"Unleash your creativity and unlock your potential with MsgBrains.Com - the innovative platform for nurturing your intellect." » English Books » ,,Underground: Hacking, Madness, and Obsession on the Electronic Frontier'' by Suelette Dreyfus🌏🗺️

Add to favorite ,,Underground: Hacking, Madness, and Obsession on the Electronic Frontier'' by Suelette Dreyfus🌏🗺️

Select the language in which you want the text you are reading to be translated, then select the words you don't know with the cursor to get the translation above the selected word!




Go to page:
Text Size:

Pearson Williams Solicitors, Tami Friedman, the Free Software

Foundation (GNU Project), and the US Department of Energy Computer

Incident Advisory Capability.

Finally, I would like to thank my family, whose unfailing support, advice and encouragement have made this book possible.

Introduction.


My great aunt used to paint underwater.

Piling on the weighty diving gear used in 1939 and looking like something out of 20000 Leagues Under the Sea, Lucie slowly sank below the surface, with palette, special paints and canvas in hand. She settled on the ocean floor, arranged her weighted painter's easel and allowed herself to become completely enveloped by another world. Red and white striped fish darted around fields of blue-green coral and blue-lipped giant clams. Lionfish drifted by, gracefully waving their dangerous feathered spines. Striped green moray eels peered at her from their rock crevice homes.

Lucie dived and painted everywhere. The Sulu Archipelago. Mexico. Australia's Great Barrier Reef. Hawaii. Borneo. Sometimes she was the first white woman seen by the Pacific villagers she lived with for months on end.

As a child, I was entranced by her stories of the unknown world below the ocean's surface, and the strange and wonderful cultures she met on her journeys. I grew up in awe of her chosen task: to capture on canvas the essence of a world utterly foreign to her own.

New technology—revolutionary for its time—had allowed her to do this. Using a compressor, or sometimes just a hand pump connected to air hoses running to the surface, human beings were suddenly able to submerge themselves for long periods in an otherwise inaccessible world. New technology allowed her to both venture into this unexplored realm, and to document it in canvas.

I came upon the brave new world of computer communications and its darker side, the underground, quite by accident. It struck me somewhere in the journey that followed that my trepidations and conflicting desires to explore this alien world were perhaps not unlike my aunt's own desires some half a century before. Like her journey, my own travels have only been made possible by new technologies. And like her, I have tried to capture a small corner of this world.

This is a book about the computer underground. It is not a book about law enforcement agencies, and it is not written from the point of view of the police officer. From a literary perspective, I have told this story through the eyes of numerous computer hackers. In doing so, I hope to provide the reader with a window into a mysterious, shrouded and usually inaccessible realm.

Who are hackers? Why do they hack? There are no simple answers to these questions. Each hacker is different. To that end, I have attempted to present a collection of individual but interconnected stories, bound by their links to the international computer underground. These are true stories, tales of the world's best and the brightest hackers and phreakers. There are some members of the underground whose stories I have not covered, a few of whom would also rank as world-class. In the end, I chose to paint detailed portraits of a few hackers rather than attempt to compile a comprehensive but shallow catalogue.

While each hacker has a distinct story, there are common themes which appear throughout many of the stories. Rebellion against all symbols of authority. Dysfunctional families. Bright children suffocated by ill-equipped teachers. Mental illness or instability. Obsession and addiction.

I have endeavoured to track what happened to each character in this work over time: the individual's hacking adventures, the police raid and the ensuing court case. Some of those court cases have taken years to reach completion.

Hackers use `handles'—on-line nicknames—that serve two purposes.

They shield the hacker's identity and, importantly, they often make a

statement about how the hacker perceives himself in the underground.

Hawk, Crawler, Toucan Jones, Comhack, Dataking, Spy, Ripmax, Fractal

Insanity, Blade. These are all real handles used in Australia.

In the computer underground, a hacker's handle is his name. For this reason, and because most hackers in this work have now put together new lives for themselves, I have chosen to use only their handles. Where a hacker has had more than one handle, I have used the one he prefers.

Each chapter in this book is headed with a quote from a Midnight Oil song which expresses an important aspect of the chapter. The Oilz are uniquely Australian. Their loud voice of protest against the establishment—particularly the military-industrial establishment—echoes a key theme in the underground, where music in general plays a vital role.

The idea for using these Oilz extracts came while researching Chapter 1, which reveals the tale of the WANK worm crisis in NASA. Next to the RTM worm, WANK is the most famous worm in the history of computer networks. And it is the first major worm bearing a political message. With WANK, life imitated art, since the term computer `worm' came from John Brunner's sci-fi novel, The Shockwave Rider, about a politically motivated worm.

The WANK worm is also believed to be the first worm written by an

Australian, or Australians.

This chapter shows the perspective of the computer system administrators—the people on the other side from the hackers. Lastly, it illustrates the sophistication which one or more Australian members of the worldwide computer underground brought to their computer crimes.

The following chapters set the scene for the dramas which unfold and show the transition of the underground from its early days, its loss of innocence, its closing ranks in ever smaller circles until it reached the inevitable outcome: the lone hacker. In the beginning, the computer underground was a place, like the corner pub, open and friendly. Now, it has become an ephemeral expanse, where hackers occasionally bump into one another but where the original sense of open community has been lost.

The computer underground has changed over time, largely in response to the introduction of new computer crime laws across the globe and to numerous police crackdowns. This work attempts to document not only an important piece of Australian history, but also to show fundamental shifts in the underground —to show, in essence, how the underground has moved further underground.

Suelette Dreyfus

March 1997

Chapter 1 — 10, 9, 8, 7, 6, 5, 4, 3, 2, 1.

Somebody's out there, somebody's waiting; Somebody's trying to tell me something.

— from `Somebody's Trying to Tell Me Something', 10, 9, 8, 7, 6, 5, 4, 3, 2, 1.

Monday, 16 October 1989

Kennedy Space Center, Florida

NASA buzzed with the excitement of a launch. Galileo was finally going to Jupiter.

Administrators and scientists in the world's most prestigious space agency had spent years trying to get the unmanned probe into space. Now, on Tuesday, 17 October, if all went well, the five astronauts in the Atlantis space shuttle would blast off from the Kennedy Space Center at Cape Canaveral, Florida, with Galileo in tow. On the team's fifth orbit, as the shuttle floated 295 kilometres above the Gulf of Mexico, the crew would liberate the three-tonne space probe.

An hour later, as Galileo skated safely away from the shuttle, the probe's 32500 pound booster system would fire up and NASA staff would watch this exquisite piece of human ingenuity embark on a six-year mission to the largest planet in the solar system. Galileo would take a necessarily circuitous route, flying by Venus once and Earth twice in a gravitational slingshot effort to get up enough momentum to reach Jupiter.2

NASA's finest minds had wrestled for years with the problem of exactly how to get the probe across the solar system. Solar power was one option. But if Jupiter was a long way from Earth, it was even further from the Sun—778.3 million kilometres to be exact. Galileo would need ridiculously large solar panels to generate enough power for its instruments at such a distance from the Sun. In the end, NASA's engineers decided on a tried if not true earthly energy source: nuclear power.

Nuclear power was perfect for space, a giant void free of human life which could play host to a bit of radioactive plutonium 238 dioxide. The plutonium was compact for the amount of energy it gave off—and it lasted a long time. It seemed logical enough. Pop just under 24 kilograms of plutonium in a lead box, let it heat up through its own decay, generate electricity for the probe's instruments, and presto! Galileo would be on its way to investigate Jupiter.

Are sens

Copyright 2023-2059 MsgBrains.Com