120 DEAR HACKER

120 DEAR HACKER

First off, you do not need to be a hacker to do this. Hackers will explain to you how it works, unlike the phone company or the people who want to continue getting away with this. For some reason people think that because we understand how these things work, we’re the ones responsible when things go wrong. Anyway, your problem is simple. And it’s extremely common. To give you an idea, over the years we’ve had at least a dozen phone lines that don’t belong to us pop up in the 2600 office on unused jacks. In fact, we have one right now. It happens to lots of people all the time and the phone company doesn’t want you to know this because if word got out that your phone number actually appears in multiple locations, they would have a hell of a time convincing people that “if the call comes from your line, it must be coming from your house.” There are numerous points where a line can be compromised—junction boxes, basements, even central offices. We know of cases where phone lines for an entire apartment complex were accessible in one ten- ant’s closet. In your case, someone obviously has gained access to all of your lines and is simply clipping onto them at will. In all likelihood, the point of entry is some- where on your property. Check your basement, garage, even individual apart- ments if all of the lines run through them. If each of your residents has the exact same type of portable phone, it’s possible a weakness is being exploited there. Most modern cordless phones have protection against this type of thing. In either of these above scenarios, your culprit would have to be fairly close.

Dear 2600:

I really need your help. A few days ago, I sent a not-so-nice email to

a Klan address at kkk.com . Since then, an anonymous Klan member has been sending me hateful messages, and I would really like to get back at him. Do you share my views on anti-racism? (I hate KKK and all they stand for.) If you could help me I would greatly appreciate it, and I’m sure a lot of people would as well.

DVS

What exactly is it you hope to achieve by picking a fight here? Such groups are always going to exist, both on and off the net. By engaging them, you give them

THE CHALLENGES OF LIFE AS A HACKER

both the attention and motivation they would otherwise lack. If they do something to you or your friends, by all means react, but to strike out at them first seems rather pointless.

Dear 2600: My mother has America Online and I have my own ISP, but some-

times when I’m bored, I go on AOL and talk to some friends. I recently received an email which I believe to be fake, but I need some reassur- ance. I got it shortly after talking to a friend of mine about hacking the CIA mainframe.

Subj: This is encrypted mail from the Central Intelligence Agency

Date: 12/28/98 6:33:23 AM Pacific Standard Time From: nobody@nowhere.to (Anonymous) To: XXXXXX@aol.com

Hello US citizen we understand that you and another AOL member by the screen name: XXXXXXXXXX are conspir- ing to hack into the CIA mainframe and destroy the United States National Security, although we are sure that you can not breach security on our mainframe we are going to be setting up survailence around both you and XXXXXXXXXX to secure the fact that you will not break into anything the CIA or any other government branch needs to keep away from the public eye. If you try to breach survailence or national security I can assure you that there will be no trial you will be scentenced im- medialey and killed by armed forces within your neighborhood,