Copy Link
Add to Bookmark
Report

Underground eXperts United File 280

  


### ###
### ###
### #### ### ### ### ####
### ### ##### ### ###
### ### ### ### ###
### ### ##### ### ###
########## ### ### ##########
### ###
### ###

Underground eXperts United

Presents...

####### ## ## ####### # # ####### ####### #######
## ## ## ## ##### ## ## ## ## ##
#### ## ## #### # # ####### ####### ## ##
## ## ## ## ##### ## ## ## ## ##
## ## ####### ####### # # ####### ####### #######

[ Hacker's Paradise ] [ By The GNN ]


____________________________________________________________________
____________________________________________________________________


HACKER'S PARADISE
by THE GNN/DualCrew-Shining/uXu


NOTE: Sir! I would never encourage someone to commit a crime! No way! But
I do enjoy to state facts to the public. If those facts are regarded
as dangerous, I humbly suggest that you try analyze why you think so,
instead of picking on me. Knowledge and truth are intrinsically
good even if they create annoying feelings. Order is high - but truth
is even higher. Remember that.




1. INTRODUCTION.

A gun can only be used in one proper way. However, the reasons why someone
decides to use a gun can be several. It can be used for target practice,
hunting, warfare et cetera. The latter can roughly be divided into wars for
freedom or wars for conquest.
Hacking can be done for several reasons. For fun, for profit or for some
other reason. One of these 'other reasons' may be the protection of one of
the most basic human rights: freedom. If hacking in this sense is regarded
as a weapon, it would be a weapon that is meant to be used in a war for
freedom.
What is of importance to notice, is that an individual who uses a gun
might not be aware of the potential of his weapon. He might not even be
aware of what the gun does. It fires a bullet, that is true. The bullet hits
something, oh yes. But if the shooter turned to another direction he could
perhaps hit something valuable. Then the result from his Sunday afternoon
target practice would then be something else.


2. WHAT IS WRONG WITH THE COMPUTER UNDERGROUND TODAY?

Good hackers are talented, that is fact. Unfortunately, their talent only
goes so far that they know how to break and enter. This is not enough for
certain reasons. If the soldier only knew how to pull the trigger, he would
not be a good soldier. He would simply be someone who only knew how to fire
a gun.
So, what is missing? The answer will not surprise you: knowledge. But not
knowledge on how to use the weapon. What is missing is the knowledge how to
properly use the weapon, and why the weapon must be used if he would like
to reach a certain goal. If a soldier without knowledge goes to war, he will
not be aware of the conflict around him. He will just shoot randomly, for
fun or equal. Sooner or later he might hit something. If he hits an enemy,
he will not know that he has done something 'good.' If he hits one of his
friends, he will not know that he has done something 'bad.' He will be a
blind man who just enjoys to shoot.
Hackers who just breaks and enters are blind people. They are unaware of
the conflict around them. They do not know that they are the keepers of a
very powerful weapon, that should be used properly. Sadly enough, the
computer underground have not given this problem enough attention. Instead,
it has over concentrated on techniques and know-how. To know how to do
something is good, but not enough.
I claim that the computer underground today is defective because it does
not understand that it is a part of a global conflict, far serious than the
pathetic ones that are visible on the surface. But what should be done to
repair this defect? I see two necessary actions:

1) Make people aware of the conflict.
2) Make people understand that they are actually a part of the conflict,
and if they want to win it they must use their weapons properly.

Both aims at the same thing: implanting knowledge. If this knowledge is
spread and understood, hacking will transform itself from being a simple
crime to a weapon that ought to be used in the most important battle of this
century.


3. THE CONFLICT IN QUESTION.

One becomes very depressed when one reads zine after zine just to find
the ordinary 'we are not pro-hacking, but we are interested in the social,
political and anthropological aspects' crap. Those words used to describe
the so-called 'aspects' are by nature controversial. How can anyone debate
such a subject and remain neutral? No one. It is time for the underground
to stop acting like a scared child and get to the point, loud and clear,
without necessary message-codes.
We spoke about a conflict. It is now time to shortly begin to explain
the structure and participants of this conflict. To begin, let us draw a
rough distinction: that between the 'real society' and the 'electronic
society.' Is it possible to separate those two? The answer is, to me, a
clear Yes. The conflict is about the latter, and there are two groups who
fight with each other. On one side, we got the system and on the other side
we will find the individuals. The system (I have no better word) tries to
shape the electronic society so it will turn out to be a copy of the 'real'
society with rules, laws, control, all organized and uphold by power and
violence. The individuals wants this last resort of freedom to remain free.
Since I lack a good word for the battle area, let us refer to it as the
'network.' Right now, the battle is about the won by the system. With
night sticks and propaganda, the system has not only managed to scare the
underground to silence, it has also convinced the masses that the
individuals are nothing more than a bunch of criminals who needs to be put
away. If the individuals wants to remain free, not become what Orwell would
call Provos, there is no time to sit around in a corner and hope for a
better future created by someone else.


4. HOW CAN HACKING BE REGARDED AS A WEAPON IN THIS CONFLICT?

The individuals have tried to win this war by propaganda and information
alone. This would have worked just fine, if not the information had been
directed only to those involved, i.e the individuals themselves. The public,
the mob, the masses, is a strong force that is being used as a 'weapon of
majority' by the system. The system will find no problem doing so, since
the individuals do not even try spreading information to the public. The
public will just hear the false arguments used by one side.
Information needs to be spread, that is a fact. But there is also another
powerful weapon that the talented ones of the underground might use. What
I refer to is probably obvious by now. As the terrorist bomb is mot merely a
fire-cracker that goes boom, so is hacking not only something that can be
done for fun. Saying that it CAN be used in the conflict needs further
explanation. HOW can it be used? WHY should it be used? What will it all
lead to?
Controlling something implies that the object controlled must be in the
hands of a chosen few. By force if necessary. If the system gets control
over the network, everything is ruined. The real society has then overtaken
the electronic society with everything that means: Violence, threat, state
controlled mobs that raids the net for 'dangerous' information and so on.
But if the system realizes that the object cannot be controlled, the
situation will change. If the network leaks information the system wants to
remain controlled the result will be a chaos in the system. It will try to
cover the holes, without success. Eventually, the system will break down and
leave the individuals as the winners. I am not that childish that I believe
that this will be the beginning of the utopia - more battles will follow.
But it is better to be prepared for more than hide under the table. There
is no need to spend years thinking about how the weapon should be used. As
long as it is used at all, the holes in the object will remain open. If
the weapon is put away, in favor for some ridiculous peace debate, the
system will quickly cover the holes and gain complete control.
However, it needs to be repeated: a weapon is worthless if the user is
completely ignorant on why he uses it. It could be used for fun, but that
is not enough. It will not take us anywhere. It should be used together will
a rational, clear and aware mind.


5. HACKER'S PARADISE?

Freedom is not something that is given away for free. It is a shiny
trophy that follows after hard struggle. Just because the rich and complete
utopia is never to be around, the search and fight for it must never end.
We might never reach the paradise. We might just end up in the middle. But
it is better to be in the middle, constantly fighting, than giving up and
sinking into the endless depths of Big Brother control. The invertebrate
underground is going to lose this war if not a radical attitude change is
spread and accepted among the individuals. This is the hard and brutal
truth.


6. NO DISCLAIMER.

This file has been written for informational purposes. But that says
nothing. It has actually been written for the purpose of making people
think. If knowledge is a burden, and spreading facts is considered a
crime in your eyes then do not hesitate to sue: <GNN@KRILLE.UPDATE.UU.SE>
If you want to go to war, I will take you to war.




///////////////////////////////////////////////////////////////////////
The ones who do not vote, may complain.
Welcome to the power drome: HTTP://WWW.LYSATOR.LIU.SE/~CHIEF
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

Proton Pseudos.

---------------------------------------------------------------------------
uXu #280 Underground eXperts United 1995 uXu #280
Call SOLSBURY HILL -> +1-301-649-1631
---------------------------------------------------------------------------

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT