FREE BOOKS

Author's List




PREV.   NEXT  
|<   57   58   59   60   61   62   63   64   65   66   67   68   69   70   71   72   73   74   75   76   77   78   79   80   81  
82   83   84   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   >>   >|  
cular advantage and presents a grave personal risk. And when that risk catches up with them, they will go right on teaching and preaching--to a new audience this time, their interrogators from law enforcement. Almost every hacker arrested tells everything he knows--all about his friends, his mentors, his disciples--legends, threats, horror stories, dire rumors, gossip, hallucinations. This is, of course, convenient for law enforcement--except when law enforcement begins to believe hacker legendry. Phone phreaks are unique among criminals in their willingness to call up law enforcement officials--in the office, at their homes--and give them an extended piece of their mind. It is hard not to interpret this as BEGGING FOR ARREST, and in fact it is an act of incredible foolhardiness. Police are naturally nettled by these acts of chutzpah and will go well out of their way to bust these flaunting idiots. But it can also be interpreted as a product of a world-view so elitist, so closed and hermetic, that electronic police are simply not perceived as "police," but rather as ENEMY PHONE PHREAKS who should be scolded into behaving "decently." Hackers at their most grandiloquent perceive themselves as the elite pioneers of a new electronic world. Attempts to make them obey the democratically established laws of contemporary American society are seen as repression and persecution. After all, they argue, if Alexander Graham Bell had gone along with the rules of the Western Union telegraph company, there would have been no telephones. If Jobs and Wozniak had believed that IBM was the be-all and end-all, there would have been no personal computers. If Benjamin Franklin and Thomas Jefferson had tried to "work within the system" there would have been no United States. Not only do hackers privately believe this as an article of faith, but they have been known to write ardent manifestos about it. Here are some revealing excerpts from an especially vivid hacker manifesto: "The Techno-Revolution" by "Dr. Crash," which appeared in electronic form in Phrack Volume 1, Issue 6, Phile 3. "To fully explain the true motives behind hacking, we must first take a quick look into the past. In the 1960s, a group of MIT students built the first modern computer system. This wild, rebellious group of young men were the first to bear the name 'hackers.' The systems that they developed were intended to be used to solve world probl
PREV.   NEXT  
|<   57   58   59   60   61   62   63   64   65   66   67   68   69   70   71   72   73   74   75   76   77   78   79   80   81  
82   83   84   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   >>   >|  



Top keywords:

enforcement

 

hacker

 
electronic
 

personal

 

police

 

system

 

hackers

 
repression
 

Jefferson

 

article


United

 

States

 

persecution

 
privately
 
Graham
 

Alexander

 

company

 
telegraph
 

Western

 

telephones


computers
 

Benjamin

 
Franklin
 

Wozniak

 

believed

 

Thomas

 

students

 

motives

 

hacking

 
modern

developed

 

systems

 

intended

 
computer
 

rebellious

 
explain
 
manifesto
 

Techno

 

Revolution

 
excerpts

manifestos

 
ardent
 
revealing
 

appeared

 

Phrack

 

Volume

 

PHREAKS

 
begins
 
legendry
 

phreaks