The Link 12 CD Review

From C64 Diskmag Wiki
Revision as of 22:16, 12 January 2013 by Jazzcat (Talk | contribs)

(diff) ←Older revision | view current revision (diff) | Newer revision→ (diff)
Jump to: navigation, search
             *************
             * CD REVIEW *
             *     by    *
             *  NEPTUNE  *
             *************


i have not bought any new music lately,
so i wasn't sure what to do for this
chapter. anyway, i eventually decided
to review a book, which is totally
irrelevant to the whole idea of a "cd
review", but then i'm a pretty irrelev-
ant sort of guy. and i know it's a book
you'll all be interested in, so......
            APPROACHING ZERO
 data crime and the computer underworld
----------------------------------------

which one of us could resist a book with
a title like that? i knew straight away
it was going to be good. it was only
published last year, so it's fairly
up-to-date; and it is the type of book
that drags you in right from the start.
i could hardly put it down: i read the
whole lot in one weekend, and i wouldn't
mind reading it again straight away, if
i had time. so i'd better tell you a bit
more about it...
basically the book traces the evolution
of the computer underworld from its very
origins to the present day. in case you
were wondering, it does NOT have any-
thing to do with the scene we are a part
of: it is more to do with the ILLEGAL
side of things: hackers, virus writers
etc.

surprisingly, the whole thing started
with an activity still known as "phreak-
ing": cheating the phone system to get
free calls. the hacker underworld grew
out of a society of experienced phreak-
ers. and as we know, this type of thing
is still going on amongst computer-based
societies such as ours: just ask telecom
about that 0014 number!

this is where the book begins its hist-
ory of the hacker underworld: with a
chapter called "phreaking for fun". it
tells of activities which many of us are
ourselves involved in: using freecall
numbers which are supposedly "secret",
the use of blue boxes (devices which
emulate the tones used by the phone
system); and other related amusements
such as free conference calls etc. the
phone system is described as a "giant
electronic playground", and some of the
technological feats which the more exp-
erienced phreakers accomplished are
incredible.

probably the most amazing was a stunt
executed by a phreaker known as captain
crunch. one of his specialties was
stacking up calls from one switching
office to another. in this case, he took
his equipment to a phonebooth in la,
where he dialled through to tokyo, which
connected him to india, and then on to
greece, from greece to south africa,
from south africa to south america, and
then to london, through to new york, and
finally to an la operator who dialled
the phonebooth NEXT TO HIS! when he
picked it up and yelled, he could hear
the echo of his voice on the other phone
as it travelled in a circle around the
planet. he even repeated the same trick
using a communications satellite to
bounce his voice through space, and back
to the booth next to him! of course, it
was totally useless, but it was a huge
thrill to achieve something like that.

gradually phreakers like captain crunch
came to know each other and work
together, often communicating with each
other through free conference calls.
and as the book points out, out of these
groups of "technological junkies" grew
the hacker society. as the authors put
it, "the two groups merged neatly into
one high-tech subculture".

so the book now describes the activities
indulged in by hackers: there are var-
ious stories about famous incidents in
which hackers have been involved. back
in 1984, a group of british hackers
actually managed to break into prestel,
a computerised information service run
by british telecom. pretty soon the
foreign exchange page of prestel listed
the exchange rate as "1 pound = 50
dollars"! the surprising thing was how
easy this was to do: when asked for a
four digit code, the hacker tried typing
"1234".... and was allowed straight into
the system.

however, the book details many hacker
activities which are far more serious
than simple pranks. there are plenty of
stories of hackers breaking into credit
card agencies and copying out numbers...
which they then traded with each other
and often ran up huge bills with their
purchases. there is the story of one of
the most notorious cases of hacking in
history, the "illuminati conspiracy",
in which us military computers were
pried for information which was then
sold to the russians. (incidentally, a
whole book has been written about this
particular case: "the cuckoo's egg", by
clifford stoll, and it's quite good too)
and finally there's the story of the two
hackers (whose identities are still
unknown), who claimed to have cracked
the computers responsible for a certain
bank's EFT, or electronic fund transfer.
they apparently carried on the scheme
every day for a week, and at the end of
that week they each earnt $66000 in
cash.

apart from hacking, the other main ill-
egal activity described in the book is
virus writing. as far as i'm concerned,
writing a virus is a pretty useless and
destructive thing to do: unlike hacking,
which as we've seen can be VERY profit-
able! but after reading this book, and
seeing the extent of the virus problem,
i'm glad i don't own a computer that's
prone to this type of threat. the worst
part is the sheer number of viruses:
there are just so MANY, and so many
different types, that it's hard to see
how we can fight the problem at all. the
book claims that even now, there would
be about 5 million virus-infected disks
in the world: and not only is this
number growing, but the RATE at which
it's growing is growing! the people who
make the programs which scan for viruses
can't keep up with the constant flow of
new infections: one programmer in bang-
kok has reportedly set up his computer
to produce SIX HUNDRED viruses every
hour!
one of the worst culprits is a bulgarian
virus writer known as the DARK AVENGER.
he appears to be one of the most intell-
igent - and most dangerous - of his
kind. all of his viruses are hard to
detect, highly contagious, and deadly:
usually doing something like wiping the
hard disk clean.

think for a minute about how a virus
scanner works. what it does is to search
disks for a small piece of data: a few
lines of code, or a text string... that
is known to be part of a certain virus.
if it finds that string, it knows that
the disk is infected.

what the dark avenger has done in one
of his most recent viruses is to produce
a bug that ENCRYPTS itself every time it
is spread to another disk. he claims
there are FOUR THOUSAND MILLION differ-
ent ways in which it can be encrypted.
this means that this virus is virtually
UNDETECTABLE.

the sections on viruses were probably
the scariest part of the whole book.
hacking and phreaking are mainly good,
clean fun (even if they ARE illegal):
but, if the virus problem is as serious
as this book claims, then we could be
headed for a state where important comp-
uters worldwide begin to suffer. it's
only a matter of time before one of
these bugs infect a military computer, a
computer at a hospital... the possibil-
ities are frightening.

anyway, with a few kilobytes of text i
really can't hope to describe this book
completely. i've outlined the main areas
it covers, and some of the more interes-
ting anecdotes it contains, and i hope
you're interested enough to read it
yourself. like i said, i found it one of
the best books i'd read in a long time.

so, some extra info:

APPROACHING ZERO: data crime and the
                  computer underworld.

authors: bryan clough and paul mungo.

publisher: faber and faber, 1992.

isbn: 0-571-16850-7 (with this number
                    you can order a copy
                    through most shops)
the bibliography also contains some
interesting titles:

THE HACKER'S HANDBOOK  hugo cornwall

       publisher: century communications

BEATING THE SYSTEM  owen bowcott and
                       sally hamilton
       publisher: bloomsbury

THE CUCKOO'S EGG    clifford stoll
(a good book)
              publisher: doubleday

and some other sources i've dug up which
you might like to see if you're inter-
ested in hacking:

HACKERS  by steven levy, 1984.

2600
the quarterly journal of the american
hacker.
po box 752
middle island, new york usa
11953-0752



REALITY HACKERS / MONDO 2000 (another
po box 40271                magazine)
berkeley
california usa
94704

all of these should make interesting
reading. that's all from me for now:
next month, i might actually review a
cd!                      /neptune.
----------------------------------------
PS. don't forget to send to my addy for
    swapping: also, i can now be con-
    tacted via email on internet:
 c9326542("at")wombat.newcastle.edu.au
Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox