FREE BOOKS

Author's List




PREV.   NEXT  
|<   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134   135   136   137   138   139   140   141   142  
143   144   145   146   147   148   149   150   151   152   153   154   155   156   157   158   159   160   161   162   163   164   165   166   167   >>   >|  
t, intended to revive the digital underground to what Mentor considered the full flower of the early 80s. The Phoenix board would also boldly bring elite hackers face-to-face with the telco "opposition." On "Phoenix," America's cleverest hackers would supposedly shame the telco squareheads out of their stick-in-the-mud attitudes, and perhaps convince them that the Legion of Doom elite were really an all-right crew. The premiere of "Phoenix Project" was heavily trumpeted by Phrack,and "Phoenix Project" carried a complete run of Phrack issues, including the E911 Document as Phrack had published it. Phoenix Project was only one of many--possibly hundreds--of nodes and boards all over America that were in guilty possession of the E911 Document. But Phoenix was an outright, unashamed Legion of Doom board. Under Mentor's guidance, it was flaunting itself in the face of telco security personnel. Worse yet, it was actively trying to WIN THEM OVER as sympathizers for the digital underground elite. "Phoenix" had no cards or codes on it. Its hacker elite considered Phoenix at least technically legal. But Phoenix was a corrupting influence, where hacker anarchy was eating away like digital acid at the underbelly of corporate propriety. The Chicago Computer Fraud and Abuse Task Force now prepared to descend upon Austin, Texas. Oddly, not one but TWO trails of the Task Force's investigation led toward Austin. The city of Austin, like Atlanta, had made itself a bulwark of the Sunbelt's Information Age, with a strong university research presence, and a number of cutting-edge electronics companies, including Motorola, Dell, CompuAdd, IBM, Sematech and MCC. Where computing machinery went, hackers generally followed. Austin boasted not only "Phoenix Project," currently LoD's most flagrant underground board, but a number of UNIX nodes. One of these nodes was "Elephant," run by a UNIX consultant named Robert Izenberg. Izenberg, in search of a relaxed Southern lifestyle and a lowered cost-of-living, had recently migrated to Austin from New Jersey. In New Jersey, Izenberg had worked for an independent contracting company, programming UNIX code for AT&T itself. "Terminus" had been a frequent user on Izenberg's privately owned Elephant node. Having interviewed Terminus and examined the records on Netsys, the Chicago Task Force were now convinced that they had discovered an underground gang of UNIX software pirates, w
PREV.   NEXT  
|<   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134   135   136   137   138   139   140   141   142  
143   144   145   146   147   148   149   150   151   152   153   154   155   156   157   158   159   160   161   162   163   164   165   166   167   >>   >|  



Top keywords:

Phoenix

 

Austin

 

Izenberg

 
underground
 
Project
 

Phrack

 

digital

 
hackers
 

Chicago

 

hacker


Elephant

 

number

 

Jersey

 
including
 

Document

 

Mentor

 

considered

 
Terminus
 

America

 
Legion

convinced

 
Motorola
 

companies

 

electronics

 
cutting
 

examined

 

computing

 

records

 

Sematech

 

presence


Netsys

 

CompuAdd

 

strong

 

software

 
Atlanta
 

investigation

 
pirates
 
machinery
 
university
 

research


discovered

 

bulwark

 

Sunbelt

 
Information
 

boasted

 

trails

 

frequent

 
lowered
 

privately

 
living