home *** CD-ROM | disk | FTP | other *** search
-
-
- ==Phrack Inc.==
-
- Volume Four, Issue Forty, File 3 of 14
-
- ==Phrack Pro-Phile==
-
- Written and Created by Taran King (1986)
-
- Welcome to Phrack Pro-Phile. Phrack Pro-Phile is created to bring info to
- you, the users, about old or highly important/controversial people. This
- month, I bring you perhaps the most famous all underground hackers and the
- founder of the Legion of Doom.
-
- Lex Luthor
- _______________________________________________________________________________
-
- Personal
- ~~~~~~~~
- Handle: Lex Luthor
- Call me: I really no longer identify with "Lex Luthor" and don't ever
- expect me to use the handle again with regards to calling
- boards so you CAN call me "Johnson."
- Past handles: I was too status conscious to have more than one handle. All
- my effort went into just one persona.
- Handle origin: From the Superfriends/Justice League of America (ABC TV)
- cartoon series where the Legion of Doom (LOD) kicked their
- asses until the series writers thought up some lame way for
- them to win, but of course, LOD always escaped to fight another
- day.
- Date of Birth: You should know better than that.
- Height: You should know better that that.
- Weight: Approximately 610 Newtons plus or minus a few.
- Eye color: With or without colored contact lenses?
- Hair color: With or without my wig disguise?
- Computer: Apple //+ collecting dust and a soon to be obsolete IBM 286.
- Email address: lex@stormking.com
-
-
- The Interview Of Lex Luthor!
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Taran King
-
- TK = Taran King
- LL = Lex Luthor
-
- TK: So Lex, why have you finally relented to a Pro-Phile/interview when I have
- been after you to do one for about 5 years now?
-
- LL: Well, I have to admit that I am still reluctant. This whole issue of
- computer security/insecurity, hacking/phreaking, philes/electronic
- publishing, etc. is still quite controversial and I would prefer to
- concentrate on strictly legitimate activities. Especially areas where the
- importance of opinions are negligible and the importance of facts are
- paramount, as in Science and Engineering. However, I realize that Phrack
- won't be around forever, so I thought that if I had any last words left to
- say I'd better say it now so here I am.
-
- TK: How did you get started into hacking/phreaking?
-
- LL: It was easy. I had a delicious shake for breakfast, one for lunch and oh
- sorry. No really, it WAS easy. I had a friend who bought an Apple and I
- used to go over to his house and watch him play Ultima I, a fantasy/
- adventure game. After drooling over Ultima long enough, I took all my
- savings and bought a system, which was in excess of $1000 at the time.
- Being penniless, I had nothing else to do but learn the machine. My
- friend then purchased a modem and started calling boards. I followed
- suit. He was interested in cracking software and became rather well known
- using the handle "The Punk". After he gave me some codes for various LD
- companies I started calling around. A short while later, I noticed that
- there were boards, sections of boards, and most importantly INFORMATION
- that I was not permitted to use/see. I was unhappy about being excluded
- especially from RACS III (Tuc eventually came around though) and took it
- upon myself to learn what was involved in accessing these systems and
- getting more information. I realized as most have, that providing
- information that others do not possess allowed me to be noticed and
- therefore gain more information. By the way, I still play Ultima, I
- BOUGHT Ultima VI two years ago but am just getting around to playing it
- now.
-
- TK: What was more important to you, getting noticed or getting information?
-
- LL: The information was undoubtedly the goal. I realize now, as many hackers
- and phreaks have in retrospect, that I am an INFORMATION JUNKIE. The
- notoriety was simply the means to be trusted with more information and
- knowledge. Unfortunately back then I was unaware that most of the
- information that I seeked was available LEGALLY. I was blinded by the
- information itself, and did not concentrate on the *methods of obtaining
- information*. Now with the advent of CD rom databases, and also online
- databases, the information is readily found. The problem is that the
- service providers are pricing the disks and online time out of the reach
- of common people, which of course puts me back to square one in a way.
-
- TK: Why do you need information?
-
- LL: Look, if there is one thing that prevents people from doing things or
- pursuing their dreams, its INFORMATION. Not money, not guts, not
- anything. With the right information just about everything else can be
- obtained with the exception of health and happiness I suppose.
-
- TK: Give me an example.
-
- LL: Okay. If you have ever been up late watching TV and 'ol Dave Del Dotto or
- Carlton Sheets or whomever gets on and is trying to sell you their
- "courses" on Real Estate, Buying at Government Auctions, etc. then you
- know what I am talking about. These guys made millions simply by
- obtaining information that the majority of people were not aware of and
- put it to use, they could have been anybody.
-
- TK: What types of information do you look for?
-
- LL: Although I always look to learn new ways of how to obtain information in
- general, i.e., what new databases are available and how to use them, etc.
- I am currently concentrating on scientific data since I am working on my
- Master's Thesis and a comprehensive literature search is required to
- prevent me from duplicating what has already been accomplished. The
- "don't re-invent the wheel" philosophy.
-
- TK: You mention a thesis, what schooling have you had/are pursuing?
-
- LL: I don't want to be too specific, however, I have an undergraduate
- engineering degree and am currently in the process of completing dual
- Master's degrees, one in Quantum Physics and the other in Engineering.
-
- TK: Sounds heavy, but why be vague, you must have a computer-type or
- electrical engineering degree?
-
- LL: No, and I get that a lot from old friends: "You are so good with
- computers, why aren't you doing that?" My interest in computers now is
- simply to make them calculate equations and do simulations of physical
- systems. And to help me get more information.
-
- TK: Let's get back to the H/P subject, there's a few people who have always
- contended that you and the guys in LOD really didn't know much of
- anything, is that true?
-
- LL: Well I can't speak much about the old members, but their expertise
- satisfied me and other members (we would usually vote on new members, I
- wasn't a dictator you know). As for me, I realized early on that only
- certain people can be trusted with certain information, and certain types
- of information can be trusted to no one. Giving out useful things to
- irresponsible people would inevitably lead to whatever thing it was being
- abused and no longer useful. I was very possessive of my information and
- frequently withheld things from my articles. By not providing much data,
- some people may conclude that I didn't know anything at all. Its just
- that I didn't release it to just anyone and that dismayed various people
- probably to the point of lashing out at me and LOD.
-
-
- Some People to Mention
- ~~~~~~~~~~~~~~~~~~~~~~
- Taran King: You were always hounding me for a Phrack Pro-Phile. Hope
- you are enjoying it.
-
- Knight Lightning: Great guy, but how did he get so famous even though he never
- even broke into the E911 computer? Sad to see him get
- screwed by overzealous "professionals." Wish I had some
- money to donate to his defense fund.
-
- The Blue Archer: Always wanted to meet him. I never got a chance to meet him
- face to face although I have known him for 8 years. To be
- honest, he was better at getting into systems than I was.
-
- Tuc: Always willing to bend over backwards to help you out. I
- still use the briefcase he bought me in NYC many years ago.
-
- Paul Muad'Dib: The one in New York. He is one of the smartest people I've
- ever met. I hope he is doing something worthwhile.
-
- Bioc Agent 003: Talked to him quite a number of times and met him at TAP
- meetings, but we never got to be friends.
-
- Cheshire Catalyst: I still owe him $20. He lent it to me in NYC.
-
- Control-C: A wildman with the women. I hope he gives me his STARGATE
- videogame when he gets tired of it. I don't play it every
- day like him, but I still can kick his ass.
-
- Phantom Phreaker: He has a spiritual side to him that most people never
- realize.
-
- The Videosmith: A fun person with talent. I was sad to see him leave the
- scene so early. Met with him in his home state two years
- ago just to say hello.
-
- Dr. Who: Here is a guy who loved hacking and exploring systems. I
- mean he really enjoyed it. He got quite good at it too.
-
- Telenet Bob: Met him up in Massachusetts at Dr. Who's conference.
-
- Jester Sluggo: Met him up in Massachusetts along with The Sprinter.
- Obviously he knew more than he let on even way back then.
-
- Compu-Phreak: I liked listening to his pirate radio station while he
- operated it. The FCC never did catch on.
-
- Silver Spy: A very smart guy with a future. Someone who knows when to
- stop, but was a little bit panicky at times.
-
- Erik Bloodaxe: Part of the original LOD group. I think he always wanted my
- job. I consider him a friend even though we had our
- misunderstandings.
-
- Mark Tabas: Part of the original LOD group and sysop of Farmers of Doom
- (FOD) for the short time it was up. I hope he isn't in any
- trouble again.
-
- Flash Hoser: A fellow information junkie in the Great White North (GWN).
-
- Gary Seven: Probably one of the least known yet talented hackers around
- except that I mentioned him in the acknowledgement section
- of many of my files. He has since quit.
-
- Digital Logic: Ran a good board for quite a while. An idealist who could
- give a great speech. Too bad no one would listen.
-
- The Ronz!: Old friend who no one ever heard of unless they called
- Digital Logic's Data Service BBS.
-
- Al Capone: Should have been born a few years earlier so he could have
- gotten into hacking when it was fun. He got into it too
- late and the risk became a little too high for him.
-
- Quasi Moto: Sysop of Plovernet. Was a good sysop, but not much of a
- hacker. Still talk to him on the net.
-
- King Blotto: Known him a long time. Glad he never put me on
- TeleTrial!
-
- The Mentor: A fantastic writer. He ran a great board (Phoenix Project).
- The last time I talked to him was a few years ago, but he
- wasn't very talkative. I think he fell for the 'ol Lex is a
- rat rumors.
-
- The Leftist: I hitched a ride with him to one of the SummerCons in
- St. Louis. Haven't talked to him since his trouble began, I
- hope he's cleaned up his act. I thought he was cool until I
- heard he was making stuff up about me to the investigators.
-
- The Prophet: A kindlier gentler hacker. Sorry to see him get screwed by
- the system.
-
- The Urvile: Met him at SummerCon '89. Definitely seemed to be the type
- who you could trust not to screw you over.
-
- Sir Francis Drake: Met him at SummerCon '87. I'm glad I got a chance to.
-
- Sir Knight: What a character.
-
- Shooting Shark: I appreciate the favorable comments he made about me in HIS
- Phrack Pro-Phile.
-
- A Few Other Things
- ~~~~~~~~~~~~~~~~~~
- While I'm on the subject of people, there is one thing that I have not see
- published in any form, and that's a "Where are they now" type of thing for
- ex-hacks/phreaks. Just so people know, there are a number of us who are doing
- quite well at lawful pursuits.
-
- For example:
-
- Silver Spy - Completing a Master's Degree in Electrical Engineering.
- Knight Lightning - Working to become a lawyer.
- The Unknown Soldier - A high level manager at a successful software company.
- The Mentor - Creating games at a well known game company.
- Jester Sluggo - Working for a 'high technology' company.
- The Disk Jockey - Working in the computer business.
- Gary Seven - Chief engineer at a radio station.
-
-
- The Interview With Lex Continues
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- TK: In an early issue of Phrack you were referred to by the following:
- "There is paranoia and beyond paranoia there is Lex." How do you respond
- to that?
-
- LL: Ha Ha, I remember that one. Well of course there is some truth to it.
- And the saying, "better paranoid than sorry." is true as you can see since
- I am not behind bars... not that I ever did anything illegal of course,
- ahem. I should mention that I met two individuals early in my hacking
- career that had a significant influence on me, and both are the absolute
- epitome of paranoid.
-
- One was "Eliott Ness" who was probably in his late 30's to 40's by the
- sound of his voice. He used to call LOD, I met him on a local board. He
- was extremely knowledgeable, but always knew when to stop giving general
- information, never gave out ANY personal information, and never
- communicated for any length of time.
-
- The other guy was "Number 6" from TAP meetings in NYC. I met him a few
- times. Six was another older gentleman. He was very calm until anyone
- showed up with a camera. Then he "went off" until the camera threat was
- negated. This guy had a way of extracting information out of you without
- you even realizing what he was up to.
-
- As I recall people would ask him a question and he would simply turn it
- around and say, "well, what do you think (or know) about so and so" and
- the hapless phreak would spill his guts with Six taking notes and
- sometimes making corrections to what the phreak said much to the phreak's
- surprise. But Six never really gave out much information although it was
- completely apparent to me that he knew a great deal just by the way he
- carried himself.
-
- A few phreaks would try to follow him after the TAP meetings, but he
- always lost them without ever letting on that he knew he was being
- followed. It should be mentioned that paranoia can destroy you (as the
- song goes). A number of times I ran into real problems trying to escape
- from suspected problems that probably weren't anything to worry about.
-
- TK: What memorable H/P BBSes do you recall?
-
- LL: OSUNY: Caught the tail end when I first started. I was impressed.
-
- Plovernet: That BBS was crazy. Constantly busy since it had hundreds of
- active users and Quasi Moto let everyone post whatever they
- wanted and never deleted messages unless there was no disk
- space left. We helped start the "philes" trend there also.
- It was easy to spot who knew what they were talking about so I
- invited them onto the LOD BBS. Some of the people on the LOD
- BBS were then asked to join the now infamous LOD group.
-
- TK: (*Interrupts*) Did you ever think the group you started would become a
- household name in security and hack/phreak circles?
-
- LL: Although I knew the guys in the group were good hacks/phreaks, I had no
- clue of where it was leading. Since we did not tolerate destructive/
- malicious behavior nor things like credit card fraud I did not think there
- was much risk in the group as a whole getting any real attention. Of
- course, all that changed with time.
-
- TK: Sorry for the interruption. Please continue.
-
- LL: Metal Shop Private: The users were idealistic and good natured which was
- refreshing. I liked it most because it was a good
- source of information/files and we were the first to
- see new Phrack issues.
-
- Farmers Of Doom: Mark Tabas did a fantastic job with this one. It was
- quite busy, but did not remain up very long.
-
- Phoenix Project: Again, another fantastic job. The Mentor had some
- rather unconventional ideas like letting security people
- on, which I thought was a good idea.
-
- RACS III: Tuc didn't give me the time of day at first, but eventually I
- got on. Then he took it down.
-
- Pirates Cove: The board in 516 (Long Island, NY). One of the classics.
- It's where I met Emmanuel Goldstein and invited him onto
- Plovernet to help sell 2600 subscriptions.
-
- Catch-22: Absolutely positively the most secure BBS I ever encountered.
- Besides passwording subboards along with requiring users to
- have a high enough security level to access them, it made use
- of many concepts from the "basic security model" introduced by
- Lampson and later augmented by Graham and Dorothy Denning. Of
- course Silver Spy and I had no clue what an access matrix was
- and things of that nature. A duress password was implemented
- so if someone got nailed they could enter the password, not
- compromise the system, yet appear as to be cooperating with the
- authorities who we presumably thought would ask the hacker to
- call. It was never used but nice to have.
-
- BlottoLand: Good board for a while, but he let too many of his "loyal
- subjects" on the system who were locals and they eventually
- overran it.
-
- TK: Do you REALLY think you are ELITE or what?
-
- LL: I really don't know how anyone got the idea that I considered myself
- elite. The only people who said I thought I was elite were those who I
- never met or talked to. Contrary to some people's belief, I never
- considered myself as elite. I was just a guy who liked to pass
- information on to others so I wrote some files. The files did help me get
- access to more information by making me more well known. When I read the
- newspaper, I'm one of those annoying people who keeps interrupting your
- breakfast to tell you details about all the neat stories.
-
- TK: Speaking about the group, what do you think about Erik Bloodaxe and others
- starting ComSec Data Security?
-
- LL: When I first called Bloodaxe after I saw them in the papers/magazines he
- thought I would be mad, maybe that he took my idea or something. I told
- him I am familiar with the computer security consulting business and don't
- want any part of it. It's too tough to get people to pay money for
- something that they cannot get a verifiable return on their investment.
- Besides, getting them to trust you with their inner most secrets is
- extremely difficult.
-
- I told ComSec to write articles about security until their fingers fell
- off. Legitimize themselves as soon as they can. There was too much
- prejudice out there against them with ComputerWorld leading the pack. I
- really think they could have helped some companies if given a chance. But
- I don't think they had enough knowledge about the whole security picture,
- i.e., Physical Security, Environmental Systems (fire suppression, UPS,
- etc), Administrative Security (Hiring/firing policies, etc.), what goes on
- in big IBM shops MVS, CICS, ROSCOE, etc. There is a lot involved.
-
- TK: How did you feel when Knight Lightning and Phrack erroneously insinuated
- that you might have informed on other hackers, maybe even the Atlanta
- Legion of Doom members a few years ago?
-
- LL: Well as you now know, Craig (KL) has seen all the documents and records
- from his trial and many documents from the Atlanta case and there was no
- mention whatsoever of me in regards to providing information, being a
- witness, testifying, etc.
-
- Although I haven't talked to the Atlanta guys since before their trial I
- am sure they know I had absolutely nothing to do with what happened to
- them. The real story has since come out. If there is one thing I hate,
- it's being accused of something you didn't do.
-
- If someone does something they are accused of, he should be man enough to
- admit it. I have said this before a number of times, I have never
- provided information to anyone about other hacks/phreaks that directly nor
- indirectly led to them being visited, arrested, or prosecuted. It's just
- not my way. What goes around comes around and that kind of boomerang is
- something I knew I didn't want to play with.
-
- My success in avoiding trouble is fairly straightforward: Most of all it
- was secrecy and misdirection (ala Stainless Steel Rat), avoiding phone
- company computers especially those in which I was a customer of (i.e., my
- local RBOC) because if you get THEM pissed at you, they'll get you one way
- or another. Also, lots of LUCK and not intentionally making any enemies
- although there have been a few hackers mad at me whom I never even talked
- to and I have no idea as to why they didn't care for me.
-
- TK: Do you have any advice for people out there who may want to begin hacking
- or phreaking?
-
- LL: I am not one to dictate what people should or should not do, but I
- wouldn't if I were them. The technology to prevent and detect security
- breaches and then to track down their source is ever improving. The
- Cuckoo's Egg (by Cliff Stoll) provides a good example of that. But that
- shouldn't even come into the picture.
-
- I think they should examine objectively why they want to do it. Then make
- an honest attempt at finding other legal ways to accomplish whatever they
- were trying to do. I don't care how you justify it, its dishonest.
- Forget about the law part of it. It just causes other people problems. I
- didn't know how much until my school's systems were hacked and I was
- unable to read my e-mail for a week. I was angry and thought to myself
- that I'd like to get my hands on that asshole hacker. Then I laughed for
- quite awhile realizing what I was thinking and the irony of it all.
- Poetic justice I suppose. None of my data was touched, but I was denied
- service and denial of service can be just as damaging. As for the
- challenge of it, well I can't deny that that was very addicting, but there
- are many legal ways to challenge yourself.
-
- TK: What conventions/involvements outside of phone calls have you done?
-
- LL: TAP meetings were probably the first. Then a Con in Massachusetts, the
- Con in Philly with Videosmith et al. and of course the few SummerCons
- (1987 and 1989) in St. Louis. There were some computer security
- conferences that were interesting also. Those helped to sensitize me to
- the "other side."
-
- TK: I remember at SummerCon '89 that you were accidentally caught on video
- tape for about 2 seconds and requested that it be erased, which it was.
- What is the deal with cameras?
-
- LL: It may sound a little odd, but I don't think anyone has the right to take
- another person's picture without their permission. Especially when the
- person who is on film has no idea where the picture will end up.
-
- I predict within 5-10 years maximum that states will start using video
- cameras to digitize your picture when you go for a new driver's license.
- The digitized image will be stored with the rest of your personal
- information and probably be available to people like private investigators
- and others who gain access to the information illegally. With ISDN,
- Multi-Media, etc., it will be possible to "set up" people very easily by
- altering images via computers, etc. to make them look like they are doing
- just about anything you can think of. When things like that start to
- happen I will not look crazy but smart, at least to my friends who think
- my avoidance of cameras is abnormal.
-
-
- Most Memorable Experience
- ~~~~~~~~~~~~~~~~~~~~~~~~~
- TK: What are your most memorable experiences (funny things that happened to
- you during your phreaking/hacking or not so funny)?
-
- LL: Dr. Who in Massachusetts had a conference in which me, Tuc, and The
- Videosmith drove up at 4 AM in Tuc's VW Beetle hydroplaning all the way
- due to the rain, and dead tired. We were all in a silly mood and had a
- lot of laughs.
-
- Also, the time when I was in NYC with Paul Muad'Dib and we had no money to
- eat. He was the first person I know of who had any real knowledge of
- phone company switching systems. He engineered a switch in Manhattan to
- put call forwarding on a pay phone. Once this was done, all the money put
- into the phone would remain in the phone but would not drop into the coin
- box. Those who put money in didn't really have to since the phone was
- converted to a POTS (Plain Old Telephone Service). Alas, humans are
- creatures of habit. So after a couple of hours (since it was a busy
- phone) he had the guy put the phone back to the way it was. When this was
- done, all the money held in the phone was returned. It was like hitting
- the jackpot in Las Vegas. We then proceeded to McDonald's.
-
- The story about me running around naked in a Motel 6 parking lot that
- Control-C has tried to get people to believe is, of course, grossly
- exaggerated. His girlfriend hooked me up with a friend of her's. Dan and
- his girl were in another room. He called me to come over, but I was in my
- underwear. We had been drinking so I ran the 8 feet or so to his room (we
- were on the 2nd floor with a solid balcony so no one from the ground could
- see anyway), I said hello and then ran back to my room to go another
- round.
-
- Probably my favorite memory is relatively recent. J.J. Bloombecker,
- Director of the National Center for Computer Crime Data, spoke at my
- school. I sat in the very back as usual (I hate to have anyone sitting
- behind me, anywhere) in a room of about 40 people and listened to his
- speech which basically was to promote his book, "Spectacular Computer
- Crimes." I spoke to him but never let on who I really was. He talked
- about Craig's (Knight Lightning) case and then he went on about whomever
- named LOD, the Legion of Doom, should have named them something like the
- "Legion of Ineffectual Pansies." The reason being that, what prosecutor
- in his/her right mind would go to a judge and say how dangerous a group of
- ineffectual pansies are.
-
- I sat there trying not to blush and thinking that of all the hundreds of
- people he said that to, he probably never expected to say it to the person
- who really named the group.
-
- I did meet Donn B. Parker, whom I consider the father of computer
- security, twice. The first time I just shook his hand. The second time
- was relatively recently and we spoke for 20 minutes or so. I never told
- him who I really was, not that he would know anyway. But I complimented
- him enough so even if he found out, he couldn't have gotten too mad at me.
-
- TK: What were some of your memorable accomplishments (newsletters/files/etc.)?
-
- LL: The REAL accomplishments (non-files) will remain anonymous, but my
- favorite files were the IBM VM/CMS series because they were well written
- along with the Attacking, Defeating, and Bypassing Physical Security
- Devices series. Before I wrote a file I scoured boards and other
- traditional sources for the information I sought. If I came up empty
- handed, I researched it and wrote about it myself.
-
- Although the COSMOS files helped me get started, they were a complete
- joke. They provided enough information to be dangerous and didn't help my
- standing with the RBOC's. The VAX/VMS files got better as they
- progressed, but except for some of Part III they didn't provide much that
- wasn't available in manuals. I enjoy writing, but it usually takes me
- many revisions to get it just right. As for newsletters, the LOD/H
- Technical Journal is another thing that I was involved in.
-
- TK: What is the story behind the LOD/H Technical Journal?
-
- LL: The LOD/H Technical Journal almost never was. As you are aware, LOD had
- gotten a group of files together to be published in PHRACK as an "all LOD
- issue," but some of the members thought we should put out our own stuff.
- The idea grew on me and I said okay. I should let it be known that you
- helped us out for the first issue by spell checking it and performing some
- editing and critique. But we were only able to produce 4 issues since it
- was difficult in getting quality non-plagiarized or non-highly paraphrased
- material.
-
- After the third issue, I realized that I was probably not doing anyone any
- favors by exposing security holes and weaknesses in systems. Some people
- may not believe hearing this from ME, but I don't agree with those hackers
- who think they are doing people a service by exposing their system
- vulnerabilities. Nobody needs someone checking their door at night to see
- if its locked. And although the old door analogy isn't exactly the same
- as the pseudo-physical computer login, its close enough. Sorry about
- getting off the subject a little.
-
- TK: That's okay. Why did you quit the H/P community?
-
- LL: I wrote a letter to 2600 Magazine about a year ago that goes into it a
- little. Between that and what I've said here, it should be fairly
- apparent. In brief, I realized I was mainly in it for the purpose of
- getting information. It got too dangerous and I decided to direct my
- energy to graduating instead of how to defeat security systems. The
- thought processes involved in hacking and those in solving problems in
- Engineering Design are remarkably similar and I think my hacking experience
- makes me a much better designer and problem solver. Not that I am
- advertising for a job or anything...
-
-
- Lex's Favorite Things
- ~~~~~~~~~~~~~~~~~~~~~
- Women: Without Diseases.
- Cars: So fast that you are terrified to put the pedal all the way down to
- the floor.
- Foods: Anything that does not contain pesticides, herbicides, heavy metals,
- radioactive elements, toxic chemicals, harmful microorganisms,
- artificial colors, or preservatives. I guess that rules out fish,
- produce, meat, processed foods, drinking water, and so on. In other
- words there's nothing left to eat. In all seriousness, I do like
- great big salads and if I was rich I would have an awesome wine
- cellar.
- Music: Heavy Metal, some Punk, and Classical.
- Authors: Richard P, Feynman, Isaac Asimov, Stephen Hawking, Jane Roberts, Budd
- Hopkins, Jacques Valee, Bruce Sterling, K. Eric Drexler, and Matthew
- Lesko.
- Books: I liked the Cuckoo's Egg, anything about physics, and non-kook
- metaphysical books. The only thing I collect these days are books.
- I have hundreds of them.
- Games: Atari's ASTERIODS DELUXE was probably the most difficult videogame
- ever (even though it's more than ten years old) and which I am one of
- the best there is at playing it. When it comes to this, I admit I AM
- Elite. There's almost no one on this planet who can beat me.
- Defender and Stargate are also great. They don't make games like
- they used to. And of course, the Ultima series.
- Actors: Dana Carvey, Bill Moyers, Patrick Stewart (ST:TNG), Jonathan Frakes
- (ST:TNG), Andy Griffith (Matlock), and too many movie stars to
- mention.
-
-
- The Interview Concludes
- ~~~~~~~~~~~~~~~~~~~~~~~
- TK: Is there anyone specifically that you want to say a few things to?
-
- LL: To all those who subscribe to the "Once a thief, always a thief" mentality
- and to those few die-hard law people who would love to get their hands on
- me and other ex-hackers: Don't bother, people are basically good and can
- be "rehabilitated" without going to prison.
-
- LL: The other thing that I have never understood about the hack/phreak
- community is some of the obsession with tracking people down. I could
- understand it a little better when the reason was to check out others to
- make sure they were not feds.
-
- I never compiled lists of who I talked to with anything except their
- handle, first name, and phone number. I never CNA'd them for their last
- names, or tried to find out where they worked.
-
- But some guys just had to know everything about everyone. Don't they have
- anything better to do? I was careful yes, but not to the point of
- invading everyone's privacy especially when the person stated they just
- wanted to be left alone. I am not saying I NEVER invaded another's
- privacy, but I don't now and almost never did it in the past.
-
- I left an Internet mailing address at the beginning of this Pro-Phile so
- people can contact me. I don't mind talking to people, but I just don't
- think it's fair to harass and threaten people who don't want to be
- bothered. I am open to useful and constructive conversations via email,
- but I really don't think it's necessary to compile individual's personal
- information. I never did it and will never understand why people do it.
-
- Besides, it's no great accomplishment to find people these days. The ways
- of getting information are numerous and many are legal, so how much skill
- does it really take to get someone's info? Almost none. Anyone can do
- it... on just about anyone they want.
-
- TK: What do you think about the future of the hack/phreak world or telecom
- communications in general?
-
- LL: As for the hack/phreak aspect, every time I think hacking is dead and
- people would have to be deranged to break into computers or make phone
- calls illegally for free, I read about another hapless person or group of
- people who have done it. Don't they realize there are better and easier
- ways of going about whatever they are doing? Don't they realize that the
- technology to CATCH you is such that you have lost the fight before you
- even get started?
-
- Yes there will be new technologies that will help both sides, but there is
- the law of diminishing returns. As for what hackers should be doing, if
- anything they should keep an eye on our right to privacy. If it weren't
- for hackers, TRW would still be screwing people over (worse than they do
- now) and would have never apologized for not correcting invalid credit
- information.
-
- TK: And of course the question that no Phrack Pro-Phile does without...
-
- Of the general population of phreaks you have met, would you consider most
- phreaks, if any, to be computer geeks?
-
- LL: Absolutely NOT. I don't judge people on how they look anymore (yes I used
- to). As The Mentor so eloquently put it in his Hacker Manifesto (Phrack 7
- and again in Phrack 14), of which this is, but a lame paraphrase, it's
- more important to relate to people on what they know and on their ideas
- than what they look like or what color their skin is, etc. And the vast
- majority have non-geeky ideas.
-
- TK: Thanks for your time, Lex.
-
- LL: Thank you for letting me ramble on for so long.
- _______________________________________________________________________________
-
-
-