FREE BOOKS

Author's List




PREV.   NEXT  
|<   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   107   108   109  
110   111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134   >>   >|  
ributed membership badges or laminated ID cards. If they had, they would likely have died out quickly, for turnover in their membership was considerable. LoD was less a high-tech street-gang than an ongoing state-of-mind. LoD was the Gang That Refused to Die. By 1990, LoD had RULED for ten years, and it seemed WEIRD to police that they were continually busting people who were only sixteen years old. All these teenage small-timers were pleading the tiresome hacker litany of "just curious, no criminal intent." Somewhere at the center of this conspiracy there had to be some serious adult masterminds, not this seemingly endless supply of myopic suburban white kids with high SATs and funny haircuts. There was no question that most any American hacker arrested would "know" LoD. They knew the handles of contributors to LoD Tech Journal, and were likely to have learned their craft through LoD boards and LoD activism. But they'd never met anyone from LoD. Even some of the rotating cadre who were actually and formally "in LoD" knew one another only by board-mail and pseudonyms. This was a highly unconventional profile for a criminal conspiracy. Computer networking, and the rapid evolution of the digital underground, made the situation very diffuse and confusing. Furthermore, a big reputation in the digital underground did not coincide with one's willingness to commit "crimes." Instead, reputation was based on cleverness and technical mastery. As a result, it often seemed that the HEAVIER the hackers were, the LESS likely they were to have committed any kind of common, easily prosecutable crime. There were some hackers who could really steal. And there were hackers who could really hack. But the two groups didn't seem to overlap much, if at all. For instance, most people in the underground looked up to "Emmanuel Goldstein" of 2600 as a hacker demigod. But Goldstein's publishing activities were entirely legal--Goldstein just printed dodgy stuff and talked about politics, he didn't even hack. When you came right down to it, Goldstein spent half his time complaining that computer security WASN'T STRONG ENOUGH and ought to be drastically improved across the board! Truly heavy-duty hackers, those with serious technical skills who had earned the respect of the underground, never stole money or abused credit cards. Sometimes they might abuse phone-codes--but often, they seemed to get all the free phone-time the
PREV.   NEXT  
|<   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   107   108   109  
110   111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134   >>   >|  



Top keywords:

Goldstein

 

hackers

 
underground
 

hacker

 

people

 

reputation

 

conspiracy

 
digital
 

technical

 

criminal


membership

 

Sometimes

 

credit

 
groups
 
overlap
 

coincide

 

abused

 
prosecutable
 

easily

 

commit


mastery
 

cleverness

 
crimes
 

Instead

 

result

 

committed

 

common

 

HEAVIER

 

willingness

 
instance

politics

 

STRONG

 

ENOUGH

 
talked
 

security

 
computer
 
drastically
 

improved

 

skills

 
Emmanuel

respect

 
looked
 
earned
 

demigod

 

publishing

 

printed

 

activities

 
complaining
 
rotating
 

sixteen