Hacker manifesto

                               ==Phrack Inc.==

             

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following was written shortly after my arrest...

                       \/\The

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Another one got caught today, it’s all over the papers. “Teenager Arrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”… Damn kids. They’re all alike.

But did you, in your three-piece psychology and 1950’s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world… Mine is a world that begins with school… I’m smarter than most of the other kids, this crap they teach us bores me… Damn underachiever. They’re all alike. I’m in junior high or high school. I’ve listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. “No, Ms. Smith, I didn’t show my work. I did it in my head…” Damn kid. Probably copied it. They’re all alike.

I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it’s because I screwed it up. Not because it doesn’t like me… Or feels threatened by me… Or thinks I’m a smart ass… Or doesn’t like teaching and shouldn’t be here… Damn kid. All he does is play games. They’re all alike.

And then it happened… a door opened to a world… rushing through the phone line like heroin through an addict’s veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought… a board is found. “This is it… this is where I belong…” I know everyone here… even if I’ve never met them, never talked to them, may never hear from them again… I know you all… Damn kid. Tying up the phone line again. They’re all alike…

You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered for steak… the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us will- ing pupils, but those few are like drops of water in the desert.

This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike. +++The Mentor+++ _______________________________________________________________________________

Advertisements

Cyber Threats

Cyber Threats:

Cyber threats vary from simple hacking of an email to waging a war against a state.

Cyber threats can be classified broadly into two categories:

1. Cybercrime – against individuals, corporates, etc.

2. Cyber warfare – against a state

1. Cyber Crime:

Use of cyber space, i.e. computer, internet, cellphone, other technical devices, etc., to commit a crime by an individual or organised group is called cyber-crime. Cyber attackers use numerous vulnerabilities in cyberspace to commit cybercrime. They exploit the weaknesses in the software and hardware design through the use of malware.

DoS attacks are used to overwhelm the targeted websites. Hacking is a common way of piercing the defenses of protected computer systems and interfering with their functioning. Identity theft is also common. The scope and nature of threats and vulnerabilities is multiplying with every passing day.

Cybercrime may be divided into two categories:

i. Crimes that Target Computers Directly:

They include:

a. Spreading computer viruses

b. Denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. It temporarily or indefinitely interrupts or suspends services of a host connected to the internet.

c. Malware (malicious code) is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile or intrusive software, for example Trojan Horses, rootkits, worms, adware, etc.

ii. Crimes Facilitated by Computer Networks or Devices, the Primary Target of which is Independent of the Computer Network or Device:

This can take many forms as listed below:

a. Economic frauds to destabilize the economy of a country, attack on banking transaction system, extract money through fraud, acquisition of credit/debit card data, financial theft and intellectual theft of property

b. Impairing the operations of a website or service through data alteration, data destruction

c. Spreading pornography

d. Copyright infringement

e. Cyber stalking, outraging modesty of women, obscene content to humiliate girls and harm their reputation

f. Threatening e-mail

g. Assuming fake identity, virtual impersonation

h. Breach of right to privacy

i. Misuse of social media in fanning intolerance, instigating communal tensions and inciting riots. Posting inflammatory material that tends to incite hate-crimes.

j. Information warfare

k. Phishing scams

2. Cyber Warfare and Cyber Terror:

It is said that future wars will not be like traditional wars which are fought on land, water or air. Snowden revelations have shown that Cyberspace could become the theatre of warfare in the 21st century.

While there is no agreed definition of cyber warfare but ‘when any state initiates the use of internet based invisible force as an instrument of state policy to sabotage and espionage against another nation, it is called cyber war’. Attacking the information systems of other countries for espionage and for disrupting their critical infrastructure may be referred as cyber warfare. It includes hacking of vital information, important webpages, strategic controls and intelligence.

The attacks on the websites of Estonia in 2007 and of Georgia in 2008 have been widely reported. Although there is no clinching evidence of the involvement of a state in these attacks, it is widely held that in these attacks, non-state actors (for example, hackers) may have been used by state actors. Since these cyber-attacks, the issue of cyber warfare has assumed urgency in the global media.

When an organisation, working independently of a nation state, operates terrorist activities through the medium of cyber space, it is generally called cyber terror.

Special Features of Cyber War Compared to Traditional War:

a. Independent Theatre of War:

The development of the internet and low- cost wireless communication is the contemporary equivalent of what airplanes were a hundred years ago. Their use in economic, social and political transactions has increased at a rate that far exceeds the growth in airplane use over the last century.

These technologies already play an important part in military operations in the traditional spheres of land, sea, air and the newer one of space. There are signs that they have been used for aggressive purposes by some states. There is also ample evidence of their use by criminals and terrorist groups. It is only a matter of time, like air power a hundred years ago, before cyberspace becomes an independent theatre of war.

There is one important nuance in the treatment of cyberspace as a fifth potential theatre of war, along with land, sea, air and space. The use of cyberspace depends on physical facilities like undersea cables, microwave and optical fibre networks, telecom exchanges, routers, data servers, and so on.

Protecting or attacking these is in the domain of the traditional arms of the military. Cyberspace, as an independent theatre of war, is about attacks that compromise the capability to use these facilities—they cannot be prevented by the security services in isolation.

b. An Undefined Space (No Specific Areas):

The defence of cyberspace has a special feature. The national territory or space that is being defended by the land, sea and air forces is well defined. Outer space and cyberspace are different. They are inherently international even from the perspec­tive of national interest. It is not possible for a country to ignore what is happening in any part of this space if it is to protect the functionality of the cyberspace relevant for its own nationals. Moreover, a key part of this space, the global internet system, is still under the control of one country.

Hence, national defence and international cooperation are inev­itably intermeshed. This means that a country’s government must ensure coherence between its security policy and the diplomatic stance taken by it in multilateral and bilateral discussions on matters like internet and telecom governance, human rights related to information freedoms, trade negotiations on Infotech services, and so on.

c. Disguised Attackers:

There is another feature of cyberspace that compli­cates the design of security structures and policies compared to the other theatres of conflict. In cyberspace, it is very easy for an attacker to cover his tracks and even mislead the target into believing that the attack has come from somewhere else. This difficulty in identifying the perpetrator makes it difficult to rely on the capacity to retaliate as a deterrent.

d. No Contact War:

The evolution of technology impacts the nature of conflict and war. Amongst the recent aspects of conflict is ‘no contact war’ wherein there is no ‘physical’ or ‘kinetic’ action across borders. Future world war will most likely be cyber war. Future war will not be like traditional wars which were fought on territorial borders or in air space.

Why is technology is good

Have you wondered that technology is a big part of your life? Or maybe too much of your life? But the truth is technology helps us in many ways. Smart phones can help you keep your calendar straight, some personal technology helps improve fitness and exercise, and other technology improves life at home with advanced new washers and dryers, microwaves, and automatic coffee machines. In fact, three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment.

One reason why technology is good is that it has saved many lives. We have new machines to scan bodies and test blood and other fluids so that doctors can find diseases and have you wondered that technology is a big part of your life? Or maybe too much of your life? But the truth is technology helps us in many ways. Smart phones can help you keep your calendar straight, some personal technology helps improve fitness and exercise, and other technology improves life at home with advanced new washers and dryers, microwaves, and automatic coffee machines. In fact, three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment.
One reason why technology is

good is that it has saved many lives. We have new machines to scan bodies and test blood and other fluids so that doctors can find diseases and conditions that need to be treated. It also helps in curing cancer with radiology and chemotherapy. And it helps in fighting blood disorders and lots of other diseases with new machines and medicines, as well as organ transplants. Even video games help. “In the battle against cancer, one video game is taking the deadly disease head-on With technology, some people created a game that helps explain what is happening to cancer patients in a fun way. It explains cancer to the patients in a series of mini games. That way, the patients will have fun learning about what they have and what they are going through instead of listening to the doctor explain it in a boring fashion.

My best poem Minutes

Minutes

We are but minutes little things

Each one furnished with sixty wings

With which we fly on our unseen tracks

And not a minute ever comes back

We are but minutes, yet each one bears

A little burden of joy and cares

Patiently takes the minutes of pain

The worst of minutes cannot remain

We are but minutes when we bring

A few of the drops from pleasure spring

Taste of their sweetness while we stay

It takes but a minute to fly away

We are but minutes use us well

For how we are used we must one day tell

Who uses minutes has hours to use

Who loses minutes whole years must loose

-Dawn Max

My best Success Note Ever

May the road rise to meet you

may the winds be always at your back

May the sun shine warm upon your face

May blessings reign in whatever you partake

Life is a journey, there are paths to be chosen,decisions to be made.

If you listen to your heart then God will show you the way

While you journey, celebrate your inner beauty and your uniqueness

Look around and enjoy what you see ,yet do not deny the pain you sometimes feel within you nor the heart you see in others

Do not walk past the needy

Find God and your truest potential for wholeness is to be found not just in arriving but also in the journeying.