48 lines
2.6 KiB
Plaintext
48 lines
2.6 KiB
Plaintext
|
File: HACKER MORALITY
|
|||
|
Read 33 times
|
|||
|
|
|||
|
A lesson in phreaking and hacking morality:
|
|||
|
|
|||
|
I find it truly discouraging when people, intelligent people seeking
|
|||
|
intellectual challenges, must revert to becoming common criminals. The
|
|||
|
fine arts of hacking and boxing have all but died out. Though you newcomers,
|
|||
|
you who have appeared on the scene in the last year or two, may not realize it,
|
|||
|
we had it much better. People didn't recognize our potential for destruction
|
|||
|
and damage because we never flaunted it, nor did we exercise it.
|
|||
|
|
|||
|
For hacking, it was the intellectual challenge which drove us to do it.
|
|||
|
The thrill of bypassing or breaking through someone's computer security was
|
|||
|
tremendous. It wasn't a case of getting a password from a friend, logging on,
|
|||
|
and destroying an entire database. We broke in for the challenge of getting in
|
|||
|
and snooping around WITHOUT detection. We loved the potential for destruction
|
|||
|
that we gave ourselves, but never used.
|
|||
|
|
|||
|
Today, after so much publicity, the fun has turned to true criminality.
|
|||
|
Publicity we have received is abhorring. From WarGames to the headlined October
|
|||
|
Raids, to the 414's, the Inner Circle, Fargo 4a, and the recent NASA
|
|||
|
breakins--not to mention all the local incidents that never made the big
|
|||
|
newspapers, like breakins at school computers or newspaper computers. TRW
|
|||
|
credit information services claims hackers used the three stolen accounts to
|
|||
|
aid them in abusing stolen credit cards. The thrill of entering and looking
|
|||
|
around has shifted to criminal practicality--how can I make my bank account
|
|||
|
fatter--how may I use this stolen credit card to its fullest--how could I take
|
|||
|
revenge upon my enemies.
|
|||
|
|
|||
|
And then there is the world of Phone Phreaking. The number of phreaks has
|
|||
|
grown from an elite few, perhaps ten or twenty, to well over a thousand.
|
|||
|
Still, there remain only about 10 or 20 good, longlasting phreaks. The rest
|
|||
|
receive information and abuse its uses until the information is no longer valid
|
|||
|
.
|
|||
|
Even worse, they seek publicity! They WANT to be caught! Many even use their
|
|||
|
real names on bulletin board systems to promote publicity. Meanwhile, the REAL
|
|||
|
phone phreaks have been resting in the shadow of the rest, waiting for
|
|||
|
phreaking to become so dangerous as to become a challenge once again. Once
|
|||
|
security tightens and only the strong survive (phreak Darwinism?), phreaking
|
|||
|
will be restored as a way to 'beat the system' without costing anyone anything.
|
|||
|
|
|||
|
Hacking may soon be dead, but may phone phreaking live on!
|
|||
|
|
|||
|
Big Brother
|
|||
|
|
|||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
|||
|
|