home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Three, Issue 25, File 8 of 11
-
- /*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%
- %*/ %*/
- /*% Hacking: What's Legal And What's Not /*%
- %*/ Written by Xandor SymmLeo Xet %*/
- /*% With Technical Assistance From The ICH /*%
- %*/ %*/
- /*% Reviewed by HATCHET MOLLY (TK0GRM1@NIU.BITNET) /*%
- %*/ Exclusively for Phrack Inc. %*/
- /*% /*%
- %*/ March 8, 1989 %*/
- /*% /*%
- %*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/*%*/
-
-
- "Hacking: What's Legal And What's Not" was originally published in 1987 by
- "HackTel Communications" of Crosby, Texas. Reportedly the book is no longer
- being published as the author, Xandor SymmLeo Xet, has joined the United States
- Army. E. Arthur Brown of Minnesota has bought out the remaining stock and is
- selling it for $12.95 (plus postage and handling) which is about half off it's
- "cover price" of $25.00.
-
- We've always been taught not to judge a book by its' cover, and I suppose that
- one should not expect beautiful binding and great illustrations in
- self-published books, especially those that deal with hacking and phreaking.
- But I can't help comment on the sheer ugliness of this volume. To be fair, I
- should preface these remarks by saying that E. Arthur Brown Company does
- give fair warning about the packaging of this book in their advertisement.
-
- The "book" consist of about 300 photocopied reproductions of non-NLQ dot matrix
- pages. However, this does not mean you get three hundred pages of information
- as about half of the pages are single sided copies. All in all I'd say it
- could be reduced to about 200 pages if everything was copied back to back.
- These pages come in a nice three ring binder, black in color, and it even has
- the name of the book silk screened on the cover. (I can't resist mentioning
- that the title of the book is improperly punctuated on the cover, though it is
- correct inside the manuscript.)
-
- Presumably the author(s) intended to release follow up reports and addendum to
- the book at later dates (and at additional cost). So the three-ring binder
- approach makes sense, and the author does explain that he has used single sided
- copies in some places to allow for easy insertation of these "Hacker Reports."
- So perhaps criticisms of the books packaging are a little unfair since it
- appears these concessions were made with a purpose in mind. This does not,
- however, change what you do indeed get when you order this book. All potential
- buyers should be aware of what they are getting for their money.
-
- Enough of what the book looks like, let's examine what it has to offer.
- Generally speaking, it is a cross between a "how to" and a legal reference
- guide. Much of the book is dedicated to state and federal laws that deal with
- hacking, phreaking, and pirating. You'll find reprints of the state computer
- crime laws for every state of the union, (current at the time the book was
- written) and the Federal wire fraud and copyright laws. It does not include
- the Federal Electronic Communication Privacy Act (ECPA) perhaps because act was
- not passed at the time the book was compiled. The sections on state laws
- appear complete enough, and the full source and appropriate references are
- given if you want to check them for accuracy or changes. Thoughtfully, the
- author has even included the associated penalties each statute carries. And
- for those of you who aren't quite up on your Latin, there is even a (very)
- short legal glossary so you can better understand the language of the law.
-
- The crime laws make up the bulk of the book. They are probably the most useful
- section despite the fact that the information is at least three years old by
- now. The rest of the book is dedicated to various topics that are mundane to
- anyone that is an active practitioner of phreaking and/or hacking. Topics like
- "what is a network" and "how does a war dialer work" really do little for the
- accomplished hacker, and the public can get the same information in the better
- written book by Bill Landreth.
-
- One point that interested me is that Xet adheres more to the "computer
- professional" definition of "hacker" than he does to the definition used by
- most of the underground. In other words, he maintains that people who gain
- unauthorized access to systems are "crackers," not "hackers." He, like many
- phreak/hackers, gets upset when the media uses the term incorrectly, but his
- reasoning is a little different from most. Interestingly enough, despite an
- entire chapter on software piracy, Xet does not realize that "cracker" already
- refers to a specific type of activity and suggesting it as an alternative to
- "hacker" only serves to further muddy the waters. To some this may be a minor
- point, but the indiscriminate and apparently uninformed use of terms and labels
- is ill advised in a book that aspires to be a useful reference manual.
-
- By way of illustration, I've excerpted his definitions (actually, they should
- properly be called "descriptions") of various terms from the glossary:
-
-
- Hacker: A non-business computer user who operates a computer in
- conjunction with a modem and who at least knows his (or her) way
- around a local bulletin board and has at least heard of
- CompuServe and The Source. Can usually be found eating pizza or
- donuts, and has a working knowledge of the effects of long term
- exposure to great amounts of caffeine either from drinking
- several softdrinks (sic) or numerous cups of coffee.
-
- Cracker: A hacker who has an adventurous streak which leads him into
- unknown computer menus and strange protocols of all benign. He
- has the ability to crack access codes or passwords in order to
- illegally enter a computer over the telephone. Usually a very
- good problem solver, quick to think, cautious to act. Often
- thought of as clever or even sneaky. Excellent chess players.
-
- Chrasher: A cracker gone bad. One who gets his jollies from terminating
- corporate systems and picking on helpless bulletin boards by
- destroying information or files or by rendering a system unable
- to communicate (usually referred to as "crashing" the system)
- until reset by a sysop. Very clever, extremely dangerous.
- Smart, but hopelessly misdirected. They deserve respect for
- their ability to destroy.
-
- Pirate: Software pirate. A hacker who concentrates his efforts toward
- cracking software copyright protection schemes which are placed
- on computer disks to prevent the illegal copying of factory
- produced programs. Some pirates have a habit of collecting
- software that they have managed to crack either to trade with
- other pirates for software they don't have yet or just to collect
- it for the sake of building their egos. Some of my best friends
- are pirates. Usually, very easy going people, and sometimes
- politically minded as well. And even more clever than crackers
- or crashers.
-
- The problem with these definitions is that they are not mutually exclusive and
- do little but reinforce the stereotypes that hackers, phreakers, and pirates
- already face. Any phreak/hacker that reads this book will give these
- definitions little attention, if they read them at all, but if this manual is
- used by the media as an "example of hacker literature" it will only further
- perpetuate some of these assumptions.
-
- A large amount of the book is dedicated to what Xet calls The Gray Pages.
- Labeled as a "national hackers' phone book" it is primarily a list of dialups
- for Telenet, Tymnet, Compuserve, and The Source. This list is hardly "secret"
- and the format hints that it may just be a capture of the "info" pages from
- each of these networks. These numbers may be helpful to the beginner, but it
- would have been better if he included instructions on how to dial the toll free
- access number (or call customer service and just ask them) and check for your
- local number by yourself. Not only would this have cut down on the number of
- pages needed, but it would have at least given the beginner an excuse to
- actually do something themselves. (Not to mention that is the best way to get
- the most accurate information.)
-
- The rest of "The Gray Pages" is taken up by a list of 400 public BBS systems.
- Although the list is titled "hacker bulletin boards" many of the systems listed
- are quite legitimate and do not support phreak/hack or pirate activities. Woe
- to the beginner who calls CLAUG and starts asking for plans to a blue box. Of
- course the biggest draw back to this list is that it was probably fifty percent
- out of date four months after it was printed.
-
- Speaking of blue box plans, Xet does offer a short list of box colors and what
- they do. No plans for boxes are included, nor is there a discussion of DTMF
- tones or other common phreak knowledge. He does include simple schematics and
- operating instructions for a tap indicator, wire recorder, and a data converter
- (for use with the wire recorder). The introduction to this section, called
- "gray market equipment" says that future editions of the book will include box
- schematics.
-
- Finally, there is a short section called "helpful stuff" written by "The ICH."
- This section is pretty informative but offers little clarifying information.
- Basically it includes an ASCII table, DTMF frequencies, satellite and cellular
- frequencies, and a short discussion of packet switching networks.
-
- In summary, "Hacking: What's Legal And What's Not" offers some very basic
- information to the beginning hacker, a quite good (although potentially
- outdated) review of relevant state and federal computer crime laws, and a few
- tid-bits here and there that are worth knowing. But it also wastes a lot of
- space to bulletin boards and dialup numbers that are of little use to anyone.
- Experienced phreak/hackers and pirates will find a few articles that are not
- available elsewhere (like the section on "How Hackers Think" where Xet says
- that since a San Diego BBS poll indicated that 79% of "hackers" had the
- astrological sign of Leo all one has to do to understand hackers is read a
- profile of Leo's!) but the vast majority of the information is old news in a
- new format.
-
- For someone who wants to get a broad overview of the computer underground I can
- recommend this book. But if someone is looking for information of any real
- use, I suggest you contact your local phreak/hack BBS and use the G-philes they
- have available. You won't be missing anything this book has to offer. E.
- Arthur Brown's price of $12.95 offers a reasonable value, and if your looking
- to develop a "hacker library" you might consider ordering a copy.
- _______________________________________________________________________________
-
-