making stupid posts at 4:39 in the morning!)
Re:Goldstein VS MTV (Score:1)
we really need to do something about this, this is getting out of hand, does it violate something to call it a documentary and have it full of *bullshit*! (alright you smartasses that insist on referencing an RFCxxxx document on every post, now's your chance!)
I think a moderate group of 'hackers' should join forces and go and beat the crap out of some media people, hehehe. make a stand! go and destroy the MTV offices! But that woudltn eb very hacker like would it? And we'd have to do it after the saturday late night StarTreck Original rerun...
I guess that really the 'genuine' hacker doesnt really care, I guess its a matter of who gives a shit, these people are all screwed and misinforming eeveryone....etc.... blah, but why should i interrupt the coding of my new networked toaster for these non-worthy lusers, especially wehn I havent even written the subroutine to handle drawing pictures by burning the toast to varying degrees! Heck I dont even have the algorithm connecting color intensity to average current applied to the micro-heat-element over time. I cant afford to be wasting time on things like the '/media/', and especially not if it requires me to get out of this chair and go out into that place some people call 'real life' ugh, reminds me of college days, i dotn want to go back there! I guess the best we can hope for is a DOS attack
ahh well i guess ive calmed down now...and managed to make an idiot of myself! jesus its 5am, i gotta breack this vicous slashdot cycle
Proofread submissions please! (Score:1)
Come on, you guys are supposed to be professionals now ;)
"One with Emmanuel Goldstein WHO is the editor-in-chief of 2600: The Hacker Quarterly. The other is Dr. Charles Palmer, one one ^W OF the head security guys at IBM."
Memo to IBM (Score:2)
2) Do not quote IBM magazines. There's a simple reason for this - nobody reads IBM's "official technical magazines", including IBM employees. On the brighter side, everybody recycles them. There's a simple reason for this - they are incredibly boring, especially the cartoons and jokes.
3) Your CEO is a former "cost efficiency expert" and avoids interviews where technical questions could be asked. Replace him with somebody who knows what an "operating system" means. Meanwhile, it may also be a good idea to change your culture, fire the bureaucrats, and put real programmers in charge.
4) You say that
There's a major threat from within IBM....the threat of boring everyone to tears. Stop this epidemic before it gets serious. Hire people who don't talk like IRS employees.
5) Do not show ads. with people wearing black suits and staring straight ahead. It scares customers away.
6) Don't try to act like a "fun", "hip", "Gen-X" company. It scares customers away.
7) Do not use words like "IT visioneering" and assorted crap.
8) Do not read memos from
w/m
Re:Emmanuel got one right..... (Score:1)
"What can we expect from the company that also brought us company songs, and a strange blue dress code?"
Then and Now: Apples and Oranges (Score:4)
Today, hacking in the sense of "doing cool stuff with a real OS" (as opposed to, say, reverse-engineering assembly code as part of a copy-protection defeat) doesn't require breaching the security of third party systems. Rather, it's now about knowing how your own system works.
For anyone who hasn't yet read Stephen Levy's "Hackers", (I, like many, was inspired to re-read my dog-eared copy upon the recent /. review [slashdot.org]), go read it. IMNSHO, open source has become the canonical embodiment of the original TMRC-era philosophy: "Always yield to the hands-on imperative".
> But if you're mobbed by people who are looking for free phone calls, software or exploits, ... ] While it's certainly
> you're just an opportunist, possibly even a criminal. [
> possible to use hacking ability to commit a crime, once you do this you cease
> being a hacker and commence being a criminal. It's really not a hard distinction to
> make.
Thank you, Mr. Goldstein, for making the distinction. Why the media has steadfastly refused to pick up on this for the past 10-12 years is both unfathomable and unforgivable.
Re:What a load of crap (Score:1)
Re:Ohhh (Score:1)
Re:this is really old (Score:1)
This is a really old article (Score:1)
responses to Memo to IBM (Score:1)
This is old. (Score:2)
Re:This is old. (Score:1)
a definition of hacking (Score:1)
Re:2600? hackers? (Score:1)
Headshots (Score:1)
If you're offended by people judging you by your appearance, think of grooming as social engineering...
Goldstein is old-school, and still thinks that way (Score:2)
I see a lot of support from the rest of the
Goldstein is still a child at heart. He's curious. And, I have the feeling that because every thing is 'lectronic, it's not quite real to him.
Until people realize that you can indeed "trespass" on "Virtual Real Estate", and accord the same rights to it as exists IRL, the "Netizen" will always be a second class citizen. Goldsteins way of thinking keeps us that way.
I don't think curiousity should be punished - but some people have to learn to respect other peoples boundaries. It really doens't matter what your motive is, or that you won't do anything damaging with what you learned. If someone puts up a big red sign that says "Do Not Enter" - that should be enough.
How is an online store any different from a real life one? If I go to the store at the mall, toward the rear there is a door. It's marked "Employees Only". If I go thru, I'm trespassing. It doesn't matter that I'm not taking anything, or doing anything harmful. (while one may debate the merits of whether or not land can be owned, and whether anyone can restrict any one else from accessing it - that is neither here nor there, things are the way they are) If I go to an online store, and start nosing around the back-end of it, is that so different than me going thru an employees only door?
Like I said, Until people respect online resources in the same ways that they respect the analogs that exist in real life, the online "world" will forever remain a fantasy-land.
- Porter
2600? hackers? (Score:1)
Reminds me of something I heard... (Score:1)
UBM
We all BM
For IBM
*runs*
Re:What a load of crap (Score:1)
are in it just for the money. "
If you actually believe Emmanual (or anyone else at 2600) are making loads of cash publishing 2600 your are mistaken. Still I agree with you on some of his views on web page defacements. Even so you gotta have some respect for the guy-I've always thought of him as the Jello Biafra of hacking: Everyone constantly accusses him of "selling out", when in actuallity hes one of the few that hasn't.
Re:Just goes to show... (Score:1)
Re:2600? hackers? (Score:2)
i like this one better (Score:1)
C:\DOS\RUN
RUN\DOS\RUN