The History of Hacking

The History of Hacking

First Came Hardware


Where does one begin a history of hacking?

Do we start with the creation of the computer, by J. Presper Eckert and John Mauchly? During World War 11 this pair of engineer and physicist approached the US Army with a proposal for an electronic device that would speedily calculate gunnery coordinates - a job that was then tediously being done by hand. With the government backing their way, the Electronic Numerical Integrator And Calculator (ENIAC) was born in 1946. It was a year after the war's end - the machine's designed function was now superfluous - but the dream behind its imagined future uses lived on.

Of course, the origin of the computer - the computer for god's sake - the most revolutionary invention since the telephone, can not be so easily summed up in a tidy paragraph of wartime patriotic stupor. The real story goes back further, to Konrad Zuse, whose patent for a general-purpose electromechanical relay computer in 1938 was turned down by the Patent Office as being not specific enough. It may have been ENIAC that spawned the next generation of computers, but ENIAC was a one-task machine. Zuse's contraption had the feel of modernity to it: a machine that would do... anything.

But is that where hacking began? Certainly not. The longing to do... anything has been in the human psyche for ages. Perhaps we should begin with the revolutionary creation of the telephone, culminating with Alexander Graham Bell's historic "accident" on March 10, 1876. The telephone was not an immediate best seller. After all, you couldn't simply buy one and place it in your house and use it. Lines had to be installed. Networks had to be created to link home to home, business to business, and finally, state to neighboring state. Almost thirty years of growth for the phone to spread throughout the country.


YIPL and TAP

So there was the telephone, there was the computer, and there was an undaunted inquisitiveness in the collective human subconscious. It took another war to shake that curious imagination loose onto the world, and on May Day, 1971, the Youth International Party Line became the newsletter of the fun-seeking, disenfranchised riffraff of New York City's Greenwich Village. Abbie Hoffman and a phone phreak who went by the handle Al Bell used YIPL to disburse information about cracking the phone network. It was the first instance of subversive information of its kind finding a wide audience. Subscriptions to the journal spread the word of this arm of the underground far away from Bleecker Street to people of all walks of life. Today this distribution would be done by computer, and indeed, a great deal of hacker/phreaker/anarchist material surfs around the world on the invisible waves of cyberspace.

A few years after YIPL's inception, it became TAP - Technological Assistance Program - when the goals of the phreaks collided with the more politically-minded members of YIPL. TAP was more technical than partisan, and more suited for hackers and their kin.


Computer Crime

The first recorded computer abuse, according to Donn B. Parker, a frequent writer on computer crime, occurred in 1958. The first federally prosecuted crime identified specifically as a computer crime involved an alteration of bank records by computer in Minneapolis in 1966. Computers were not so widespread then as they are now, and the stakes weren't quite so high. It's one thing to have money controlled and kept track of via computer; it's quite another to have power controlled in this way. In 1970, many criminology researchers were stating that the problem of computer crime was merely a result of a new technology and not a topic worth a great deal of thought. Even in the mid-1970s, as crimes by computer were becoming more frequent and more costly, the feeling was that the machines themselves were just a part of the environment, and so they naturally would become a component of crime in some instances. It doesn't matter if a burglar carries his loot in a pillow case or a plastic bag - why should the props of the crime determine the way in which criminologists think about the case? This was an unfortunate mode of thought for those charged with preventing computer crimes, because while research stagnated, the criminals, crackers and hackers were actively racking their brains to come up with more ingenious methods of doing things with computers they were not sup-posed to be able to do. The criminologists could not have realized then that the computer really was an integral part of the crime, and that the existence of these machines - and the systems built around them - led to whole new areas of crime and thinking about crime that had never before been explored.

Lawmakers and enforcers, however, finally did sit up and take notice. In 1976 two important developments occurred. The FBI established a 4-week training course for its agents in the investigation of computer crime (and followed it up with a second course for other agencies in 1978). Also in 1976, Senator Abraham Ribicoff and his U.S. Senate Government Affairs Committee realized that something big was going on, and it was important for the government to get in on it. The committee produced two research reports and Ribicoff introduced the first Federal Systems Protection Act Bill in June, 1977. These reports eventually became the Computer Fraud and Abuse Act of 1986. Florida, Michigan, Colorado, Rhode Island, and Arizona were some of the first states to have computer crime legislation, based on the Ribicoff bills that had developed into the 1986 Act.

A year before, a major breakthrough was announced at the Securicom Conference in Cannes by a group of Swedish scientists who had invented a method of silently eavesdropping on a computer screen from a far-off distance. But let's save this story for later. Much later.


2600

Tom Edison and Cheshire Catalyst, two phone phreaks who had been interested in the nether side of technology for ages, took over TAP in the late 70s. The journal came to an end before its time in 1983 when Torn Edison's New Jersey condominium burned to the ground, the victim of a professional burglary and an amateurish arson. The burglars had gotten all of Tom's computer equipment, the stuff from which TAP was born. The arson, perhaps an attempt to cover the burglary, did not succeed. It was a sloppy fire, one which Tom and Cheshire hypothesized had been engineered by some irate phone company officer. A few months later, the original TAP printed its final issue. The following year, in 1984, hacker Eric Corley (aka Emmanuel Goldstein) filled the void with a new publication: 2600 Magazine. Ironically, Goldstein is more a rhetorician than a hacker, and the magazine is less technical and more political (like the original YIPL).

Networks were being formed all over, enabling hackers to not only hack more sites but to exchange information among themselves quicker and more easily. Mo needs published magazines? The City University of New York and Yale University joined together as the first BITNET (Because It's Time NETwork) link in May 1981. Now there are net-works of networks (such as Internet) connecting the globe, putting all hackers and common folk in direct communication with one another.


WarGames and Phrack

A hacker named Bill Landreth was indicted for computer fraud in 1983, and convicted in 1984 of entering such computer systems as GTE Telemail's electronic mail network, and reading the NASA and Department of Defense correspondence within. Naughty boy! His name will come up again. 1983 also saw the release of WarGames, and all hell broke loose. Certainly there had been plenty of hacker activity before the movie came out, but previous to WarGames those hackers were few in number and less visible. The exciting story of David Lightman (played by Matthew Broderick), a school-age whiz kid who nearly starts World War 111, became the basis for many modems for Christmas presents that year. Suddenly, there was a proliferation of people on the hacking scene who were not really hackers in expertise or spirit. Bulletin board systems flourished, and a large number of boards catering to hackers, phreaks, warez dOOds (software pirates), anarchists, and all manner of restless youth sprung up.

The online publication Phrack was founded on November 17, 1985, on the Metal Shop Private BBS in St. Louis, Missouri, operated by Taran King and Knight Lightning. The term "online" referred to the fact that this magazine was distributed, not at newsstands and through the mails, but on the finews racks" of electronic bulletin board systems, where collections of files are available for the taking. Later, when the journal's founders went off to college and received Internet access, the publication was distributed through list servers which can automatically e-mail hundreds of copies of the publication throughout the world. Phrack is still distributed in this way. As the name implies, Phrack deals with PHReaking and hACKing, but it also is pleased to present articles on any sort of mischief-making. Annual conventions, hosted by Phrack, called SummerCons, are now held in St. Louis.


Shadow Hawk

Bill Landreth, who had been arrested in 1983, was let out on parole and there are reports of his mysterious disappearance following publication of his guide to computer security called Out of the Inner Circle. He left a note stating that he would commit suicide "sometime around my 22nd birthday..." There was much discussion about all this. Was it a publicity stunt, or for real? Eventually Landreth reappeared in Seattle, Washington, in July, 1987, and he was hastily carted back to jail for breaking probation.

The month before - on the anniversary of D-Day - a cracker named Shadow Hawk (also identified by some press reports as Shadow Hawk 1) had been discovered by an AT&T security agent to be bragging on a Texas BBS called Phreak Class-2600 about how he had hacked AT&T's computer system. Shadow Hawk (really Herbert Zinn of Chicago) was an 18-year-old high school drop-out when he was arrested. He'd managed to get the FBI, the Secret Service, the Defense Criminal Investigative Service and the Chicago U.S. attorney on his tail for not only the above mentioned hack, but also for invading computers belonging to NATO and the US Air Force, and stealing a bit over $1 million worth of software. Shadow Hawk's case is important because in 1989 he became the first person to be prosecuted under the Computer Fraud and Abuse Act of 1986.

Shadow Hawk is just one example of how this hobby has gotten people in trouble with the law. Around this time there were a lot of hackers being brought down by all manner of cops: security officers for the telephone companies and other organizations, the FBI, local police and concerned citizens. This was the time when the investigators got smart. Not that they suddenly knew more about computers and hacking, but now they understood that to catch a lion, one must step into its den. These police agents started logging onto hacker BBSs and amassed huge dossiers on the people who normally used those boards. Many warnings were issued, and many arrests were made.

In August, 1986, Cliff Stoll first set out to find out why there was a 7,50 imbalance in the computer accounts at the Lawrence Berkeley Laboratory in California. Stoll's efforts led to the discovery of a group of German hackers who had broken into the computer system. In October, 1989, a book about Stoll's exploits called The Cuckoo's Egg was published and became an instant best seller.

Organized and independent hacker activity continued for the next few years with little public interest. There were threats in early 1988 by the West Berlin Chaos Computer Club that they would trigger Trojan horses they had implanted into NASA's Space Physics Analysis Network, thus causing the chaos of their name. The threats never materialized but minor havoc was wrought anyway, as many computers were temporarily pulled from the net until the threat could be analyzed.

The end of 1988 - November 2, to be exact -marked the beginning of a new surge in anti-hacker sentiment. It was then that Robert Morris Jr.'s computer worm began its race through the Internet. Exploiting an undocumented bug in the send mail program and utilizing its own internal arsenal of tricks, the worm would infiltrate a system and quickly eat up most or all of the system's processing capabilities and memory space as it squiggled around from machine to machine, net to net.




The whole article has been extracted from The KNIGHTMARE's book: Secrets of a Super Hacker.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了