Underground - Suelette Dreyfus (best novels ever .TXT) š
- Author: Suelette Dreyfus
- Performer: 1863305955
Book online Ā«Underground - Suelette Dreyfus (best novels ever .TXT) šĀ». Author Suelette Dreyfus
On 31 August 1988, Blue Thunder faced 22 charges in the Melbourne Magistrates Court, where he managed to get most of the charges dropped or amalgamated. He only ended up pleading guilty to five counts, including deception and theft. The Real Article sat in the back of the courtroom watching the proceedings. Blue Thunder must have been pretty worried about what kind of sentence the magistrate would hand down because she said he approached her during the lunch break and asked if she would appear as a character witness for the defence. She looked him straight in the eye and said, `I think you would prefer it if I didnātā. He landed 200 hours of community service and an order to pay $706 in costs.
Craig Bowen didnāt like where the part of the underground typified by Blue Thunder was headed. In his view, Chunder and Trotsky stood out as bad apples in an otherwise healthy group, and they signalled an unpleasant shift towards selling information. This was perhaps the greatest taboo. It was dirty. It was seedy. It was the realm of criminals, not explorers. The Australian computer underground had started to lose some of its fresh-faced innocence.
Somewhere in the midst of all this, a new player entered the Melbourne underground. His name was Stuart Gill, from a company called Hackwatch.
Bowen met Stuart through Kevin Fitzgerald, a well-known local hacker commentator who founded the Chisholm Institute of Technologyās Computer Abuse Research Bureau, which later became the Australian Computer Abuse Research Bureau. After seeing a newspaper article quoting Fitzgerald, Craig decided to ring up the man many members of the underground considered to be a hacker-catcher. Why not? There were no federal laws in Australia against hacking, so Bowen didnāt feel that nervous about it. Besides, he wanted to meet the enemy. No-one from the Australian underground had ever done it before, and Bowen decided it was high time. He wanted to set the record straight with Fitzgerald, to let him know what hackers were really on about. They began to talk periodically on the phone.
Along the way, Bowen met Stuart Gill who said that he was working with Fitzgerald.4 Before long, Gill began visiting PI. Eventually, Bowen visited Gill in person at the Mount Martha home he shared with his elderly aunt and uncle. Stuart had all sorts of computer equipment hooked up there, and a great number of boxes of papers in the garage.
`Oh, hello there, Paul,ā Gillās ancient-looking uncle said when he saw the twosome. As soon as the old man had tottered off, Gill pulled Bowen aside confidentially.
`Donāt worry about old Eric,ā he said. `He lost it in the war. Today he thinks Iām Paul, tomorrow it will be someone else.ā
Bowen nodded, understanding.
There were many strange things about Stuart Gill, all of which seemed to have a rational explanation, yet that explanation somehow never quite answered the question in full.
Aged in his late thirties, he was much older and far more worldly than Craig Bowen. He had very, very pale skināso pasty it looked as though he had never sat in the sun in his life.
Gill drew Bowen into the complex web of his life. Soon he told the young hacker that he wasnāt just running Hackwatch, he was also involved in intelligence work. For the Australian Federal Police. For ASIO. For the National Crime Authority. For the Victoria Policeās Bureau of Criminal Intelligence (BCI). He showed Bowen some secret computer files and documents, but he made him sign a special form firstāa legal-looking document demanding non-disclosure based on some sort of official secrets act.
Bowen was impressed. Why wouldnāt he be? Gillās cloak-and-dagger world looked like the perfect boyās own adventure. Even bigger and better than hacking. He was a little strange, but that was part of the allure.
Like the time they took a trip to Sale together around Christmas 1988. Gill told Bowen he had to get out of town for a few daysācertain undesirable people were after him. He didnāt drive, so could Craig help him out? Sure, no problem. They had shared an inexpensive motel room in Sale, paid for by Gill.
Being so close to Christmas, Stuart told Craig he had brought him two presents. Craig opened the firstāa John Travolta fitness book. When Craig opened the second gift, he was a little stunned. It was a red G-string for men. Craig didnāt have a girlfriend at the timeāperhaps Stuart was trying to help him get one.
`Oh, ah, thanks,ā Craig said, a bit confused.
`Glad you like it,ā Stuart said. `Go on. Try it on.ā
`Try it on?ā Craig was now very confused.
`Yeah, mate, you know, to see if it fits. Thatās all.ā
`Oh, um, right.ā
Craig hesitated. He didnāt want to seem rude. It was a weird request, but never having been given a G-string before, he didnāt know the normal protocol. After all, when someone gives you a jumper, itās normal for them to ask you to try it on, then and there, to see if it fits.
Craig tried it on. Quickly.
`Yes, seems to fit,ā Stuart said matter of factly, then turned away.
Craig felt relieved. He changed back into his clothing.
That night, and on many others during their trips or during Craigās overnight visits to Stuartās uncleās house, Craig lay in bed wondering about his secretive new friend.
Stuart was definitely a little weird, but he seemed to like women so Craig figured he couldnāt be interested in Craig that way. Stuart bragged that he had a very close relationship with a female newspaper reporter, and he always seemed to be chatting up the girl at the video store.
Craig tried not to read too much into Stuartās odd behaviour, for the young man was willing to forgive his friendās eccentricities just to be part of the action. Soon Stuart asked Craig for access to PIāunrestricted access.
The idea made Craig uncomfortable, but Stuart was so persuasive. How would he be able to continue his vital intelligence work without access to Victoriaās most important hacking board? Besides, Stuart Gill of Hackwatch wasnāt after innocent-faced hackers like Craig Bowen. In fact, he would protect Bowen when the police came down on everyone. What Stuart really wanted was the cardersāthe fraudsters. Craig didnāt want to protect people like that, did he?
Craig found it a little odd, as usual, that Stuart seemed to be after the carders, yet he had chummed up with Ivan Trotsky. Still, there were no doubt secrets Stuart couldnāt revealāthings he wasnāt allowed to explain because of his intelligence work.
Craig agreed.
What Craig couldnāt have known as he pondered Stuart Gill from the safety of his boyish bedroom was exactly how much innocence the underground was still to lose. If he had foreseen the next few yearsāthe police raids, the Ombudsmanās investigation, the stream of newspaper articles and the court casesāCraig Bowen would, at that very moment, probably have reached over and turned off his beloved PI and Zen forever.
Chapter 3 ā The American Connection.US forces give the nod; Itās a setback for your country.
ā from `US Forcesā, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1.
Force had a secret. The Parmaster wanted it.
Like most hackers, The Parmaster didnāt just want the secret, he needed it. He was in that peculiar state attained by real hackers where they will do just about anything to obtain a certain piece of information. He was obsessed.
Of course, it wasnāt the first time The Parmaster craved a juicy piece of information. Both he and Force knew all about infatuation. Thatās how it worked with real hackers. They didnāt just fancy a titbit here and there. Once they knew information about a particular system was available, that there was a hidden entrance, they chased it down relentlessly. So that was exactly what Par was doing. Chasing Force endlessly, until he got what he wanted.
It began innocently enough as idle conversation between two giants in the computer underground in the first half of 1988. Force, the well-known Australian hacker who ran the exclusive Realm BBS in Melbourne, sat chatting with Par, the American master of X.25 networks, in Germany. Neither of them was physically in Germany, but Altos was.
Altos Computer Systems in Hamburg ran a conference feature called Altos Chat on one of its machines. You could call up from anywhere on the X.25 data communications network, and the companyās computer would let you connect. Once connected, with a few brief keystrokes, the German machine would drop you into a real-time, on-screen talk session with anyone else who happened to be on-line. While the rest of the companyās computer system grunted and toiled with everyday labours, this corner of the machine was reserved for live on-line chatting. For free. It was like an early form of the Internet Relay Chat. The company probably hadnāt meant to become the worldās most prestigious hacker hang-out, but it soon ended up doing so.
Altos was the first significant international live chat channel, and for most hackers it was an amazing thing. The good hackers had cruised through lots of computer networks around the world. Sometimes they bumped into one another on-line and exchanged the latest gossip. Occasionally, they logged into overseas BBSes, where they posted messages. But Altos was different. While underground BBSes had a tendency to simply disappear one day, gone forever, Altos was always there. It was live. Instantaneous communications with a dozen other hackers from all sorts of exotic places. Italy. Canada. France. England. Israel. The US. And all these people not only shared an interest in computer networks but also a flagrant contempt for authority of any type. Instant, real-time penpalsāwith attitude.
However, Altos was more exclusive than the average underground BBS. Wanna-be hackers had trouble getting into it because of the way X.25 networks were billed. Some systems on the network took reverse-charge connectionsālike a 1-800 numberāand some, including Altos, didnāt. To get to Altos you needed a companyās NUI (Network User Identifier), which was like a calling card number for the X.25 network, used to bill your time on-line. Or you had to have access to a system like Minerva which automatically accepted billing for all the connections made.
X.25 networks are different in various ways from the Internet, which developed later. X.25 networks use different communication protocols and, unlike the Internet at the user-level, they only use addresses containing numbers not letters. Each packet of information travelling over a data network needs to be encased in a particular type of envelope. A `letterā sent across the X.25 network needs an X.25 `stampedā envelope, not an Internet `stampedā envelope.
The X.25 networks were controlled by a few very large players, companies such as Telenet and Tymnet, while the modern Internet is, by contrast, a fragmented collection of many small and medium-sized sites.
Altos unified the international hacking world as nothing else had done. In sharing information about their own countriesā computers and networks, hackers helped each other venture further and further abroad. The Australians had gained quite a reputation on Altos. They knew their stuff. More importantly, they possessed DEFCON, a program which mapped out uncharted networks and scanned for accounts on systems within them. Force wrote DEFCON based on a simple automatic scanning program provided by his friend and mentor, Craig Bowen (Thunderbird1).
Like the telephone system, the X.25 networks had a large number of `phone numbersā, called network user addresses (NUAs). Most were not valid. They simply hadnāt been assigned to anyone yet. To break into computers on the network, you had to find them first, which meant either hearing about a particular system from a fellow hacker or scanning. Scanningātyping in one possible address after anotherāwas worse than looking for a
Comments (0)