home *** CD-ROM | disk | FTP | other *** search
- /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
- \ A BOM SQUAD RELEASE /
- / The History Of \
- \ Hacking & Phreaking /
- \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
-
- By Raven
-
- -=-=-=-=-=-
-
- Okay boys and girls, children of all ages...Here's a
- revolutionary idear....The announcements foist!
-
- -=-=-=-=-=-
-
- The file we released on smashing up cop cars and getting
- away, ya know? Well, don't try it unless you got half a ton
- of cocaine in the back seat, and a billion bucks on the dash!
- The cops are wise, and are liable to open fire on you once
- you start pulling backwards, so, don't attempt it unless you
- have no other options. Another thing - now they're air bags
- are quicker-draining, so they can start the chase almost as
- soon as you are off.
-
- -> And Now, On With The Show! <-
-
- Okay, folks...First of all, I wrote this because, well, a lot
- of you fellow hacker/phreakers out there do all yer
- stuff, but don't know your roots. Hacking and phreaking have
- been around for over 20 years now. So,
- without further adue, I present, the History Of Hacking,
- and Phreaking!
-
-
-
- -=- The History Of Hacking & Phreaking -=-
-
- Believe it or not, but hacking and phreaking have been
- around since the '60s. Yep. Hacking is a legacy! Phreaking
- came around some time about 10 years later.
-
-
- -The 60's Hacker-
-
- These were back in the days when a teenager couldn't
- even buy a computer (because of price), much less fit it in
- his house. The 'hackers' were the people the sysop's of
- lamer PD boards would have you believe - people who spent
- lots of time with their computer (hacking away at the
- keyboard).
- The true hackers came about when Massachusetts Institute
- of Technology employed some nerds to do some artificial
- intelligence and computer work for them. These guys actually
- created the models for the terminal your working on right
- now. They were the true and original programmers and
- engineers.
- Anyhow, these guys were working on a project called MAC
- (Multiple-Access Computer, Machine-Aided Cognition, or Man
- Against Computers...Take yer pick). All goes well as these
- guys write some basic programs, build operation systems, and
- play 4 color chess games, until the MAC programmers go public
- with a computer time sharing program. The first BBS, and it
- even had over 100 nodes!
- Of course, only other guys with main frames could access
- this thing (i.e. - the government, other big schools, and big
- companies). These sysops who worked at MIT did their best to
- control the badly maintained MAC system, but the hoards of
- users cluttered up everything.
- Then, something magical happened. A man called John
- McCarthy, Ph.D., crashed the MAC system. Soon, others took
- sport in crashing this international network. Companies were
- able to take place in a crude form of industrial espionage on
- the MAC buy 'eavesdropping' on rival's E-Mail, and those
- cheap cardboard punch cards (the first computer disks) were
- always being corrupted by batch-file viruses. Hacking is
- born.
- However, crashing the system and all other 'evil'
- activities were encouraged. From them, sysops learned from
- mistakes, and the hackers took place in the hackers'
- obsession - the desire to learn as much as possible about a
- system.
-
-
- -The 70's Hacker/Phreaker-
-
- The 70's were a magical decade, and a flying leap for
- phone fraud. The first half of the 70's was like the 60's in
- respect to hacking. In the second half, hacking escalated
- into 80's hacking (see below).
- Besides hacking, though, the 70's produced the phone
- phreaks. Phreaking was born from the non-existent womb of a
- blind child from Tennessee named Joe Engressia. Joe was one
- of the rare people born with perfect pitch. Because of that
- gift, Joe was able to manipulate some of the most
- sophisticated and widespread technology in the world.
- Joe enjoyed the phone system. Being a curious 8 year
- old, he called recorded messages all over the world, because
- it was free, and is was a good past time. One day, he was
- listening to a message and whistling. When he hit a certain
- tone, the message clicked off. You or I might have hung up,
- but curious 8 year olds don't.
- Joe fooled around with other numbers and the same pitch,
- and found he could switch off any recorded message. Joe
- called his local phone company, and wanted to know why this
- happened. He didn't understand the explanation given, but he
- did realize that he had stumbled on to a whole new world to
- explore.
- How was Joe able to do this? Joe had stumbled onto the
- multifrequency system (known as MF to phreakers world wide).
- The purpose of this system was to do most of the the job a
- human could do, but done cheaper and quicker by a machine.
- Joe used this system by whistling the right pitches at
- the right times to get free calls. Of course, he never
- wanted to hurt the phone company. He loved the phone
- company. It was merely curiosity which caused him to do this
- all.
- Joe phreaked all the way into college (he was in college
- around the early 70's). While phreaking free calls back home
- for some friends, he was caught. Joe's case was a world wide
- publicity case (beginning first with an article in Esquire in
- 1971). Soon, he received calls from phreaks world wide
- asking advice on certain pitches. Joe Engressia had become
- the phounding phather of phreaks.
- Several years before, in 1954, the phone company made a
- large mistake. They printed all the MF codes in their
- Technical Journal, a book which was easily obtained then, but
- has not been released to the public in over 15 years because
- of the damage phreaks could do with it. Phreaks learned the
- MF, and began using everything from their mouths to pipe
- organs to phreak calls.
- Then, the most ironic thing of all aided phreakers.
- John Draper, an air force technician stationed over seas
- discovered that if a toy whistle in boxes of Cap'n Crunch had
- a hole covered up, it produced a pure 2600 cycle tone, the
- exact pitch needed for a free call anywhere (at least it used
- to be). Soon, Draper was calling other phreaks all over the
- world. Paris, Peking, London, New York and more.
- Using his 2600 cycle whistle and other tools of the
- trade, Draper set up a phreak underground. It was a mass
- node 'party-line' in which many phreaks talked to one another
- at one time. In the throne was Cap'n Crunch - John Draper's
- handle.
- The phreakers exchanged knowledge, and soon combined
- their ideas to build the blue box. The blue box can reproduce
- any MF pitch. The whole thing came together in October,
- 1971, in Esquire magazine. Ron Rosenbaum exposed the
- phreaking world from Joe to Crunch in one article called
- "Secrets Of The Little Blue Box".
- Rosenbaum distorted the phreaking world greatly.
- According to him, Crunch had a van which was chock-full of
- electronics. Crunch would drive around the country side,
- going from pay phone to pay phone, stealing cash from the
- coin box for money, and placing calls to phreaker friends.
- Occasionally, Crunch would call his 'mentor', Joe, for
- advice. Nah. I don't think so. Rosenbaum glorified the
- phreaking world, making Crunch a romantic hero.
- Draper/Crunch was arrested, convicted, and did time.
- While in the big house, several mafia inmates tried to
- recruit him into a commercial blue-box front. Draper
- declined, and they knocked out a few of his teeth, and broke
- his back.
- After leaving prison, Draper quit phreaking, and began
- programming. Last the world heard, he was head of a
- programming division of Apple.
-
-
- -The 80's Hacker-
-
- During the 1980's the hacker population probably went up
- 1000-fold. Why? For several reasons. The first being that
- the personal computer and clones were made available to the
- public at cheap prices. People could afford to buy a
- terminal and set up a BBS. And, where you find BBS's, you
- find hackers.
- The second, and probably biggest reason was the movie
- WarGames. WarGames displayed hacking as a glamourous
- profession. It made hacking sound easy. I once heard that
- the estimate of hackers in the US increased by 600% after
- WarGames. Modem users also increased, but only by a mere
- 1200%. This made hacking easy, though, because it was also
- estimated that one third of "WarGames Generation Hackers" had
- the password 'Joshua'. If you have seen the movie, you know
- that that name had some significance. Many hackers didn't
- like WarGames, though. They thought it made hacking sound
- like a pansy thing to do. To non-hackers, though, WarGames
- was great.
- The third reason is because of the mass publicity
- surround WarGames and hacking. If we had a controlled media,
- probably the only hackers in the USA would be spies and
- corporate computer techs. The media increased the hacker
- population by a lot, also.
-
-
- -The Hacker of The 90's and Beyond-
-
- Hacking of the 90's have basically been crashers of
- BBS's and company boards. There have been a few virus-smiths
- around. Piracy is always around. Who knows what the future
- brings in the world of hacking, phreaking, and anarchy?
-