464 lines
24 KiB
Plaintext
464 lines
24 KiB
Plaintext
|
Q&A with Emmanuel Goldstein of
|
|||
|
2600: The Hacker's Quarterly
|
|||
|
|
|||
|
(CNN) -- Emmanuel Goldstein is the
|
|||
|
editor-in-chief of 2600: The Hacker Quarterly and
|
|||
|
hosts a weekly radio program in New York called
|
|||
|
"Off the Hook."
|
|||
|
|
|||
|
1. How do you define hacking?
|
|||
|
|
|||
|
Hacking is, very simply, asking a lot of
|
|||
|
questions and refusing to stop asking. This
|
|||
|
is why computers are perfect for inquisitive
|
|||
|
people -- they don't tell you to shut up
|
|||
|
when you keep asking questions or
|
|||
|
inputting commands over and over and
|
|||
|
over. But hacking doesn't have to confine
|
|||
|
itself to computers. Anyone with an
|
|||
|
inquisitive mind, a sense of adventure and
|
|||
|
strong beliefs in free speech and the right
|
|||
|
to know most definitely has a bit of the
|
|||
|
hacker spirit in them.
|
|||
|
|
|||
|
2. Are there legal or appropriate forms of
|
|||
|
hacking?
|
|||
|
|
|||
|
One of the common misconceptions is that
|
|||
|
anyone considered a hacker is doing
|
|||
|
something illegal. It's a sad commentary on
|
|||
|
the state of our society when someone who
|
|||
|
is basically seeking knowledge and the truth
|
|||
|
is assumed to be up to something nefarious.
|
|||
|
Nothing could be further from the truth.
|
|||
|
|
|||
|
Hackers, in their idealistic naivet<65>, reveal
|
|||
|
the facts that they discover, without
|
|||
|
regard for money, corporate secrets or
|
|||
|
government coverups. We have nothing to
|
|||
|
hide, which is why we're always relatively
|
|||
|
open with the things we do -- whether it's
|
|||
|
having meetings in a public place or running
|
|||
|
a system for everyone to participate in
|
|||
|
regardless of background. The fact that we
|
|||
|
don't "play the game" of secrets also makes
|
|||
|
hackers a tremendous threat in the eyes of
|
|||
|
many who want to keep things away from
|
|||
|
the public.
|
|||
|
|
|||
|
Secrets are all well and good, but if the
|
|||
|
only thing keeping them a secret is the fact
|
|||
|
that you say it's a secret, then it's not
|
|||
|
really a very good secret. We suggest using
|
|||
|
strong encryption for those really interested
|
|||
|
in keeping things out of the hands of
|
|||
|
outsiders. It's interesting also that hackers
|
|||
|
are the ones who are always pushing strong
|
|||
|
encryption -- if we were truly interested in
|
|||
|
getting into everyone's personal affairs, it's
|
|||
|
unlikely we'd try and show them how to
|
|||
|
stay secure. There are, however, entities
|
|||
|
who are trying to weaken encryption.
|
|||
|
People should look toward them with
|
|||
|
concern, as they are the true threat to
|
|||
|
privacy.
|
|||
|
|
|||
|
3. What in your mind is the purpose of
|
|||
|
hacking?
|
|||
|
|
|||
|
To seek knowledge, discover something
|
|||
|
new, be the first one to find a particular
|
|||
|
weakness in a computer system or the first
|
|||
|
to be able to get a certain result from a
|
|||
|
program. As mentioned above, this doesn't
|
|||
|
have to confine itself to the world of
|
|||
|
computers. Anyone who's an adventurer or
|
|||
|
explorer of some sort, or any good
|
|||
|
investigative journalist, knows the feeling of
|
|||
|
wanting to do something nobody has ever
|
|||
|
done before or find the answer despite
|
|||
|
being told that you can't. One thing that all
|
|||
|
of the people involved in these endeavors
|
|||
|
seem to share is the feeling from outsiders
|
|||
|
that they're wasting their time.
|
|||
|
|
|||
|
4. Are you a hacker? Why? Or why not?
|
|||
|
|
|||
|
Absolutely. It's not something you can just
|
|||
|
erase from your personality, nor should you
|
|||
|
want to. Once you lose the desire to mess
|
|||
|
around with things, tweak programs and
|
|||
|
systems, or just pursue an answer doggedly
|
|||
|
until you get a result, you've lost a very
|
|||
|
important part of yourself. It's quite
|
|||
|
possible that many "reformed" hackers will
|
|||
|
lose that special ingredient as they become
|
|||
|
more and more a part of some other entity
|
|||
|
that demands their very souls. But for
|
|||
|
those who can resist this, or figure out a
|
|||
|
way to incorporate "legitimacy" into their
|
|||
|
hacker personalities without compromising
|
|||
|
them, there are some very interesting and
|
|||
|
fun times ahead.
|
|||
|
|
|||
|
5. What kind of hacking do you do?
|
|||
|
|
|||
|
My main interest has always been phones
|
|||
|
and rarely does a day pass when I don't
|
|||
|
experiment in some way with a phone
|
|||
|
system, voice mail system, pay phone, or
|
|||
|
my own telephone. I've always been
|
|||
|
fascinated by the fact that we're only a
|
|||
|
few buttons away from virtually anyone on
|
|||
|
the planet and I hope that I never lose that
|
|||
|
sense of marvel.
|
|||
|
|
|||
|
One of the most amazing things I ever got
|
|||
|
involved in was routing phone calls within
|
|||
|
the network itself -- known as blue-boxing.
|
|||
|
You can't do that as easily any more, but it
|
|||
|
was a real fun way to learn how everything
|
|||
|
was connected -- operators, services,
|
|||
|
countries, you name it. And in the
|
|||
|
not-too-distant past, there were so many
|
|||
|
different sounds phones made depending on
|
|||
|
where you were calling. Now they tend to
|
|||
|
be standardized rings, busies, etc. But the
|
|||
|
magic hasn't disappeared, it's just moved
|
|||
|
on to new things ... satellite technology,
|
|||
|
new phone networks and voice recognition
|
|||
|
technologies.
|
|||
|
|
|||
|
Many times these new technologies are
|
|||
|
designed by the very people who were
|
|||
|
hacking the old technologies. The result is
|
|||
|
usually more security and systems that
|
|||
|
know what people will find useful. While I've
|
|||
|
spent a great deal of time playing with
|
|||
|
phones, I get the same sense of fun from
|
|||
|
computer systems and have invested lots
|
|||
|
of time exploring the Internet. It would fill a
|
|||
|
book to outline all of the hacker potential
|
|||
|
that exists out there. And, of course,
|
|||
|
there's radio hacking, which predates a lot
|
|||
|
of the current technology. It's gotten to
|
|||
|
the point where simply listening to a certain
|
|||
|
frequency has become a challenge. It's
|
|||
|
hard to believe that it's actually turned into
|
|||
|
a crime to listen to some of these
|
|||
|
non-scrambled radio waves. But this is the
|
|||
|
price we pay when people with no
|
|||
|
understanding of technology are the ones in
|
|||
|
charge of regulating it.
|
|||
|
|
|||
|
6. How much time do you spend at it a week?
|
|||
|
|
|||
|
That's like asking how much time you spend
|
|||
|
breathing. It's always with you, you do
|
|||
|
more of it at certain times, but it's always
|
|||
|
something that's going on in your head.
|
|||
|
Even when I sleep, I dream from a hacker
|
|||
|
perspective.
|
|||
|
|
|||
|
7. Do you have a certain kind of site or
|
|||
|
"target" sites that most attract you?
|
|||
|
|
|||
|
We don't sit around with a big map and a
|
|||
|
list of targets. In fact, we don't even sit
|
|||
|
around together. Most hacking is done by
|
|||
|
individuals who simply find things by
|
|||
|
messing around and making discoveries. We
|
|||
|
share that info and others add input. Then
|
|||
|
someone tells the press and the
|
|||
|
government that we're plotting to move
|
|||
|
satellites and all hell breaks loose.
|
|||
|
|
|||
|
I think most of us tend to be drawn to the
|
|||
|
sites and systems that are said to be
|
|||
|
impossible to access. This is a normal
|
|||
|
human reaction to being challenged. The
|
|||
|
very fact that we continue to do this after
|
|||
|
so many of us have suffered so greatly
|
|||
|
indicates that this is a very strong driving
|
|||
|
force. When this finally becomes recognized
|
|||
|
as a positive thing, perhaps we'll really be
|
|||
|
able to learn from each other.
|
|||
|
|
|||
|
8. What, in general, do you think attracts
|
|||
|
people to hacking?
|
|||
|
|
|||
|
People have always been attracted to
|
|||
|
adventure and exploration. Never before
|
|||
|
have you been able to get this without
|
|||
|
leaving your house and without regard to
|
|||
|
your skin color, religion, sex, or even the
|
|||
|
sound of your voice. On the Internet,
|
|||
|
everyone is an equal until they prove
|
|||
|
themselves to be a moron. And even then,
|
|||
|
you can always start over. It's the ability
|
|||
|
to go anywhere, talk to anyone, and not
|
|||
|
reveal your personal information unless you
|
|||
|
choose to -- or don't know enough not to
|
|||
|
-- that most attracts people to the hacker
|
|||
|
culture, which is slowly becoming the
|
|||
|
Internet culture.
|
|||
|
|
|||
|
We find that many "mainstream" people
|
|||
|
share the values of hackers -- the value of
|
|||
|
free speech, the power of the individual
|
|||
|
against the state or the corporation, and
|
|||
|
the overall sense of fun that we embrace.
|
|||
|
Look in any movie where an individual is
|
|||
|
fighting a huge entity, and who does the
|
|||
|
audience without exception identify with?
|
|||
|
Even if the character breaks the rules, most
|
|||
|
people want him/her to succeed because
|
|||
|
the individual is what it's all about.
|
|||
|
|
|||
|
9. Do you know enough hackers personally to
|
|||
|
know what personality traits they share, if
|
|||
|
any?
|
|||
|
|
|||
|
Hackers come from all different backgrounds
|
|||
|
and have all kinds of lifestyles. They aren't
|
|||
|
the geeks you see on television or the
|
|||
|
cyberterrorists you see in Janet Reno news
|
|||
|
conferences. They range in age from under
|
|||
|
10 to over 70. They exist in all parts of the
|
|||
|
world, and one of the most amazing and
|
|||
|
inspiring things is to see what happens
|
|||
|
when they come together. It's all about
|
|||
|
technology, the thrill of discovery, and
|
|||
|
sharing information. That supersedes any
|
|||
|
personality issues that might be an issue in
|
|||
|
other circumstances.
|
|||
|
|
|||
|
10. Do you think hackers are productive and
|
|||
|
serve a useful purpose?
|
|||
|
|
|||
|
I think hackers are necessary, and the
|
|||
|
future of technology and society itself
|
|||
|
(freedom, privacy, etc.) hinges on how we
|
|||
|
address the issues today that hackers are
|
|||
|
very much a part of. This can be the
|
|||
|
dawning of a great era. It can also be the
|
|||
|
beginning of true hell.
|
|||
|
|
|||
|
11. What percentage would you say are
|
|||
|
destructive as opposed to those in it out of
|
|||
|
intellectual curiosity or to test their skills?
|
|||
|
|
|||
|
This raises several points that I feel
|
|||
|
strongly about. For one thing, hacking is
|
|||
|
the only field where the media believes
|
|||
|
anyone who says they're a hacker. Would
|
|||
|
you believe someone who said they were a
|
|||
|
cop? Or a doctor? Or an airline pilot? Odds
|
|||
|
are they'd have to prove their ability at
|
|||
|
some point or say something that obviously
|
|||
|
makes some degree of sense. But you can
|
|||
|
walk up to any reporter and say you're a
|
|||
|
hacker and they will write a story about
|
|||
|
you telling the world that you're exactly
|
|||
|
what you say you are without any real
|
|||
|
proof.
|
|||
|
|
|||
|
So every time a movie like "Hackers" comes
|
|||
|
out, 10 million people from AOL send us
|
|||
|
e-mail saying they want to be hackers, too,
|
|||
|
and suddenly, every 12-year-old with this
|
|||
|
sentiment instantly becomes a hacker in
|
|||
|
the eyes of the media and hence, the rest
|
|||
|
of society. You don't become a hacker by
|
|||
|
snapping your fingers. It's not about getting
|
|||
|
easy answers or making free phone calls or
|
|||
|
logging into someone else's computer.
|
|||
|
Hackers "feel" what they do, and it excites
|
|||
|
them.
|
|||
|
|
|||
|
I find that if the people around you think
|
|||
|
you're wasting your time but you genuinely
|
|||
|
like what you're doing, you're driven by it,
|
|||
|
and you're relentless in your pursuit, you
|
|||
|
have a good part of a hacker in you. But if
|
|||
|
you're mobbed by people who are looking
|
|||
|
for free phone calls, software or exploits,
|
|||
|
you're just an opportunist, possibly even a
|
|||
|
criminal. We already have words for these
|
|||
|
people and it adequately defines what they
|
|||
|
do. While it's certainly possible to use
|
|||
|
hacking ability to commit a crime, once you
|
|||
|
do this you cease being a hacker and
|
|||
|
commence being a criminal. It's really not a
|
|||
|
hard distinction to make.
|
|||
|
|
|||
|
Now, we have a small but vocal group who
|
|||
|
insist on calling anyone they deem
|
|||
|
unacceptable in the hacker world a
|
|||
|
"cracker." This is an attempt to solve the
|
|||
|
problem of the misuse of the word "hacker"
|
|||
|
by simply misusing a new word. It's a very
|
|||
|
misguided, though well-intentioned, effort.
|
|||
|
The main problem is that when you make up
|
|||
|
such a word, no further definition is
|
|||
|
required. When you label someone with a
|
|||
|
word that says they're evil, you never really
|
|||
|
find out what the evil was to begin with.
|
|||
|
Murderer, that's easy. Burglar, embezzler,
|
|||
|
rapist, kidnapper, all pretty clear. Now
|
|||
|
along comes cracker and you don't even
|
|||
|
know what the crime was. It could be
|
|||
|
crashing every computer system in
|
|||
|
Botswana. Or it could be copying a single
|
|||
|
file. We need to avoid the labeling and start
|
|||
|
looking at what we're actually talking
|
|||
|
about. But at the same time, we have to
|
|||
|
remember that you don't become a hacker
|
|||
|
simply because you say you are.
|
|||
|
|
|||
|
12. Do people stay in hacking a long time, or
|
|||
|
is it the kind of thing that people do for a few
|
|||
|
years and then move on to something else?
|
|||
|
|
|||
|
It can be either. I tend to believe that it's
|
|||
|
more of a philosophy, a way of looking at
|
|||
|
something. When you have the hacker
|
|||
|
perspective, you see potential where others
|
|||
|
don't. Also, hackers think of things like
|
|||
|
phones, computers, pagers, etc., as toys
|
|||
|
and things to be enjoyed whereas others
|
|||
|
see work and responsibility and actually
|
|||
|
come to dread these things. That's why
|
|||
|
hackers like to hold onto their world and not
|
|||
|
become part of the mainstream. But it
|
|||
|
certainly can and does happen.
|
|||
|
|
|||
|
13. What is the future of hacking?
|
|||
|
|
|||
|
As long as the human spirit is alive, there
|
|||
|
will always be hackers. We may have a hell
|
|||
|
of a fight on our hands if we continue to be
|
|||
|
imprisoned and victimized for exploring, but
|
|||
|
that will do anything but stop us.
|
|||
|
|
|||
|
14. Given increased attention to corporate
|
|||
|
and government security, is it getting
|
|||
|
tougher to hack or not?
|
|||
|
|
|||
|
Hacking isn't really about success -- it's
|
|||
|
more the process of discovery. Even if real
|
|||
|
security is implemented, there will always
|
|||
|
be new systems, new developments, new
|
|||
|
vulnerabilities. Hackers are always going to
|
|||
|
be necessary to the process and we're not
|
|||
|
easily bored.
|
|||
|
|
|||
|
15. Is the possibility of being identified and
|
|||
|
even prosecuted an issue for most hackers?
|
|||
|
|
|||
|
Hackers make very bad criminals. This is
|
|||
|
why we always wind up being prosecuted.
|
|||
|
We don't hide very well or keep our mouths
|
|||
|
sealed shut to protect corporate or
|
|||
|
government interests. But the same
|
|||
|
security holes would exist even if we
|
|||
|
weren't around, so I think the hackers
|
|||
|
should be properly seen as messengers.
|
|||
|
That doesn't mean that you should expect
|
|||
|
them to just hand over all of their
|
|||
|
knowledge -- it's important to listen and
|
|||
|
interpret on your own, as any hacker
|
|||
|
would.
|
|||
|
|
|||
|
16. Are there hackers who are up for hire?
|
|||
|
What are they paid? Who hires them, and for
|
|||
|
what?
|
|||
|
|
|||
|
Just as you can use hacker ability to attain
|
|||
|
a life of crime, you can use that ability to
|
|||
|
become a corporate success. Some are
|
|||
|
able to hold onto their hacker ideals.
|
|||
|
Others, sadly, lose them. It's especially
|
|||
|
hard when young people who haven't
|
|||
|
worked it all out yet are approached and
|
|||
|
tempted with huge amounts of money by
|
|||
|
these entities. It can be very hard to resist
|
|||
|
and the cost is often greater than
|
|||
|
anticipated.
|
|||
|
|
|||
|
17. Have you had any contact with people
|
|||
|
you consider cyberterrorists? Do you endorse
|
|||
|
what they do?
|
|||
|
|
|||
|
In all of the time I've been in the scene,
|
|||
|
which is a pretty long time, I've never come
|
|||
|
across anyone I consider to be a
|
|||
|
"cyberterrorist," whatever that is. Most
|
|||
|
people who talk of such creatures either
|
|||
|
have something to sell or some bill to pass.
|
|||
|
This is not to say that such a concept is
|
|||
|
impossible. But I believe the current
|
|||
|
discussions aren't based in reality and have
|
|||
|
very suspicious ulterior motives.
|
|||
|
|
|||
|
18. What about the people who hack into
|
|||
|
Pentagon sites? Do you think they should be
|
|||
|
punished?
|
|||
|
|
|||
|
According to the Pentagon, there is no risk
|
|||
|
of anything classified being compromised
|
|||
|
because it's not on the Internet. If they
|
|||
|
were wrong, I would like to see someone
|
|||
|
prove that. If a non-classified site is
|
|||
|
hacked, I don't see the harm unless
|
|||
|
something is damaged in some way.
|
|||
|
Remember, the security hole was already
|
|||
|
there. If a hacker finds it, it's far more likely
|
|||
|
the people running the system will learn of
|
|||
|
the hole. If a criminal or someone with an
|
|||
|
ulterior motive (espionage, etc.) finds the
|
|||
|
hole first, it's likely to remain secret for
|
|||
|
much longer and the harm will be far
|
|||
|
greater.
|
|||
|
|
|||
|
While you may resent the fact that some
|
|||
|
14-year-old from Topeka proved your
|
|||
|
security sucks, think of what could have
|
|||
|
happened had you not learned of this and
|
|||
|
had someone else done it instead. I'm the
|
|||
|
first to say that people who cause damage
|
|||
|
should be punished, but I really don't think
|
|||
|
prison should be considered for something
|
|||
|
like this unless the offender is a true risk to
|
|||
|
society. The great majority of these cases
|
|||
|
do not involve damage or vandalism, a fact
|
|||
|
that largely goes unreported. What people
|
|||
|
have to remember is that most of the time,
|
|||
|
this is simply an example of kids being kids
|
|||
|
and playing games like they have always
|
|||
|
done.
|
|||
|
|
|||
|
Obviously, the tools have changed, but
|
|||
|
that's really not something the kids are
|
|||
|
responsible for. If some kid somewhere can
|
|||
|
access your medical records or your phone
|
|||
|
records, he or she is not the one who put
|
|||
|
them there. The true violator of your
|
|||
|
privacy is the person who made the
|
|||
|
decision to make them easily accessible.
|
|||
|
|
|||
|
19. Your real name is Eric Corley. Why do you
|
|||
|
use the name Emmanuel Goldstein?
|
|||
|
|
|||
|
I believe everyone should be given the
|
|||
|
opportunity to name themselves. That
|
|||
|
name should reflect something about who
|
|||
|
you are and what you believe in and stand
|
|||
|
for. Emmanuel Goldstein is that for me, and
|
|||
|
for those who want to learn why, get a
|
|||
|
copy of George Orwell's "1984" and see for
|
|||
|
yourself. Interestingly, our first issue of
|
|||
|
2600 was published in January 1984. A
|
|||
|
complete coincidence.
|
|||
|
|