mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-10 22:33:58 +02:00
428 lines
20 KiB
Plaintext
428 lines
20 KiB
Plaintext
|
||
|
||
=====================
|
||
|
||
What Is A Hacker ?
|
||
|
||
=====================
|
||
|
||
|
||
In the last year or so there has been a virtual deluge of books on
|
||
hackers and hacking. Even movies were based on the subject. The
|
||
electronic hacker requires a greater knowledge base than a computer
|
||
hacker. It requires a working knowledge of computing and a good
|
||
knowledge of electronics. Indeed there has been an influx of
|
||
computer hackers to the ranks of electronic hackers. My comments in
|
||
the last volume are still applicable as they relate to the electronic
|
||
hacker rather than the computer hacker.
|
||
|
||
|
||
Many of the books on computer hacking seek to, and in some
|
||
cases actually do, identify the main traits of hackers. Indeed some of
|
||
them such as "The New Hacker's Dictionary" do an excellent job.
|
||
Electronic hackers are more difficult to quantify. I do not think that
|
||
anyone has actually tried to properly define what an electronic hacker
|
||
is.
|
||
|
||
|
||
As Electronic hackers are rarer than computer hackers, this is an
|
||
exceedingly difficult thing to do. As an electronic hacker, I am in a
|
||
better position to comment on the main traits required for this type of
|
||
hacking. Much of the comments that follow apply equally to computer
|
||
hackers. These comments may be offensive to some of the
|
||
pseudo-intellectual sociologists reading this.
|
||
|
||
|
||
There is no such thing as an average hacker. A hacker by nature
|
||
will be above average intelligence. Out-thinking is a pastime that
|
||
generally restricted to those with above average intelligence. Since
|
||
the level of electronic knowledge required for hacking is high this
|
||
would tend to restrict hacking as a hobby to technicians and
|
||
engineers or at the least a person with a good knowledge of
|
||
electronics.
|
||
|
||
|
||
Another interesting aspect in hacking is that all of the top electronic
|
||
hackers and most of the average electronic hackers in Europe are
|
||
male. This is not a surprising thing. Advanced hacking requires
|
||
phenomenal visio-spatial abilities and the ability to grasp complex and
|
||
extremely abstract Concepts. These are specifically male traits. Any
|
||
feminists reading this may be offended. Don't blame me, blame God.
|
||
He designed the Human race.
|
||
|
||
|
||
There appears to be one common factor in the background of
|
||
electronic hackers - an interest in electronics prior to third Level
|
||
education. Some hackers look down on engineers as blow-ins. The
|
||
majority of engineers only decided to do engineering on entering third
|
||
level education. Or in some cases their parents made the decision for
|
||
them. For some of them engineering is only a job. They probably did
|
||
well in exams all throughout their academic careers because they
|
||
could memorise some fact or text and regurgitate it on an exam
|
||
paper. An electronic hacker will have a fascination with electronics
|
||
and it is this fascination with electronics that these paper engineers
|
||
lack. Luckily these paper engineers do not last very long in electronics
|
||
and find other positions that suit them. In the early eighties, one paper
|
||
engineer told me that it was impossible for a mere mortal such as
|
||
myself to design a satellite receiver system. He also said that satellite
|
||
television was never going to be used on a widespread basis. The
|
||
chap now sells shirts for a living!
|
||
|
||
|
||
As the electronic hacker has had previous experience in electronics,
|
||
they will not do well in third level education. Most will drop out
|
||
of their course because they become bored with what they are being
|
||
taught. In this respect, the above average intelligence of the hacker is
|
||
a disadvantage. Most of the third level courses in electronics will be
|
||
like a mental straight jacket to the hacker. Most non-hacker readers
|
||
will automatically think that just because a hacker has above average
|
||
intelligence he will just get on with the course. Unfortunately it is
|
||
never as simple as this. The average academic year is thirty-six
|
||
weeks long. If you could complete this course in three weeks would
|
||
you hang around for the other thirty three weeks?
|
||
|
||
|
||
There are probably readers who think that hacking is a crime in the
|
||
sense that it is theft of service. The legislation varies from country to
|
||
country. Some countries in Europe, such as France and Ireland have
|
||
rather draconian laws against piracy.
|
||
|
||
|
||
As the moral kind of reader regards hacking as a crime, he or she
|
||
may not try to hack. The attitude of a hacker is totally different. A
|
||
hacker would generally know that hacking is a form of theft of service
|
||
but would not really be too concerned. The moral and ethical
|
||
conditioning that society imposes has a greater effect on those with
|
||
average intelligence, after all the morals and ethics are generally
|
||
created by those of average intelligence. When one is of above
|
||
average intelligence, there is often a feeling of not belonging. This
|
||
feeling of not belonging results in a sort of intellectual arrogance
|
||
where the individual concerned decides that the normal morals and
|
||
ethics do not apply to him as he is not normal. This is of course an
|
||
extreme example but a milder form of this decision would explain the
|
||
attitude of most hackers to the moral aspect of hacking. The vast
|
||
the moral and ethical aspects are suspended. All's fair in love, war
|
||
and business.
|
||
|
||
|
||
In my opinion, anyone involved in hacking for purely experimental
|
||
reasons should not be prosecuted. It is disgusting that people who
|
||
are often critical thinking addicts or at least are not involved anything
|
||
creative, should decide to hassle experimenters. (This of Course
|
||
excludes criminal lawyers who are among the most creative
|
||
experimenters known.) These people do not apparently recognise
|
||
that all of the major inventions were made by experimenters and if it
|
||
wasn't for experimenters Humanity would still be swamp slime.
|
||
|
||
|
||
On some of the computer bulletin boards, the good and evil of
|
||
experimental hacking has been debated. The most often proposed
|
||
argument on the evil of experimental hacking is that it is shop lifting in
|
||
a different guise. I do not agree with this. It is, to use another analogy
|
||
often quoted by anti-hackers, like saying that guns kill people. The logic
|
||
is flawed.
|
||
|
||
|
||
Incidentally guns do not kill people, bullets do. The whole objective
|
||
of hacking is to hack the system and not to get the programming for
|
||
free. That is piracy. The proponents of the argument do not
|
||
differentiate between hacking and piracy.
|
||
|
||
|
||
If there is one thing that really gets to me it is the high moral tone
|
||
adopted by the anti-hacker campaigners. They make it sound like
|
||
hackers are some kind of sub-human scum. It is almost as it these
|
||
anti-hacker campaigners are jealous of hackers. To them hackers
|
||
represent FUAD. This stands for Fear Uncertainty And Doubt. The
|
||
anti-hackers fear what the hacker can get up to. They are uncertain
|
||
just what the hacker can do and they are doubtful whether they can
|
||
match up to the hacker's abilities and talents.
|
||
|
||
|
||
Almost every hacker regards hacking as a game in which their
|
||
mindpower is pitted against that of the system designers. It is a battle
|
||
of intellects. That is the attraction. Some of the paper engineers
|
||
mentioned earlier would like to think of themselves as hackers but
|
||
they are not. It is often a paper engineer that claims that a system is
|
||
invincible. There is nothing more satisfying to a hacker than smashing
|
||
an "invincible" system that was designed by one of these paper
|
||
engineers.
|
||
|
||
|
||
|
||
The Hacking Hall Of Infamy
|
||
==========================
|
||
|
||
The following is an examination of some of the mistakes and @
|
||
general screwups that have led to serious hacks. Many of them are
|
||
due to non-technical people underestimating the risks that their
|
||
systems faced. In some of the cases, it was not fault of the people
|
||
involved. They either had not been properly briefed or had been
|
||
briefed by JAFAs. Ignorance may not be a crime but it can be fatal.
|
||
|
||
|
||
|
||
VideoCipher is Tamperproof And Undefeatable (sic)
|
||
=================================================
|
||
|
||
Perhaps the stupidest and most ignorant statement ever made
|
||
about a scrambling system was made in 1986 about VideoCipher.
|
||
Specifically VideoCipher 11, the planet's most hacked system.
|
||
|
||
|
||
The VideoCipher system is a very sophisticated system, tamper-
|
||
proof and undefeatable." Naturally this quotation came from a
|
||
marketing person. Now what was unbelievable about this quotation
|
||
was that there was a confirmed hack on the system in June 1986.
|
||
Apparently the news had not reached VideoCipher.
|
||
|
||
|
||
|
||
BBC Vs Hi-Tech
|
||
==============
|
||
|
||
In the UK, piracy has been highlighted by a number of cases, the
|
||
most notable being the Hi-Tech XtraVision case. The BBC attempted
|
||
to stop the UK descrambler manufacturer, Hi-Tech XtraVision
|
||
manufacturing and selling descramblers for the BBC Europe service
|
||
via Intelsat VA-F71 at 27.5 West. The original ruling an the case
|
||
stated that the UK Copyright Patents And Designs Act 7988 was not
|
||
usable in the case as it was badly framed. The end user of the
|
||
descrambler was outside UK jurisdiction and so UK law was not
|
||
applicable. It was overturned on appeal and Hi-Tech XtraVision
|
||
decided not to defend.
|
||
|
||
|
||
|
||
BBC Pressures Elektor Electronics
|
||
=================================
|
||
|
||
A stupid event accrued earlier in 1990 involving the "Elektor
|
||
Electronics" Magazine. In the February 1990 issue. this magazine
|
||
published the first of a two part constructional article for a SAVE
|
||
descrambler that did not use crystals. The decision to print was taken
|
||
when the first ruling in the Hi-Tech XtraVision case was in force. The
|
||
BBC lawyers then saw the magazine and got upset and threatened
|
||
Elektor. Elektor pulled the March 1990 edition of the magazine. The
|
||
full circuit diagram and theoretical description was already in the
|
||
hands of those who wanted it. Any hacker worth his salt can design a
|
||
printed circuit board. It makes the lawyers and the BBC look like utter
|
||
idiots. They took action after the event occurred and thus drew the
|
||
matter to the attention Of the media. It is not surprising that hackers
|
||
consider some lawyers as being between rocks and bacteria on the
|
||
evolutionary scale.
|
||
|
||
|
||
|
||
FilmNet Bares All
|
||
=================
|
||
|
||
The system owners almost always hold back at least two further
|
||
scrambling levels until the system has been in use for at least six
|
||
months. This is a good tactic as a lot of the inexperienced hackers will
|
||
be caught out when the further level of scrambling is introduced. It is
|
||
also an unwritten rule that the level will be introduced at a time that
|
||
will cause maximum damage to the professional hackers.
|
||
|
||
|
||
The best example of this tactic was Filmnet's introduction of a
|
||
further level of scrambling three days before the 1987 Cable And
|
||
Satellite Show. This left a lot of dealers with egg an their faces as
|
||
they were selling pirate descramblers that did not work. Fortunately
|
||
for some dealers, the three days were enough to update their
|
||
demonstration decoders. FilmNet should have introduced the further
|
||
level during the show for maximum effect.
|
||
|
||
|
||
The show was, in counter-piracy terms, FilmNet's biggest disaster
|
||
A business person representing FilmNet was boasting about how they
|
||
had faked out the hackers. The fact that FilmNet had thirty one
|
||
possible variations to play with was mentioned. Unfortunately one of
|
||
the people who overheard was a hacker.
|
||
|
||
|
||
The FilmNet. representative was unfamiliar with binary. In binary, 0
|
||
is also considered as it is a logical state whereas to the businessman
|
||
it means nothing. In technical terms, FilmNet has five possible levels
|
||
of encryption and thirty two combinations. Since level zero is clear this
|
||
leaves thirty one possible variations. This effectively condemned
|
||
FilmNet to four years of being totally hacked.
|
||
|
||
|
||
All of the subsequent upgrades on the FilmNet system were
|
||
limited. The SATPAC system was so crude that the upgrades were
|
||
often more risky for the official descrambler.
|
||
|
||
|
||
|
||
Sky Advertises Pirate Descramblers
|
||
==================================
|
||
|
||
In late 1990, strange adverts started to appear in the UK satellite.
|
||
television press about the fact that FilmNet decoders were illegal.
|
||
Other scare tactics claimed that the decoders would soon be
|
||
obsolete. There were rumours that Sky were tied in to this advertising
|
||
campaign. On the Dealer Text teletext service on Sky News, (teletext
|
||
page 830), the evils of pirate FilmNet decoder were proclaimed.
|
||
|
||
|
||
On teletext page 441 on Eurosport, there was an actual advert for
|
||
pirate FilmNet decoders. This was rather embarrassing far Sky. Once
|
||
they found out about the advert, they quickly removed the FilmNet
|
||
reference.
|
||
|
||
|
||
Sky, at that time had control over Eurosport. The teletext magazine
|
||
was not assembled by Sky. All Sky did was to transmit a prepared
|
||
teletext magazine. Unfortunately they did not adequately screen the
|
||
advertisements.
|
||
|
||
|
||
|
||
Sky Markets Do It Yourself Piracy Kit
|
||
=====================================
|
||
|
||
Perhaps the stupidest event in counter-piracy history was perpetra-
|
||
ted by Sky's marketing people. Evidently Sky's counter-piracy people
|
||
were not consulted on this. If they had been they would have stopped
|
||
the system dead in its tracks.
|
||
|
||
|
||
In 1990, Sky was locked in battle with BSB. Sky was trying to hook
|
||
as many viewers as possible for the fledgling Sky Movies. Then some
|
||
utter nutter of a marketing genius struck. The scheme was that Sky
|
||
would give three months free viewing of Sky Movies to purchasers of
|
||
IRDs.
|
||
|
||
|
||
The fully active smart cards were bundled with the IRDs. Included
|
||
in the packet was a subscription form for Sky Movies. The logic was
|
||
that typical of business school text books. It totally ignored the real
|
||
world.
|
||
|
||
|
||
The smart cards never reached the purchasers of the IRDs.
|
||
Instead, they were shipped to mainland Europe where they were sold
|
||
for high profits. Often dealers would forget to mention the free viewing
|
||
cards to purchasers of IRDs in the UK and Ireland. Many of the
|
||
purchasers were ignorant of the scheme anyway.
|
||
|
||
|
||
In European magazines, adverts appeared for decoders and smart
|
||
cards. Sky had people trying to track down the sources of the
|
||
companies advertising. This was an essentially futile operation. Sky
|
||
had actually caused the piracy problem. What was unnerving was the
|
||
sheer naivete of those Sky people involved. They actually believed
|
||
that pirates and hackers would play by their rules. Of course Sky
|
||
learnt a valuable lesson from this fiasco and now they try to control
|
||
the distribution of their smart cards.
|
||
|
||
|
||
|
||
Hacking And The Law
|
||
===================
|
||
|
||
It should be made clear that hacking or intercepting services in
|
||
Ireland is illegal. This info may also be illegal as it examines the
|
||
security of scrambling systems. The Irish Broadcasting Act 1990 is
|
||
intended to limit if not eliminate cable and MMDS piracy. It can be
|
||
applied to satellite piracy but requires a ministerial order.
|
||
|
||
|
||
To date there appears to have been no prosecutions for cable
|
||
piracy as in actually hacking the scrambling system. The prosecutions
|
||
that have occurred have been for patching into the cablenet without
|
||
paying. The term used is "Self Connectors". You have got to wonder
|
||
at the Freudian undertones in the mind that dreamt that one up. On
|
||
my local cablenet it has the word "Pirates" in brackets. Apparently the
|
||
term "Self Connectors" originated in Dublin and since there are two
|
||
countries in Ireland, Dublin and the rest of Ireland, it was obviously
|
||
felt that a translation was necessary.
|
||
|
||
|
||
When a new descrambler, official or pirate, comes on the market
|
||
the first thing that happens is that it is "examined". The case is
|
||
opened, the board is extracted and the oscilloscopes, logic analysers
|
||
and multimeters are attached. The first service diagrams for
|
||
descramblers are not issued by the manufacturers. They are issued
|
||
or rather sold by hackers.
|
||
|
||
|
||
It is essential that those who design systems hack the systems
|
||
designed by their competitors. This is the best and only way to learn
|
||
how to make your system secure. The best system designers are also
|
||
good hackers. .
|
||
|
||
|
||
There are some people trying to bring in laws in Europe about
|
||
computer program reverse engineering. The aim is to stop the
|
||
reversing and analysis of computer programs. This has parallels with
|
||
the Blackbox industry. It is unfortunate that those who try to make the
|
||
laws that govern technology are those who are generally least suited
|
||
to the task.
|
||
|
||
|
||
The law is often a few hundred years out of date. Judges are, in
|
||
some European countries, allowed to serve beyond their sell by date.
|
||
To expect them to cope with extremely complex technological
|
||
nuances is a bit much. However there are a few lawyers who
|
||
originally started out as engineers. These people have a good
|
||
understanding of the technology. It is generally their task to crush
|
||
complex technological thoughts into mental baby food in the rare
|
||
cases that actually come to trial.
|
||
|
||
|
||
Where legislation exists to cover hacking, it is usually of the
|
||
blunderbuss variety. It can be used to cover every eventuality. Often
|
||
this legislation is introduced at the behest of interested parties.
|
||
|
||
|
||
For example in Ireland, the Broadcasting Act of 1990 was intended
|
||
to protect cable companies and MMDS operators. Now just who was
|
||
the biggest cable company at that time? Cablelink of course.
|
||
Cablelink was owned primarily by the state via a semi state operator
|
||
or two. The state emphasis on the legislation can be seen in the
|
||
structure of the act. The act does not cover satellite borne
|
||
transmissions without a statutory instrument signed by the minister for
|
||
communications.
|
||
|
||
|
||
There is a trend nowadays to rely less on the law and more on
|
||
secrecy. A company will not patent a new system because it supplies
|
||
a ready source of information for hackers. This is perhaps a more
|
||
sensible approach. There is an aspect of law where a system could
|
||
be declared a trade secret. Some would argue that this offers enough
|
||
protection. To someone abiding by ordinary rules it would. Hackers
|
||
do not abide by such rules and the concept breaches one of the
|
||
prime rules of secrecy - the fewer who know the better the secrecy.
|
||
|
||
|
||
The use of the law in counter-piracy is like a loaded musket. It is
|
||
useful against a single opponent, which by some accident could be
|
||
you. In piracy, a system will be attacked from hundreds of directions.
|
||
In some countries, the UK for instance, the relevant law provides for
|
||
statutory conviction. It would not be feasible to prosecute all the
|
||
attackers. Some may not have the' money to pay the fines. An
|
||
indiscriminate approach would lose the battle for the hearts and
|
||
minds of the users.
|
||
|
||
|
||
Despite all of this there are still some channel executives who think
|
||
that legal methods can be used to stop piracy and or hacking. These
|
||
executives are not technical. Commonly they are products of a
|
||
business or legalistic education. Generally they lose this attitude after
|
||
actually having some hands-on real time experience.
|
||
|
||
|
||
Hacking is an essential item in the evolution of technology. It
|
||
stretches the technology to the limits and then goes one step beyond.
|
||
Many of the advances have been made by hackers. Some top
|
||
professional hackers were among those who were experimenting with
|
||
satellite in its early days.
|
||
|
||
|
||
It is stupid to claim that piracy will be eliminated, for if there was no
|
||
crime then there would be no need for a police force and we'd all be
|
||
vegetarian troglodytes. This is the real world - wake up and smell the
|
||
coffee!
|
||
|