<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://kb42.info/index.php?action=history&amp;feed=atom&amp;title=BBS%2Fhacking</id>
	<title>BBS/hacking - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://kb42.info/index.php?action=history&amp;feed=atom&amp;title=BBS%2Fhacking"/>
	<link rel="alternate" type="text/html" href="https://kb42.info/index.php?title=BBS/hacking&amp;action=history"/>
	<updated>2026-05-15T15:42:34Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://kb42.info/index.php?title=BBS/hacking&amp;diff=8019&amp;oldid=prev</id>
		<title>Maintenance script: Politics BBS Archive</title>
		<link rel="alternate" type="text/html" href="https://kb42.info/index.php?title=BBS/hacking&amp;diff=8019&amp;oldid=prev"/>
		<updated>2023-09-24T02:41:33Z</updated>

		<summary type="html">&lt;p&gt;Politics BBS Archive&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[Category:BBS]]&lt;br /&gt;
[[Category:Politics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Infobox BBS&lt;br /&gt;
| image         = Archived-En.png&lt;br /&gt;
| file          = hacking.txt&lt;br /&gt;
| author        = Unknown&lt;br /&gt;
| date          = Unknown&lt;br /&gt;
| subject       = &lt;br /&gt;
| orig_bbs      = Unknown&lt;br /&gt;
| bbs_main_page = &lt;br /&gt;
| key_words     = Politics&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mail-From: ARPAnet host SRI-CSL rcvd at Wed Sep 28 15:58-PDT&lt;br /&gt;
Date: 26 Sep 1983 20:08-PDT&lt;br /&gt;
Sender: GEOFF@SRI-CSL&lt;br /&gt;
Subject: Telecommunications Security and Privacy.&lt;br /&gt;
From: the tty of Geoffrey S. Goodfellow&lt;br /&gt;
Reply-To: Geoff@SRI-CSL&lt;br /&gt;
To: Human-nets:, &lt;br /&gt;
To: Telecom:, &lt;br /&gt;
To: Security-Forum:, &lt;br /&gt;
To: Info-Micro:&lt;br /&gt;
Cc: csl:, &lt;br /&gt;
Cc: others:&lt;br /&gt;
Message-ID: &amp;lt;[SRI-CSL]26-Sep-83 20:08:20.GEOFF&amp;gt;&lt;br /&gt;
Redistributed-To: dist:&lt;br /&gt;
Redistributed-By: GEOFF at SRI-CSL&lt;br /&gt;
Redistributed-Date: 28 Sep 1983&lt;br /&gt;
&lt;br /&gt;
On  Monday,  September  26th,  I  appeared  before  and  presented  invited &lt;br /&gt;
testimony   at   the  U.S.    House  of  Representatives  Subcommittee   on &lt;br /&gt;
Transportation, Aviation and Materials on the subject of Telecommunications &lt;br /&gt;
Security and Privacy.&lt;br /&gt;
&lt;br /&gt;
Due to the activities of the Milwaukee 414s and the subsequent hoopla  that &lt;br /&gt;
has  been generated in the media,  HACKING has been getting a bad name.   I &lt;br /&gt;
therefore  decided to address my testimony to the TRUE nature  of  computer &lt;br /&gt;
hackers and hacking (in an attempt to put the entire situation in some type &lt;br /&gt;
of  perspective).   I  also addressed what can and should be done  to  help &lt;br /&gt;
abate the &amp;#039;unsavory&amp;#039; hacking problem.  And lastly, how low tech the current &lt;br /&gt;
hackings have been and what we might be seeing more of in the future.&lt;br /&gt;
&lt;br /&gt;
I&amp;#039;m  told  the  hearings went out live over CNN -- there were at  least  16 &lt;br /&gt;
video  cameras  that I could count and the rest of the room was  jammed  to &lt;br /&gt;
standing room only with reporters and other media.&lt;br /&gt;
&lt;br /&gt;
Individuals who presented testimony were: Neal Patrick (of the 414s); Jimmy &lt;br /&gt;
McClary (Los Alamos Division leader for Security);  Donn Parker and  myself &lt;br /&gt;
(from SRI); and Steve Walker (formerly of DARPA/Pentagon).&lt;br /&gt;
&lt;br /&gt;
Those interested in what I had to say about hacking and such are invited to &lt;br /&gt;
FTP  a copy of my prepared testimony from [SRI-CSL]&amp;lt;GEOFF&amp;gt;HOUSE.DOC;  There &lt;br /&gt;
is  also  a .LPT version with line-printer overstriking,  should  you  want &lt;br /&gt;
that.   If you cannot FTP a copy for whatever reason,  I&amp;#039;ll be able to send &lt;br /&gt;
one by netmail if you mail a request to Geoff@SRI-CSL.&lt;br /&gt;
&lt;br /&gt;
Geoff &lt;br /&gt;
...............................................................................&lt;br /&gt;
...............................................................................&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
                      TESTIMONY BY GEOFFREY S. GOODFELLOW&lt;br /&gt;
&lt;br /&gt;
       Before  the Subcommittee on Transportation,  Aviation and  Materials          &lt;br /&gt;
on the subject of Telecommunications Security and Privacy.&lt;br /&gt;
&lt;br /&gt;
                               26 September 1983&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Introduction&lt;br /&gt;
&lt;br /&gt;
My   name  is  Geoffrey  S.  Goodfellow.   I am primarily employed  by  the &lt;br /&gt;
Computer Science Laboratory at SRI International,  Menlo Park,  California.  &lt;br /&gt;
For  the  past 10  years  at SRI,  I have been involved in research efforts &lt;br /&gt;
related  with packet switched  computer  network   communication   systems,  &lt;br /&gt;
protocols   and   security technologies.     I  have also been involved  in &lt;br /&gt;
various  operating  and sub-system  development  projects.   Currently,  my &lt;br /&gt;
responsibilities  include  a  position  as Principle  Investigator of SRI&amp;#039;s &lt;br /&gt;
involvement  in  a  Department of Defense program aimed at  developing  and  &lt;br /&gt;
proving  secure  computer  systems,   that  operate  at different  security  &lt;br /&gt;
levels  and communicate via networks.   A detailed biography of  my  career  &lt;br /&gt;
from    7th   grade   school   where   I   discovered   computers    (which &lt;br /&gt;
eventually   lead   to  my permanent abandonment of the formal  educational &lt;br /&gt;
system  during  high  school) to how I got to where I  am  today  with   no  &lt;br /&gt;
degrees   or  any type of equivalency to my name is included at the end  of &lt;br /&gt;
my testimony.&lt;br /&gt;
&lt;br /&gt;
I   am  a  coauthor of the Hacker&amp;#039;s Dictionary -- A Guide to the  World  of &lt;br /&gt;
Computer Wizards, a new book being published this fall.&lt;br /&gt;
&lt;br /&gt;
THE  STATEMENTS  INCLUDED  HEREIN ARE MY OWN   AND   DO   NOT   NECESSARILY  &lt;br /&gt;
REPRESENT THOSE OF SRI INTERNATIONAL OR ANY CLIENTS OF SRI.&lt;br /&gt;
&lt;br /&gt;
2. The Nature of Computer Hackers and Hacking.&lt;br /&gt;
&lt;br /&gt;
The primary nature of a computer hacker can be defined as follows:&lt;br /&gt;
&lt;br /&gt;
   - A   person  who  enjoys  learning  or  knowing the details of computer &lt;br /&gt;
     systems and how to stretch their capabilities,   as  opposed  to  most &lt;br /&gt;
     users  of  computers,   who  prefer  to learn or know only the minimum &lt;br /&gt;
     amount necessary in order to get their job done.&lt;br /&gt;
&lt;br /&gt;
   - One who programs computers enthusiastically,  for the sheer fun of it, &lt;br /&gt;
     and gets a non professional amount of enjoyment out of using them.&lt;br /&gt;
&lt;br /&gt;
   - A person capable of appreciating the irony  and  beauty  (i.e.   `hack &lt;br /&gt;
     value&amp;#039;) of a program.&lt;br /&gt;
&lt;br /&gt;
   - A  person  who  is  good  at programming quickly or is an expert on  a &lt;br /&gt;
     particular program.   (This definition and  the  proceeding  ones  are &lt;br /&gt;
     correlated, and people who fit them congregate).&lt;br /&gt;
&lt;br /&gt;
Unfortunately, though, hacking has an unsavory faction to it:&lt;br /&gt;
&lt;br /&gt;
   - A  malicious  or  inquisitive  meddler  (i.e.  `poacher&amp;#039;) who tries to &lt;br /&gt;
     discover information by poking around.     For  example,  a  &amp;quot;password &lt;br /&gt;
     hacker&amp;quot;  is one who tries,  possibly by deceptive or illegal means, to &lt;br /&gt;
     discover other people&amp;#039;s computer passwords.   A  &amp;quot;network  hacker&amp;quot;  is &lt;br /&gt;
     one   who  tries to learn about the computer network (possibly because &lt;br /&gt;
     he wants to interfere--one can tell the difference only  by   context, &lt;br /&gt;
     tone of voice and manner of approach).&lt;br /&gt;
&lt;br /&gt;
Hackers   of   all  factions,   whether benign or of the  unsavory  flavor, &lt;br /&gt;
consider themselves somewhat of an elite, though one to which  new  members  &lt;br /&gt;
are   gladly  welcome.     Hacking  is  meritocracy   based   on   ability.    &lt;br /&gt;
There  is  a certain self-satisfaction in identifying yourself as a  hacker &lt;br /&gt;
(but  if  you claim  to  be one and are not,  you&amp;#039;ll  quickly  be  labelled &lt;br /&gt;
`bogus&amp;#039;). &lt;br /&gt;
&lt;br /&gt;
The   hacker   is   intensely   interested  in technology  and  is  a  very &lt;br /&gt;
inquisitive  person.   Many  are social outcasts who don&amp;#039;t enjoy  the  same &lt;br /&gt;
things as most other kids their age.   Hackers of the unsavory flavor are a  &lt;br /&gt;
very   curious  breed  of individual  --  many  can  best  be  described as &lt;br /&gt;
loners  looking for someone to appreciate their talents.   They  know  full &lt;br /&gt;
well  that what they&amp;#039;re doing errs  on the  `dark  side (of the force)&amp;#039;  -- &lt;br /&gt;
to coin a phrase.  Unsavory hackers want to get caught so they can be given &lt;br /&gt;
the  appreciation they desire -- and the process of getting caught adds  an &lt;br /&gt;
essence of thrill to their endeavor.&lt;br /&gt;
&lt;br /&gt;
I  would  like to state for the record,  that benign hackers,  such as   I,  &lt;br /&gt;
deplore  the   unsanctioned  entry and subsequent  rummaging  of  mainframe &lt;br /&gt;
computer systems and networks.  These types of  activities  are  tarnishing  &lt;br /&gt;
the  profession  of hacking and giving it a bad name.&lt;br /&gt;
&lt;br /&gt;
In  the  Real  World,   computer  system  organizations  are  generally run &lt;br /&gt;
like  totalitarian  police  states.   This  unfortunate   reality   fosters  &lt;br /&gt;
resentment   in  hackers   and   a  desire to challenge  the  reverence  of &lt;br /&gt;
authority  develops.   As a result,  the way hackers bring themselves to  a &lt;br /&gt;
system managers attention is  via the medium they know and relate to  best: &lt;br /&gt;
a terminal and modem and your computer system.    In most cases, the hacker &lt;br /&gt;
wouldn&amp;#039;t  personally  think  of  or know how to go  about  calling  up  the &lt;br /&gt;
director  of a computer system and offering his services to you as a bright &lt;br /&gt;
young  guy  for the fear  of  reprisals  or  not  being   taken  seriously.    &lt;br /&gt;
Instead,   they  choose  to `introduce&amp;#039; you to them by meddling  with  your  &lt;br /&gt;
computer  system,   cavalierly  circumventing  security   and    protection &lt;br /&gt;
mechanisms,   in   order   to   satiate  their  hunger  for  knowledge  and &lt;br /&gt;
develop an understanding of how things work.&lt;br /&gt;
&lt;br /&gt;
The organization will respond in kind by  trying  to  `plug  the  leak&amp;#039;  of  &lt;br /&gt;
an  intrusion   into  their  system  by erecting barriers.   This  type  of &lt;br /&gt;
reaction  is precisely the wrong approach to  take,   because  the   hacker  &lt;br /&gt;
will   notice   the  beefed-up   defenses  and  see  them   as   a  further &lt;br /&gt;
challenge  of his prowess and ingenuity and legitimate users are  subjected &lt;br /&gt;
to greater inconvenience.&lt;br /&gt;
&lt;br /&gt;
Instead,  what an organization should do is try to befriend hackers   which  &lt;br /&gt;
have  penetrated   their  inner sanctums.   The perspective that should  be &lt;br /&gt;
taken is one of &amp;quot;Is it helpful or  useful  for  you  to  do  this?&amp;quot;  rather  &lt;br /&gt;
than  &amp;quot;Are  you authorized to do this?&amp;quot;.   You must in effect come down  to &lt;br /&gt;
the hackers level and circulate  among them.  Show them that you appreciate &lt;br /&gt;
their talents.   If you ask them nonforeboding questions and take a genuine &lt;br /&gt;
interest  in what they&amp;#039;re doing,  most of the time you&amp;#039;ll find they&amp;#039;re more &lt;br /&gt;
than  happy  to  tell  you  exactly  what it  is  they&amp;#039;re  looking  for  or &lt;br /&gt;
interested  in.    The  hacker  wants  to  learn  and  you  can  be   their &lt;br /&gt;
guide/teacher.   This  is how I was dealt  with  by  the  firm  that caught &lt;br /&gt;
me  during my unsavory hacking days in 1973 when I breached security  on  a &lt;br /&gt;
large   commercial  timesharing  network  and many  of  its  host  computer &lt;br /&gt;
systems.   I was very much inspired by this method of catching and steering &lt;br /&gt;
unsavory hackers towards more constructive use of their talents.&lt;br /&gt;
&lt;br /&gt;
There is,  however, a more virulent strain of the unsavory faction,  namely  &lt;br /&gt;
the  electronic  vandals or joy-riders (N.B.  NOT  HACKERS).   This  strain &lt;br /&gt;
includes,  for example, kids whose parents are of an affluent nature.  As a &lt;br /&gt;
result,  these  kids have  an  inflated world picture and little or no true &lt;br /&gt;
sense  of  reality,  due to the nature of their care-free life  styles  and &lt;br /&gt;
upbringing.    These  kids  plague computer  systems  and  networks as they &lt;br /&gt;
would spray paint on school walls,  t-p someone&amp;#039;s house,  or engage in  the &lt;br /&gt;
use of so called &amp;#039;recreational&amp;#039;  drugs.    In other  words,  these  illicit  &lt;br /&gt;
activities  are engaged in with absolute reckless abandon and disregard for &lt;br /&gt;
the  rights  or sovereignty of other people&amp;#039;s  property.  As  with  regular &lt;br /&gt;
vandalism,  the  primary  motivators seems to be simply  doing  it  because  &lt;br /&gt;
they   can   get away with it,  and because of the respect it  brings  them &lt;br /&gt;
among  their equally disrespectful peers.   This differs from the  unsavory &lt;br /&gt;
hacker  in that there is no constructive purpose or motive  involved,  such  &lt;br /&gt;
as    learning  or   acquiring   knowledge.     This  problem  is   further &lt;br /&gt;
exacerbated by the juvenile age of the perpetrators and the unlikelihood of &lt;br /&gt;
prosecution,   even  if  caught. The perpetrators are smugly aware of their &lt;br /&gt;
immunity in most cases!&lt;br /&gt;
&lt;br /&gt;
3. What Can and Should Be Done to Help Abate The Unsavory Hacking Problem?&lt;br /&gt;
&lt;br /&gt;
From  my  own observations and inspections of systems and from what I  have &lt;br /&gt;
been  reading  in  the press,   I  have  come  to   the   conclusion   that  &lt;br /&gt;
computer   site  administrators   are  not taking  reasonable  and  prudent &lt;br /&gt;
measures  to  protect  their computer systems from  even  the  most  casual &lt;br /&gt;
methods of circumvention.  A  rather egregious example of this would be the &lt;br /&gt;
installation  of which the 414s allegedly logged  into with username &amp;quot;test&amp;quot; &lt;br /&gt;
and password &amp;quot;test&amp;quot;.  Usernames and passwords of this sort are not uncommon &lt;br /&gt;
and  sites which set up logins like this are  just asking  for  a break  in &lt;br /&gt;
-- just  as someone who would leave a key in the lock on the front door  of &lt;br /&gt;
their house,  complete with the WELCOME! mat out  for  all  to see, invites &lt;br /&gt;
the casual burglar.&lt;br /&gt;
&lt;br /&gt;
The   way I view `reasonable and prudent&amp;#039; measures of protection  from  the &lt;br /&gt;
casual  penetration  is by drawing a paradigm with the way  DoD  classified &lt;br /&gt;
information is handled.&lt;br /&gt;
&lt;br /&gt;
With respect to the handling and use  of  classified  information,   it  is  &lt;br /&gt;
the responsibility of the organization to which you belong,  in conformance &lt;br /&gt;
with  DoD guidelines,   to  provide  you  with  rules  and  regulations  in &lt;br /&gt;
the  handling of classified information.  It is also the responsibility  of &lt;br /&gt;
your   organization  to provide  you  with a safe place (i.e.  a vault)  to &lt;br /&gt;
store  said information and to provide adequate safeguards (such as   alarm  &lt;br /&gt;
systems,  security  personnel  and patrols) to prevent unauthorized access.&lt;br /&gt;
&lt;br /&gt;
The   same   methodology   should  be taken to heart by  administrators  of &lt;br /&gt;
computer  systems.  It&amp;#039;s  their responsibility to  provide  reasonable  and  &lt;br /&gt;
prudent  measures to  prevent  unauthorized  access  attempts  from gaining &lt;br /&gt;
access to the system. This means a few very basic things like:&lt;br /&gt;
&lt;br /&gt;
   - Forcing  users to choose reasonable passwords  -  not  their  spouse&amp;#039;s &lt;br /&gt;
     name or their dog&amp;#039;s name.&lt;br /&gt;
&lt;br /&gt;
   - Setting  up  proper  modem controls on dial-up/remote access ports  so &lt;br /&gt;
     that  disconnection causes any jobs (or  trojan  horses  left  on  the &lt;br /&gt;
     port)  to  be flushed and results in resetting the port to  not-logged &lt;br /&gt;
     in status.&lt;br /&gt;
&lt;br /&gt;
   - Reporting  incorrect password attempts to the system  console  or  log &lt;br /&gt;
     file.&lt;br /&gt;
&lt;br /&gt;
   - Causing   line   disconnection  after  a  few  successively   repeated &lt;br /&gt;
     incorrect password attempts.&lt;br /&gt;
&lt;br /&gt;
   - Using encrypted passwords,  so it is not  possible  to  compromise  an &lt;br /&gt;
     entire    systems  password  list  when  circumvention  of  a  systems &lt;br /&gt;
     protection mechanisms is attained.   This is analogous  to  the  DoD&amp;#039;s &lt;br /&gt;
     compartmentalization  of  information -- so a breach in one area  does &lt;br /&gt;
     not sacrifice security in all areas.&lt;br /&gt;
&lt;br /&gt;
The second facet of the paradigm is the users&amp;#039; responsibility.  I don&amp;#039;t  go  &lt;br /&gt;
out  to   lunch and leave my secrets sitting on my desk.  I put them  in  a &lt;br /&gt;
vault.  And  I don&amp;#039;t go throwing them over the embassy walls.   So  it   is  &lt;br /&gt;
the   same   for   the  computer   system   user.      It   is  the   users &lt;br /&gt;
responsibility  to  choose reasonable passwords and not leave them  written &lt;br /&gt;
down   anywhere,   such  as  on  their  desk blotter or white board  or  to &lt;br /&gt;
pass them out to others.&lt;br /&gt;
&lt;br /&gt;
The  third  matter  is  a  paradigm  of a different nature.  This has to do &lt;br /&gt;
with  socially acceptable values.   Namely,  when I was brought up,  I  was &lt;br /&gt;
taught  about trespassing. If I went to someone&amp;#039;s house and found the front &lt;br /&gt;
door wide open,  I don&amp;#039;t  really  know  of  anyone  who would walk right in &lt;br /&gt;
and look around.   They would instead stand at the door,  ring the doorbell &lt;br /&gt;
or knock or call  out.   This type  of  responsibility  or  sense of morals &lt;br /&gt;
has to be applied to the computer technology field.&lt;br /&gt;
&lt;br /&gt;
Research  into  methods of improving the safeguarding of  information  flow &lt;br /&gt;
through technology should be pursued.  One such project is the one of which  &lt;br /&gt;
I  am  the Principle Investigator of at SRI, which has to do with this type &lt;br /&gt;
of  technology.  Our   involvement  has  to do with developing and  proving &lt;br /&gt;
technologies  that will absolutely assure that I will only have  access  to  &lt;br /&gt;
information   in  a  computer system  database  of  which my clearance  and &lt;br /&gt;
my `need to know&amp;#039; entitles me too,  while prohibiting me from information I &lt;br /&gt;
am not cleared or permitted to  access.  However,  one must carefully weigh &lt;br /&gt;
the  value  of  increased security with the cost in  user  convenience  and &lt;br /&gt;
flexibility.&lt;br /&gt;
&lt;br /&gt;
Explicit   federal   and  state  criminal  statutes  should be  enacted  to &lt;br /&gt;
allow  a  vehicle  for  vigorous prosecution,  should it  be  warranted  or &lt;br /&gt;
desired, by injured parties.  These  explicit  laws  would  also  hopefully  &lt;br /&gt;
act  as  a  method  of deterrence.&lt;br /&gt;
&lt;br /&gt;
4. Let Us Not Lull Ourselves into a False Sense of Security.&lt;br /&gt;
&lt;br /&gt;
In    general   unsanctioned   computer   system   penetrations   can    be &lt;br /&gt;
performed  by  individuals who possess three basic  aspects   of   computer  &lt;br /&gt;
knowledge:  access, skill and information.&lt;br /&gt;
&lt;br /&gt;
Access   can   be   defined  as  a  terminal  and   modem.   Skill  can  be &lt;br /&gt;
defined  as ingenuity or familiarity with  computer   systems,   especially  &lt;br /&gt;
with   the   given  system   type  that   the   penetration   is   directed &lt;br /&gt;
towards.   Information  can be defined as dial-up  phone  numbers,  network &lt;br /&gt;
address  or  means  of accessing a given computer  system  -- perhaps  even &lt;br /&gt;
physical.  Information can also include various methods, most likely in the &lt;br /&gt;
form  of  &amp;#039;bugs&amp;#039; (i.e.   shortcomings)  or  &amp;#039;features&amp;#039;  (i.e.   an   aspect  &lt;br /&gt;
inherent   to   the hardware or software design of the system)  which  will &lt;br /&gt;
permit  the  holder  to  circumvent the operating   system   security   and &lt;br /&gt;
protection  mechanisms,  and  in effect gain carte blanche  access  to  the &lt;br /&gt;
computer. Carte  blanche  can be defined as allowing the holder to override &lt;br /&gt;
file security and protection considerations,  in that you can read or alter &lt;br /&gt;
any  data  and   even change the nature of the  computer  operating  system &lt;br /&gt;
software itself.&lt;br /&gt;
&lt;br /&gt;
In  the  good  ol&amp;#039; days such skill and information was  not  widely  known.  &lt;br /&gt;
However,  with  the  ever  increasing  number  of  computer  systems,  both  &lt;br /&gt;
personal and mainframe alike,  information and skill  is  spreading  to  an  &lt;br /&gt;
ever     increasing    number    of    individuals    and     institutions.    &lt;br /&gt;
Unfortunately,   not   all   of the individuals are as scrupulous  as  they &lt;br /&gt;
should  be.   Such instruments  as  `Pirate Bulletin  Board&amp;#039;  systems   are  &lt;br /&gt;
being  used to disseminate this information on a  nationwide,  on-call,  as &lt;br /&gt;
needed basis.&lt;br /&gt;
&lt;br /&gt;
What does this mean?&lt;br /&gt;
&lt;br /&gt;
Up until now most unsanctioned computer system penetrations have not   been  &lt;br /&gt;
the  high  technological  acts of chicanery the media has made them out  to &lt;br /&gt;
be.   They  were primarily performed by individuals who  were  as  familiar  &lt;br /&gt;
with  computer technology  as,   say,  an auto enthusiast is with what goes &lt;br /&gt;
on  under  the  hood  of your car.   The &amp;#039;auto whiz&amp;#039;  has  the  breadth  of &lt;br /&gt;
knowledge  necessary to &amp;#039;hot wire&amp;#039; a motor vehicle,  just as your  computer  &lt;br /&gt;
literate    individual    has   the   breadth  necessary   to   perform   a &lt;br /&gt;
technological &amp;#039;hot wire&amp;#039; inside a computer system.&lt;br /&gt;
&lt;br /&gt;
However,    the   current   low  to  medium  technological  approaches   to  &lt;br /&gt;
system penetrations are likely to change.&lt;br /&gt;
&lt;br /&gt;
I define the technological levels as follows:   high tech is defined  as  a  &lt;br /&gt;
new  method   of  circumvention.     High  tech   methods   are   primarily  &lt;br /&gt;
invented   by  individuals or a group of individuals who have an  in  depth &lt;br /&gt;
understanding  of  the  desired technology the caper is  directed  against.  &lt;br /&gt;
Medium tech can  be  defined as an individual who has the same basic  level &lt;br /&gt;
of  understanding  as  the high tech guy,   but  uses   the  knowledge  and &lt;br /&gt;
perhaps fine tunes or refines it a bit (i.e.  the medium tech individual is &lt;br /&gt;
a  knowledgeable  user).   The low  tech  individual is  just  a  user   of  &lt;br /&gt;
the knowledge with little or no understanding of what is involved in making &lt;br /&gt;
the technology perform its desired function.&lt;br /&gt;
&lt;br /&gt;
In  the  not  to distant future with higher  stakes,  increased  levels  of  &lt;br /&gt;
knowledge and  other  aspects  better understood,  I believe we will see  a &lt;br /&gt;
trend  towards  a  more &amp;#039;higher tech&amp;#039; level of  system   penetrations   and  &lt;br /&gt;
circumventions.    These capers will be harder to detect and deter.&lt;br /&gt;
&lt;br /&gt;
The further development of formal specification and verification techniques &lt;br /&gt;
and  associated   technologies   will   permit   the   system   developers,  &lt;br /&gt;
reviewers    or   specifier  himself  to  verify  that  a   given    system  &lt;br /&gt;
specification  is  consistent with a given model of desired operation.&lt;br /&gt;
&lt;br /&gt;
5. Recommendations&lt;br /&gt;
&lt;br /&gt;
In   conclusion,   I   would  like  to say that I believe the scale of  the &lt;br /&gt;
hacking problem is going to escalate dramatically as more of the technology  &lt;br /&gt;
makes  its way  into  the  mass  market.   There is no one easy solution to &lt;br /&gt;
these problems. The directions that need to  be  taken  are  technological,  &lt;br /&gt;
ethical/moral   and  social.     Hopefully an increased  awareness  of  the &lt;br /&gt;
vulnerability of our systems to penetration and circumvention will allow us &lt;br /&gt;
to see the light,  in the form of solutions, at the end of the tunnel.  And &lt;br /&gt;
hopefully that light, is not a train.&lt;br /&gt;
&lt;br /&gt;
6. Biography (The Making of a Hacker)&lt;br /&gt;
&lt;br /&gt;
My  first  experience  with  computers (and   the   world   of   `hacking&amp;#039;)  &lt;br /&gt;
manifested  itself   during  my  7th grade school when I discovered a  room &lt;br /&gt;
full  of  teletypes connected to a computer system at  Stanford  University  &lt;br /&gt;
which  offered  Computer Assisted Instruction/drill programs.&lt;br /&gt;
&lt;br /&gt;
Having  discovered `The Computer Room&amp;#039;,  I started arriving at school early &lt;br /&gt;
each  day  to be able to play with them.   I would also  spend  the   lunch  &lt;br /&gt;
hour,   recess and as long as I could after school in the computer room, as &lt;br /&gt;
well.&lt;br /&gt;
&lt;br /&gt;
Luckily,  that  summer I was permitted to hang-out at the Stanford facility &lt;br /&gt;
which  had  the computer system that served our school  and  others.   This &lt;br /&gt;
allowed  me the opportunity  to  interact  with  the  system designers  and &lt;br /&gt;
learn  how  everything worked.   At the facility,  I   quickly   began   to  &lt;br /&gt;
develop   a   keen   interest  in system-level  software,   such   as   the  &lt;br /&gt;
operating   system  and  privileged type programs which only `the  wizards&amp;#039; &lt;br /&gt;
could run or  know  the  inner  workings  of.  However,  I did not let this &lt;br /&gt;
fact keep me from learning about the system.&lt;br /&gt;
&lt;br /&gt;
During   the  8th grade,  my parents wishing to contribute to  their  son&amp;#039;s &lt;br /&gt;
apparent avid absorption of computer technology,  procured a used  teletype  &lt;br /&gt;
machine   and modem  from  a  large time-sharing computer  firm.   I  don&amp;#039;t &lt;br /&gt;
know how,  but in the process,  they managed to talk the firm out of `free&amp;#039; &lt;br /&gt;
account   for   after  hours and  weekend  use.    The firm  then  promptly &lt;br /&gt;
forgot about me.   After running the usual course of computer games,  which &lt;br /&gt;
quickly  became  quite boring,  my attention turned towards  the  operating &lt;br /&gt;
system  and  its protection mechanism,  which I  took delight  in   finding  &lt;br /&gt;
ways   around.     This  of  course,   was  noticed  by   the  time-sharing &lt;br /&gt;
company  and one summer evening,  after they were  sure  it  was  me inside &lt;br /&gt;
their  system,  their vice president and district manager came knocking  at &lt;br /&gt;
our door,  and in effect said,  &amp;quot;gotcha!&amp;quot;.   The result of being caught was &lt;br /&gt;
that  I  was  hired  for  the summer to help them make  their  system  more &lt;br /&gt;
secure and plug the holes that I had uncovered in my wanderings.&lt;br /&gt;
&lt;br /&gt;
While  employed for the summer,  1973,  I chanced to meet up with   another  &lt;br /&gt;
summer  hire   who  had done some work at NASA-AMES and had knowledge of  a &lt;br /&gt;
Department of Defense computer network,  called the ARPANET,  which  linked  &lt;br /&gt;
together    computers  all   over   the   country   at   various   research &lt;br /&gt;
establishments,  universities  and  military bases.   My  new-found  friend &lt;br /&gt;
passed me a dial-up number,  and on a scrap of paper,  wrote a few commands &lt;br /&gt;
that would allow me to  connect  up  to  various systems on the network.&lt;br /&gt;
&lt;br /&gt;
In    these   early   days  of  the   ARPANET   (which   pioneered   packet  &lt;br /&gt;
switching technology,  a method for allowing computers of different flavors &lt;br /&gt;
and  types  to `talk&amp;#039;  to  one-another),  the majority of the computers had &lt;br /&gt;
`guest&amp;#039; accounts on them with purposefully obvious and published passwords. &lt;br /&gt;
This was done in  order to  promote the free use of resources at other host &lt;br /&gt;
systems and to let users of the network have a chance to explore, learn and &lt;br /&gt;
use said systems.&lt;br /&gt;
&lt;br /&gt;
Needless  to say,  this was a gold mine that no hacker,   such  as  myself,  &lt;br /&gt;
could  pass  up.    So I spent the better part of the summer  learning  and &lt;br /&gt;
using as many different computer systems as possible, all over the country.&lt;br /&gt;
&lt;br /&gt;
One  of  my favorite systems to use was the guest login account on  a  host  &lt;br /&gt;
called  SRI-AI,   a   PDP-10  running  the  Tenex operating  system,  which &lt;br /&gt;
belonged  to  the  Stanford Research  Institute&amp;#039;s  Artificial  Intelligence &lt;br /&gt;
Center.     I  thought  it nice to have a system right in my very own  home &lt;br /&gt;
town.   I  made it a point to get to  know the operations of this system as &lt;br /&gt;
well as I could in hopes that perhaps someday I might have a login  account &lt;br /&gt;
of  my own to use and it would be  nice  to be familiar with it in such  an &lt;br /&gt;
event.&lt;br /&gt;
&lt;br /&gt;
Well, that day came when, as usual, I logged into the public guest account, &lt;br /&gt;
and  out   popped   a message of the form &amp;quot;Welcome to the  SRI-AI  computer &lt;br /&gt;
public guest account.   If you think you have a need for your own  account, &lt;br /&gt;
send  a note  (with the  on-line  electronic  mail program,  of course)  to &lt;br /&gt;
the system administrator, explaining your need.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Such  an  invitation was just to good to pass up and having  my  very   own  &lt;br /&gt;
login account  is something I had dreamed about.  So, I took it upon myself &lt;br /&gt;
to send a message saying I was a hacker who had been spending time on   the  &lt;br /&gt;
public   guest account  learning  about  their system and wanted to have an &lt;br /&gt;
increased  level  of access and login area of my own  to  store  files.  In &lt;br /&gt;
return,  I  would  freely   help improve the systems capabilities  thru  my &lt;br /&gt;
hacking.&lt;br /&gt;
&lt;br /&gt;
After  some  initial  trepidation  on the part of the systems administrator &lt;br /&gt;
was overcome,  my account was granted.   This allowed me to make SRI-AI  my &lt;br /&gt;
home   base  of  network  operations.     I  immediately proceeded to  hack &lt;br /&gt;
away to my heart&amp;#039;s content,  now that, in effect, I had become a legitimate &lt;br /&gt;
network user.&lt;br /&gt;
&lt;br /&gt;
After demonstrating my competence and some semblance of responsibility,   I  &lt;br /&gt;
was  granted  system privileges (i.e.  carte blanche access to  all  system &lt;br /&gt;
resources).  This permitted me to learn and develop a further understanding &lt;br /&gt;
of the system.&lt;br /&gt;
&lt;br /&gt;
So, I hung around SRI for about 9 months.  I was given a building pass,  so  &lt;br /&gt;
as  to have physical as well as electronic (remote) access to the  computer &lt;br /&gt;
systems.  This   allowed   me  to come and go at odd hours,  which are  the &lt;br /&gt;
hours hackers are best known to keep.&lt;br /&gt;
&lt;br /&gt;
Then, there was an opening for a part-time weekend computer operator&amp;#039;s job, &lt;br /&gt;
and since I had demonstrated  my  competence,   I  was  immediately   hired  &lt;br /&gt;
for  the position.    I  was now in my senior year of high school, and as a &lt;br /&gt;
result of my increased access to computers, my grade average  followed  the  &lt;br /&gt;
typical  hacker curve,  i.e. down.  until, two weeks into the final quarter &lt;br /&gt;
of  my senior year in high school,  I dropped out,  and became full-time at &lt;br /&gt;
SRI.   I have never returned to a classroom since the day I left school  in &lt;br /&gt;
1974.&lt;br /&gt;
I dropped out,  and became full-time at &lt;br /&gt;
SRI.   I have never re&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
d out,  and became full-time at &lt;br /&gt;
SRI.   I have never returned to a classroom since the day I left school  in &lt;br /&gt;
1974.&lt;br /&gt;
I dropped out,  and became full-time at &lt;br /&gt;
SRI.   I have never re&lt;/div&gt;</summary>
		<author><name>Maintenance script</name></author>
	</entry>
</feed>