phrack/phrack40/3.txt

679 lines
36 KiB
Plaintext

==Phrack Inc.==
Volume Four, Issue Forty, File 3 of 14
==Phrack Pro-Phile==
Written and Created by Taran King (1986)
Welcome to Phrack Pro-Phile. Phrack Pro-Phile is created to bring info to
you, the users, about old or highly important/controversial people. This
month, I bring you perhaps the most famous all underground hackers and the
founder of the Legion of Doom.
Lex Luthor
_______________________________________________________________________________
Personal
~~~~~~~~
Handle: Lex Luthor
Call me: I really no longer identify with "Lex Luthor" and don't ever
expect me to use the handle again with regards to calling
boards so you CAN call me "Johnson."
Past handles: I was too status conscious to have more than one handle. All
my effort went into just one persona.
Handle origin: From the Superfriends/Justice League of America (ABC TV)
cartoon series where the Legion of Doom (LOD) kicked their
asses until the series writers thought up some lame way for
them to win, but of course, LOD always escaped to fight another
day.
Date of Birth: You should know better than that.
Height: You should know better that that.
Weight: Approximately 610 Newtons plus or minus a few.
Eye color: With or without colored contact lenses?
Hair color: With or without my wig disguise?
Computer: Apple //+ collecting dust and a soon to be obsolete IBM 286.
Email address: lex@stormking.com
The Interview Of Lex Luthor!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Taran King
TK = Taran King
LL = Lex Luthor
TK: So Lex, why have you finally relented to a Pro-Phile/interview when I have
been after you to do one for about 5 years now?
LL: Well, I have to admit that I am still reluctant. This whole issue of
computer security/insecurity, hacking/phreaking, philes/electronic
publishing, etc. is still quite controversial and I would prefer to
concentrate on strictly legitimate activities. Especially areas where the
importance of opinions are negligible and the importance of facts are
paramount, as in Science and Engineering. However, I realize that Phrack
won't be around forever, so I thought that if I had any last words left to
say I'd better say it now so here I am.
TK: How did you get started into hacking/phreaking?
LL: It was easy. I had a delicious shake for breakfast, one for lunch and oh
sorry. No really, it WAS easy. I had a friend who bought an Apple and I
used to go over to his house and watch him play Ultima I, a fantasy/
adventure game. After drooling over Ultima long enough, I took all my
savings and bought a system, which was in excess of $1000 at the time.
Being penniless, I had nothing else to do but learn the machine. My
friend then purchased a modem and started calling boards. I followed
suit. He was interested in cracking software and became rather well known
using the handle "The Punk". After he gave me some codes for various LD
companies I started calling around. A short while later, I noticed that
there were boards, sections of boards, and most importantly INFORMATION
that I was not permitted to use/see. I was unhappy about being excluded
especially from RACS III (Tuc eventually came around though) and took it
upon myself to learn what was involved in accessing these systems and
getting more information. I realized as most have, that providing
information that others do not possess allowed me to be noticed and
therefore gain more information. By the way, I still play Ultima, I
BOUGHT Ultima VI two years ago but am just getting around to playing it
now.
TK: What was more important to you, getting noticed or getting information?
LL: The information was undoubtedly the goal. I realize now, as many hackers
and phreaks have in retrospect, that I am an INFORMATION JUNKIE. The
notoriety was simply the means to be trusted with more information and
knowledge. Unfortunately back then I was unaware that most of the
information that I seeked was available LEGALLY. I was blinded by the
information itself, and did not concentrate on the *methods of obtaining
information*. Now with the advent of CD rom databases, and also online
databases, the information is readily found. The problem is that the
service providers are pricing the disks and online time out of the reach
of common people, which of course puts me back to square one in a way.
TK: Why do you need information?
LL: Look, if there is one thing that prevents people from doing things or
pursuing their dreams, its INFORMATION. Not money, not guts, not
anything. With the right information just about everything else can be
obtained with the exception of health and happiness I suppose.
TK: Give me an example.
LL: Okay. If you have ever been up late watching TV and 'ol Dave Del Dotto or
Carlton Sheets or whomever gets on and is trying to sell you their
"courses" on Real Estate, Buying at Government Auctions, etc. then you
know what I am talking about. These guys made millions simply by
obtaining information that the majority of people were not aware of and
put it to use, they could have been anybody.
TK: What types of information do you look for?
LL: Although I always look to learn new ways of how to obtain information in
general, i.e., what new databases are available and how to use them, etc.
I am currently concentrating on scientific data since I am working on my
Master's Thesis and a comprehensive literature search is required to
prevent me from duplicating what has already been accomplished. The
"don't re-invent the wheel" philosophy.
TK: You mention a thesis, what schooling have you had/are pursuing?
LL: I don't want to be too specific, however, I have an undergraduate
engineering degree and am currently in the process of completing dual
Master's degrees, one in Quantum Physics and the other in Engineering.
TK: Sounds heavy, but why be vague, you must have a computer-type or
electrical engineering degree?
LL: No, and I get that a lot from old friends: "You are so good with
computers, why aren't you doing that?" My interest in computers now is
simply to make them calculate equations and do simulations of physical
systems. And to help me get more information.
TK: Let's get back to the H/P subject, there's a few people who have always
contended that you and the guys in LOD really didn't know much of
anything, is that true?
LL: Well I can't speak much about the old members, but their expertise
satisfied me and other members (we would usually vote on new members, I
wasn't a dictator you know). As for me, I realized early on that only
certain people can be trusted with certain information, and certain types
of information can be trusted to no one. Giving out useful things to
irresponsible people would inevitably lead to whatever thing it was being
abused and no longer useful. I was very possessive of my information and
frequently withheld things from my articles. By not providing much data,
some people may conclude that I didn't know anything at all. Its just
that I didn't release it to just anyone and that dismayed various people
probably to the point of lashing out at me and LOD.
Some People to Mention
~~~~~~~~~~~~~~~~~~~~~~
Taran King: You were always hounding me for a Phrack Pro-Phile. Hope
you are enjoying it.
Knight Lightning: Great guy, but how did he get so famous even though he never
even broke into the E911 computer? Sad to see him get
screwed by overzealous "professionals." Wish I had some
money to donate to his defense fund.
The Blue Archer: Always wanted to meet him. I never got a chance to meet him
face to face although I have known him for 8 years. To be
honest, he was better at getting into systems than I was.
Tuc: Always willing to bend over backwards to help you out. I
still use the briefcase he bought me in NYC many years ago.
Paul Muad'Dib: The one in New York. He is one of the smartest people I've
ever met. I hope he is doing something worthwhile.
Bioc Agent 003: Talked to him quite a number of times and met him at TAP
meetings, but we never got to be friends.
Cheshire Catalyst: I still owe him $20. He lent it to me in NYC.
Control-C: A wildman with the women. I hope he gives me his STARGATE
videogame when he gets tired of it. I don't play it every
day like him, but I still can kick his ass.
Phantom Phreaker: He has a spiritual side to him that most people never
realize.
The Videosmith: A fun person with talent. I was sad to see him leave the
scene so early. Met with him in his home state two years
ago just to say hello.
Dr. Who: Here is a guy who loved hacking and exploring systems. I
mean he really enjoyed it. He got quite good at it too.
Telenet Bob: Met him up in Massachusetts at Dr. Who's conference.
Jester Sluggo: Met him up in Massachusetts along with The Sprinter.
Obviously he knew more than he let on even way back then.
Compu-Phreak: I liked listening to his pirate radio station while he
operated it. The FCC never did catch on.
Silver Spy: A very smart guy with a future. Someone who knows when to
stop, but was a little bit panicky at times.
Erik Bloodaxe: Part of the original LOD group. I think he always wanted my
job. I consider him a friend even though we had our
misunderstandings.
Mark Tabas: Part of the original LOD group and sysop of Farmers of Doom
(FOD) for the short time it was up. I hope he isn't in any
trouble again.
Flash Hoser: A fellow information junkie in the Great White North (GWN).
Gary Seven: Probably one of the least known yet talented hackers around
except that I mentioned him in the acknowledgement section
of many of my files. He has since quit.
Digital Logic: Ran a good board for quite a while. An idealist who could
give a great speech. Too bad no one would listen.
The Ronz!: Old friend who no one ever heard of unless they called
Digital Logic's Data Service BBS.
Al Capone: Should have been born a few years earlier so he could have
gotten into hacking when it was fun. He got into it too
late and the risk became a little too high for him.
Quasi Moto: Sysop of Plovernet. Was a good sysop, but not much of a
hacker. Still talk to him on the net.
King Blotto: Known him a long time. Glad he never put me on
TeleTrial!
The Mentor: A fantastic writer. He ran a great board (Phoenix Project).
The last time I talked to him was a few years ago, but he
wasn't very talkative. I think he fell for the 'ol Lex is a
rat rumors.
The Leftist: I hitched a ride with him to one of the SummerCons in
St. Louis. Haven't talked to him since his trouble began, I
hope he's cleaned up his act. I thought he was cool until I
heard he was making stuff up about me to the investigators.
The Prophet: A kindlier gentler hacker. Sorry to see him get screwed by
the system.
The Urvile: Met him at SummerCon '89. Definitely seemed to be the type
who you could trust not to screw you over.
Sir Francis Drake: Met him at SummerCon '87. I'm glad I got a chance to.
Sir Knight: What a character.
Shooting Shark: I appreciate the favorable comments he made about me in HIS
Phrack Pro-Phile.
A Few Other Things
~~~~~~~~~~~~~~~~~~
While I'm on the subject of people, there is one thing that I have not see
published in any form, and that's a "Where are they now" type of thing for
ex-hacks/phreaks. Just so people know, there are a number of us who are doing
quite well at lawful pursuits.
For example:
Silver Spy - Completing a Master's Degree in Electrical Engineering.
Knight Lightning - Working to become a lawyer.
The Unknown Soldier - A high level manager at a successful software company.
The Mentor - Creating games at a well known game company.
Jester Sluggo - Working for a 'high technology' company.
The Disk Jockey - Working in the computer business.
Gary Seven - Chief engineer at a radio station.
The Interview With Lex Continues
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TK: In an early issue of Phrack you were referred to by the following:
"There is paranoia and beyond paranoia there is Lex." How do you respond
to that?
LL: Ha Ha, I remember that one. Well of course there is some truth to it.
And the saying, "better paranoid than sorry." is true as you can see since
I am not behind bars... not that I ever did anything illegal of course,
ahem. I should mention that I met two individuals early in my hacking
career that had a significant influence on me, and both are the absolute
epitome of paranoid.
One was "Eliott Ness" who was probably in his late 30's to 40's by the
sound of his voice. He used to call LOD, I met him on a local board. He
was extremely knowledgeable, but always knew when to stop giving general
information, never gave out ANY personal information, and never
communicated for any length of time.
The other guy was "Number 6" from TAP meetings in NYC. I met him a few
times. Six was another older gentleman. He was very calm until anyone
showed up with a camera. Then he "went off" until the camera threat was
negated. This guy had a way of extracting information out of you without
you even realizing what he was up to.
As I recall people would ask him a question and he would simply turn it
around and say, "well, what do you think (or know) about so and so" and
the hapless phreak would spill his guts with Six taking notes and
sometimes making corrections to what the phreak said much to the phreak's
surprise. But Six never really gave out much information although it was
completely apparent to me that he knew a great deal just by the way he
carried himself.
A few phreaks would try to follow him after the TAP meetings, but he
always lost them without ever letting on that he knew he was being
followed. It should be mentioned that paranoia can destroy you (as the
song goes). A number of times I ran into real problems trying to escape
from suspected problems that probably weren't anything to worry about.
TK: What memorable H/P BBSes do you recall?
LL: OSUNY: Caught the tail end when I first started. I was impressed.
Plovernet: That BBS was crazy. Constantly busy since it had hundreds of
active users and Quasi Moto let everyone post whatever they
wanted and never deleted messages unless there was no disk
space left. We helped start the "philes" trend there also.
It was easy to spot who knew what they were talking about so I
invited them onto the LOD BBS. Some of the people on the LOD
BBS were then asked to join the now infamous LOD group.
TK: (*Interrupts*) Did you ever think the group you started would become a
household name in security and hack/phreak circles?
LL: Although I knew the guys in the group were good hacks/phreaks, I had no
clue of where it was leading. Since we did not tolerate destructive/
malicious behavior nor things like credit card fraud I did not think there
was much risk in the group as a whole getting any real attention. Of
course, all that changed with time.
TK: Sorry for the interruption. Please continue.
LL: Metal Shop Private: The users were idealistic and good natured which was
refreshing. I liked it most because it was a good
source of information/files and we were the first to
see new Phrack issues.
Farmers Of Doom: Mark Tabas did a fantastic job with this one. It was
quite busy, but did not remain up very long.
Phoenix Project: Again, another fantastic job. The Mentor had some
rather unconventional ideas like letting security people
on, which I thought was a good idea.
RACS III: Tuc didn't give me the time of day at first, but eventually I
got on. Then he took it down.
Pirates Cove: The board in 516 (Long Island, NY). One of the classics.
It's where I met Emmanuel Goldstein and invited him onto
Plovernet to help sell 2600 subscriptions.
Catch-22: Absolutely positively the most secure BBS I ever encountered.
Besides passwording subboards along with requiring users to
have a high enough security level to access them, it made use
of many concepts from the "basic security model" introduced by
Lampson and later augmented by Graham and Dorothy Denning. Of
course Silver Spy and I had no clue what an access matrix was
and things of that nature. A duress password was implemented
so if someone got nailed they could enter the password, not
compromise the system, yet appear as to be cooperating with the
authorities who we presumably thought would ask the hacker to
call. It was never used but nice to have.
BlottoLand: Good board for a while, but he let too many of his "loyal
subjects" on the system who were locals and they eventually
overran it.
TK: Do you REALLY think you are ELITE or what?
LL: I really don't know how anyone got the idea that I considered myself
elite. The only people who said I thought I was elite were those who I
never met or talked to. Contrary to some people's belief, I never
considered myself as elite. I was just a guy who liked to pass
information on to others so I wrote some files. The files did help me get
access to more information by making me more well known. When I read the
newspaper, I'm one of those annoying people who keeps interrupting your
breakfast to tell you details about all the neat stories.
TK: Speaking about the group, what do you think about Erik Bloodaxe and others
starting ComSec Data Security?
LL: When I first called Bloodaxe after I saw them in the papers/magazines he
thought I would be mad, maybe that he took my idea or something. I told
him I am familiar with the computer security consulting business and don't
want any part of it. It's too tough to get people to pay money for
something that they cannot get a verifiable return on their investment.
Besides, getting them to trust you with their inner most secrets is
extremely difficult.
I told ComSec to write articles about security until their fingers fell
off. Legitimize themselves as soon as they can. There was too much
prejudice out there against them with ComputerWorld leading the pack. I
really think they could have helped some companies if given a chance. But
I don't think they had enough knowledge about the whole security picture,
i.e., Physical Security, Environmental Systems (fire suppression, UPS,
etc), Administrative Security (Hiring/firing policies, etc.), what goes on
in big IBM shops MVS, CICS, ROSCOE, etc. There is a lot involved.
TK: How did you feel when Knight Lightning and Phrack erroneously insinuated
that you might have informed on other hackers, maybe even the Atlanta
Legion of Doom members a few years ago?
LL: Well as you now know, Craig (KL) has seen all the documents and records
from his trial and many documents from the Atlanta case and there was no
mention whatsoever of me in regards to providing information, being a
witness, testifying, etc.
Although I haven't talked to the Atlanta guys since before their trial I
am sure they know I had absolutely nothing to do with what happened to
them. The real story has since come out. If there is one thing I hate,
it's being accused of something you didn't do.
If someone does something they are accused of, he should be man enough to
admit it. I have said this before a number of times, I have never
provided information to anyone about other hacks/phreaks that directly nor
indirectly led to them being visited, arrested, or prosecuted. It's just
not my way. What goes around comes around and that kind of boomerang is
something I knew I didn't want to play with.
My success in avoiding trouble is fairly straightforward: Most of all it
was secrecy and misdirection (ala Stainless Steel Rat), avoiding phone
company computers especially those in which I was a customer of (i.e., my
local RBOC) because if you get THEM pissed at you, they'll get you one way
or another. Also, lots of LUCK and not intentionally making any enemies
although there have been a few hackers mad at me whom I never even talked
to and I have no idea as to why they didn't care for me.
TK: Do you have any advice for people out there who may want to begin hacking
or phreaking?
LL: I am not one to dictate what people should or should not do, but I
wouldn't if I were them. The technology to prevent and detect security
breaches and then to track down their source is ever improving. The
Cuckoo's Egg (by Cliff Stoll) provides a good example of that. But that
shouldn't even come into the picture.
I think they should examine objectively why they want to do it. Then make
an honest attempt at finding other legal ways to accomplish whatever they
were trying to do. I don't care how you justify it, its dishonest.
Forget about the law part of it. It just causes other people problems. I
didn't know how much until my school's systems were hacked and I was
unable to read my e-mail for a week. I was angry and thought to myself
that I'd like to get my hands on that asshole hacker. Then I laughed for
quite awhile realizing what I was thinking and the irony of it all.
Poetic justice I suppose. None of my data was touched, but I was denied
service and denial of service can be just as damaging. As for the
challenge of it, well I can't deny that that was very addicting, but there
are many legal ways to challenge yourself.
TK: What conventions/involvements outside of phone calls have you done?
LL: TAP meetings were probably the first. Then a Con in Massachusetts, the
Con in Philly with Videosmith et al. and of course the few SummerCons
(1987 and 1989) in St. Louis. There were some computer security
conferences that were interesting also. Those helped to sensitize me to
the "other side."
TK: I remember at SummerCon '89 that you were accidentally caught on video
tape for about 2 seconds and requested that it be erased, which it was.
What is the deal with cameras?
LL: It may sound a little odd, but I don't think anyone has the right to take
another person's picture without their permission. Especially when the
person who is on film has no idea where the picture will end up.
I predict within 5-10 years maximum that states will start using video
cameras to digitize your picture when you go for a new driver's license.
The digitized image will be stored with the rest of your personal
information and probably be available to people like private investigators
and others who gain access to the information illegally. With ISDN,
Multi-Media, etc., it will be possible to "set up" people very easily by
altering images via computers, etc. to make them look like they are doing
just about anything you can think of. When things like that start to
happen I will not look crazy but smart, at least to my friends who think
my avoidance of cameras is abnormal.
Most Memorable Experience
~~~~~~~~~~~~~~~~~~~~~~~~~
TK: What are your most memorable experiences (funny things that happened to
you during your phreaking/hacking or not so funny)?
LL: Dr. Who in Massachusetts had a conference in which me, Tuc, and The
Videosmith drove up at 4 AM in Tuc's VW Beetle hydroplaning all the way
due to the rain, and dead tired. We were all in a silly mood and had a
lot of laughs.
Also, the time when I was in NYC with Paul Muad'Dib and we had no money to
eat. He was the first person I know of who had any real knowledge of
phone company switching systems. He engineered a switch in Manhattan to
put call forwarding on a pay phone. Once this was done, all the money put
into the phone would remain in the phone but would not drop into the coin
box. Those who put money in didn't really have to since the phone was
converted to a POTS (Plain Old Telephone Service). Alas, humans are
creatures of habit. So after a couple of hours (since it was a busy
phone) he had the guy put the phone back to the way it was. When this was
done, all the money held in the phone was returned. It was like hitting
the jackpot in Las Vegas. We then proceeded to McDonald's.
The story about me running around naked in a Motel 6 parking lot that
Control-C has tried to get people to believe is, of course, grossly
exaggerated. His girlfriend hooked me up with a friend of her's. Dan and
his girl were in another room. He called me to come over, but I was in my
underwear. We had been drinking so I ran the 8 feet or so to his room (we
were on the 2nd floor with a solid balcony so no one from the ground could
see anyway), I said hello and then ran back to my room to go another
round.
Probably my favorite memory is relatively recent. J.J. Bloombecker,
Director of the National Center for Computer Crime Data, spoke at my
school. I sat in the very back as usual (I hate to have anyone sitting
behind me, anywhere) in a room of about 40 people and listened to his
speech which basically was to promote his book, "Spectacular Computer
Crimes." I spoke to him but never let on who I really was. He talked
about Craig's (Knight Lightning) case and then he went on about whomever
named LOD, the Legion of Doom, should have named them something like the
"Legion of Ineffectual Pansies." The reason being that, what prosecutor
in his/her right mind would go to a judge and say how dangerous a group of
ineffectual pansies are.
I sat there trying not to blush and thinking that of all the hundreds of
people he said that to, he probably never expected to say it to the person
who really named the group.
I did meet Donn B. Parker, whom I consider the father of computer
security, twice. The first time I just shook his hand. The second time
was relatively recently and we spoke for 20 minutes or so. I never told
him who I really was, not that he would know anyway. But I complimented
him enough so even if he found out, he couldn't have gotten too mad at me.
TK: What were some of your memorable accomplishments (newsletters/files/etc.)?
LL: The REAL accomplishments (non-files) will remain anonymous, but my
favorite files were the IBM VM/CMS series because they were well written
along with the Attacking, Defeating, and Bypassing Physical Security
Devices series. Before I wrote a file I scoured boards and other
traditional sources for the information I sought. If I came up empty
handed, I researched it and wrote about it myself.
Although the COSMOS files helped me get started, they were a complete
joke. They provided enough information to be dangerous and didn't help my
standing with the RBOC's. The VAX/VMS files got better as they
progressed, but except for some of Part III they didn't provide much that
wasn't available in manuals. I enjoy writing, but it usually takes me
many revisions to get it just right. As for newsletters, the LOD/H
Technical Journal is another thing that I was involved in.
TK: What is the story behind the LOD/H Technical Journal?
LL: The LOD/H Technical Journal almost never was. As you are aware, LOD had
gotten a group of files together to be published in PHRACK as an "all LOD
issue," but some of the members thought we should put out our own stuff.
The idea grew on me and I said okay. I should let it be known that you
helped us out for the first issue by spell checking it and performing some
editing and critique. But we were only able to produce 4 issues since it
was difficult in getting quality non-plagiarized or non-highly paraphrased
material.
After the third issue, I realized that I was probably not doing anyone any
favors by exposing security holes and weaknesses in systems. Some people
may not believe hearing this from ME, but I don't agree with those hackers
who think they are doing people a service by exposing their system
vulnerabilities. Nobody needs someone checking their door at night to see
if its locked. And although the old door analogy isn't exactly the same
as the pseudo-physical computer login, its close enough. Sorry about
getting off the subject a little.
TK: That's okay. Why did you quit the H/P community?
LL: I wrote a letter to 2600 Magazine about a year ago that goes into it a
little. Between that and what I've said here, it should be fairly
apparent. In brief, I realized I was mainly in it for the purpose of
getting information. It got too dangerous and I decided to direct my
energy to graduating instead of how to defeat security systems. The
thought processes involved in hacking and those in solving problems in
Engineering Design are remarkably similar and I think my hacking experience
makes me a much better designer and problem solver. Not that I am
advertising for a job or anything...
Lex's Favorite Things
~~~~~~~~~~~~~~~~~~~~~
Women: Without Diseases.
Cars: So fast that you are terrified to put the pedal all the way down to
the floor.
Foods: Anything that does not contain pesticides, herbicides, heavy metals,
radioactive elements, toxic chemicals, harmful microorganisms,
artificial colors, or preservatives. I guess that rules out fish,
produce, meat, processed foods, drinking water, and so on. In other
words there's nothing left to eat. In all seriousness, I do like
great big salads and if I was rich I would have an awesome wine
cellar.
Music: Heavy Metal, some Punk, and Classical.
Authors: Richard P, Feynman, Isaac Asimov, Stephen Hawking, Jane Roberts, Budd
Hopkins, Jacques Valee, Bruce Sterling, K. Eric Drexler, and Matthew
Lesko.
Books: I liked the Cuckoo's Egg, anything about physics, and non-kook
metaphysical books. The only thing I collect these days are books.
I have hundreds of them.
Games: Atari's ASTERIODS DELUXE was probably the most difficult videogame
ever (even though it's more than ten years old) and which I am one of
the best there is at playing it. When it comes to this, I admit I AM
Elite. There's almost no one on this planet who can beat me.
Defender and Stargate are also great. They don't make games like
they used to. And of course, the Ultima series.
Actors: Dana Carvey, Bill Moyers, Patrick Stewart (ST:TNG), Jonathan Frakes
(ST:TNG), Andy Griffith (Matlock), and too many movie stars to
mention.
The Interview Concludes
~~~~~~~~~~~~~~~~~~~~~~~
TK: Is there anyone specifically that you want to say a few things to?
LL: To all those who subscribe to the "Once a thief, always a thief" mentality
and to those few die-hard law people who would love to get their hands on
me and other ex-hackers: Don't bother, people are basically good and can
be "rehabilitated" without going to prison.
LL: The other thing that I have never understood about the hack/phreak
community is some of the obsession with tracking people down. I could
understand it a little better when the reason was to check out others to
make sure they were not feds.
I never compiled lists of who I talked to with anything except their
handle, first name, and phone number. I never CNA'd them for their last
names, or tried to find out where they worked.
But some guys just had to know everything about everyone. Don't they have
anything better to do? I was careful yes, but not to the point of
invading everyone's privacy especially when the person stated they just
wanted to be left alone. I am not saying I NEVER invaded another's
privacy, but I don't now and almost never did it in the past.
I left an Internet mailing address at the beginning of this Pro-Phile so
people can contact me. I don't mind talking to people, but I just don't
think it's fair to harass and threaten people who don't want to be
bothered. I am open to useful and constructive conversations via email,
but I really don't think it's necessary to compile individual's personal
information. I never did it and will never understand why people do it.
Besides, it's no great accomplishment to find people these days. The ways
of getting information are numerous and many are legal, so how much skill
does it really take to get someone's info? Almost none. Anyone can do
it... on just about anyone they want.
TK: What do you think about the future of the hack/phreak world or telecom
communications in general?
LL: As for the hack/phreak aspect, every time I think hacking is dead and
people would have to be deranged to break into computers or make phone
calls illegally for free, I read about another hapless person or group of
people who have done it. Don't they realize there are better and easier
ways of going about whatever they are doing? Don't they realize that the
technology to CATCH you is such that you have lost the fight before you
even get started?
Yes there will be new technologies that will help both sides, but there is
the law of diminishing returns. As for what hackers should be doing, if
anything they should keep an eye on our right to privacy. If it weren't
for hackers, TRW would still be screwing people over (worse than they do
now) and would have never apologized for not correcting invalid credit
information.
TK: And of course the question that no Phrack Pro-Phile does without...
Of the general population of phreaks you have met, would you consider most
phreaks, if any, to be computer geeks?
LL: Absolutely NOT. I don't judge people on how they look anymore (yes I used
to). As The Mentor so eloquently put it in his Hacker Manifesto (Phrack 7
and again in Phrack 14), of which this is, but a lame paraphrase, it's
more important to relate to people on what they know and on their ideas
than what they look like or what color their skin is, etc. And the vast
majority have non-geeky ideas.
TK: Thanks for your time, Lex.
LL: Thank you for letting me ramble on for so long.