November 22nd, at 11 am SLT (8 pm CET, 7 pm GMT, 11 am PST, 2 pm EST) there will be a Seminar hosted by Caledon Oxbridge University on the topic of ChatControl legislation in the European Union. Participants will gather in the Req Quixote Memorial Hall in the full Sim Caledon Oxbridge Village.
Download a viewer. Either the Default “Linden” viewer or a third party viewer such as Firestorm Viewer
Run the viewer and enter your Avatar Name and Password you created when you si..gned up for Second Life and login.
Second Life can have a bit of a learning curve, so avail yourself of several orientation areas to learn how to best use Second Life. We recommend visiting the hosts for this seminar, Caledon Oxbridge Univeristy.
Set the Wayback Machine for 1993. I am out of TechSchool™ and enjoying my job at TechCorp™ in this elite pet project lab of the TechCorp™ CEO and I am pretty happy. I am still a Hacker and buying every issue of 2600 The Hacker Quarterly I can find. One day I find Volume Ten, Number Two dated Summer, 1993. When I get to page 42, I see a bold header reading “Toll Fraud Device” and an article describing the construction of a Red Box, dubbed “The Quarter”
Now for the young & uninitiated, phone phreaking was a subset of hacking that was concerned with exploring the telephone network. This was before the ubiquitous cell phones of today, and if you needed to make a telephone call away from home, you would have to use a payphone. To use a payphone, you generally needed money specifically coins. When I was very young a call cost a dime, by 1993 It cost a quarter. Phone phreaks in their exploration of the telephone network had all sorts of tricks to make free phone calls. These devices were called by a color and the word “box”. The most famous of these was the Blue Box, used by John Draper aka Captain Crunch, who detailed the use of a blue box to Esquire Magazine in the 1970s. Steve Wozniak the inventor of the Apple Computer was inspired by this Esquire article and finding the frequencies needed, built his own Blue Box (adopting the handle “Berkeley Blue”) which Steve Jobs then convinced him to sell at a profit. The most famous of the frequencies being 2600 Hz, the tone with which one could seize a trunk line and make additional calls, and which the Hacker Quarterly takes its name. A frequency that John Draper famously found was produced by a toy whistle found in a cereal box and adopted his Handle. Other boxes included the original toll fraud device, the Black Box which would allow you to receive a phone call without the phone company registering that you actually took the receiver off the hook, meaning any long-distance call to that number was free. I heard a tale of a Green box that would cause a payphone to return any money that was placed in it to make a call and was told a hacker turned his answering machine into one so you could leave a message from a payphone for free, but this could have just been a hacker legend that circulated in the community at the time. The Red Box, the subject of this article was a device that produced the tones that a payphone made when a coin was deposited.
At the time a payphone would emit a short dual-tone multifrequency “beep” consisting of 1700Hz & 2200Hz for every 5 cents deposited in the coin slot. So a nickel would produce a single beep, a dime two beeps, and a quarter five rapid beeps. There existed at the time an IC known as a DTMF encoder which when paired with a “colorburst” crystal was capable of making the DTMF tones to dial a phone. However, someone very clever found that replacing the colorburst crystal with one rated at 6.5 MHz it would raise the “*” key to frequencies very close and within the tolerance of the coin deposit tones.
So first I needed components. My choices were either Radio Shack who really didn’t like Hacker types, wanted your name and address for marketing purposes even if you were just buying batteries (I would give them the name “John Frederson” and my PO BOX), or this independent Electronics store with all kinds of new old stock that you never knew what you would find and knowledgeable electronics experts willing to help discuss whatever project you were working on. The choice was obvious, I was in that shop a day soon after that issue of 2600 came out and one of the regulars was showing them the article and schematic for the red box! They were quite excited and asked the customer to allow them to photocopy the article.
I was busy at my job at TechCorp™ and did not get to this project for a while. Good thing too, because in the next issue of 2600 on page 37 was a corrected schematic for the Quarter as well as the inclusion of an OpAmp so I could use an easier to source low impedance speaker. This was the device I was going to build. So one weekend when I had some time, I got in my car and drove to the friendly independently owned electronics store.
I had the parts list written down on a piece of paper and I go up to the counter to get my components. I am buying two of each in case I mess something up, and as I am going down the list, I get to the TC5809 DTMF encoder. The helpful person behind the counter asks, “do you need a couple of colorburst crystals for this?”
I meekly say, “No I need some 6.5 MHz crystals, actually,” at which point his eyes go wide, his eyebrows raise and he says LOUDLY so the entire store can hear him:
“OH! I KNOW WHAT YOU ARE DOING WITH THESE!”
I start to shrink into myself, embarrassed. I am caught.
He continues, again very loudly so the whole store hears, “WILL SIX-POINT-FIVE-FIVE-THREE-SIX MEGAHERTZ CRYSTALS WORK?” (He knows full well they will as the original article says so)
I quietly say, “yes.”
He gives me a knowing look and gets the crystals, I have all the parts I need as many of the components I had at home in my kit leftover from TechSchool™ he rings me up and sends me on his way saying “DON’T GET IN TOO MUCH TROUBLE NOW.”
So I get home and the next day I begin to construct the circuit on my handy dandy breadboard, which served me well at TechSchool™. I finish the circuit, powering it off a 9-volt battery and the output of some cheap speaker I had. I pressed the button (momentary switch) and five rapid dual-tone beeps come out of the speaker. Success! Well, I think it is a success. I didn’t have any test equipment to see if the frequencies were correct or anything, so the only thing to do was find a payphone.
I drive to my neighborhood post office which had a phone booth just outside the doors to the PO Boxes. So I carry out this breadboard with ICs and wires and components stuck into it, a speaker hanging off of it putting the speaker up to the mouthpiece, I call my house and press the button. Five quick beeps. And nothing. So I try again. Still nothing. A third time and an Operator comes ón the line. (Back in these days, they had actual humans that could route and connect calls and apparently catch phone phreaks.) She asks, “what are you trying to do?” I am so busted and I bet she is gonna have the cops show up, so I quietly hang up the phone walk briskly to my car, and drive home. The first try was an utter and total failure.
I get home and go over the circuit carefully. I realize that one of the wires is going to the wrong pin, and probably making my prototype red box emit tones at the wrong frequency. Well, that explains it. But I am not going to try at the same payphone again. I give up for a while and put the breadboard with the Red Box circuit away in my toolbox.
A short while later, there is a BBS meet-up in my hometown an hour away, so I hop in the car and drive to the get-together, and bring my circuit to show off at the pizza parlor where we are having our little party. I pass around the issue of 2600 and my breadboard and people have fun playing with it and reading about Red Boxes and I tell my story about it not working, and how a lot of the modern payphones now do not connect the voice channel until after the call is connected to prevent this type of fraud device, and it will probably just remain a curiosity for me. However there is another hacker at the gathering and he says he knows of a phone that red boxes work ón, because he uses HIS Red Box ón it all the time. It is the phone at the end of the hallway in his dorm at the local University.
His red box was of a different type. His was made by modifying a Radio Shack phone dialer. Again this was the days before cell phones were ubiquitous and Radio Shack had these devices with a keypad, a speaker, and enough memory to store like 25 phone numbers. You could just hold this device up to a mouthpiece press a few buttons and it would automatically dial the phone for you. So of course this device used a DTMF encoder and a colorburst crystal. But what my Comrade had done was install a toggle switch and 6.5 Mhz crystal so he could use it as a phone dialer in one switch position using the colorburst crystal and in the other using the 6.5 Mhz crystal turning it into a red box. He could simulate a nickel by pressing the “*” button. To make things quicker for local calls he programmed it to dial five of those making it simulate depositing 5 nickels or 25 cents. We arranged to use my breadboarded red box at his dorms at a later date.
Sometime later, we were hanging out on campus before a movie that was being shown at the university theater. Ran into my fellow hacker and we invited him to the movie, and he asked me if I had my red box, and I said it was in my car, and offered to take me into his dorm after the film to try it out.
So after the movie, we head over to the dorm full of college bros, and he guides me to the payphone which did in fact look quite old. “This is promising.” I think. When it is our turn to use the phone, I dial my girlfriend’s number. The automated voice comes on, “please deposit 25 cents.” And the moment of truth comes, I hold the speaker and breadbox up to the mouthpiece, press the button once and 5 dual-tone beeps of 1708 and 2159 Hz spaced 30 milliseconds apart — a very close approximation of dropping a quarter into a payphone. The call connects. The distant phone rings. My girlfriend picks up and says, “Hello?”
“Hi, it’s Johnny, guess what I just did?”
“What did you do?”
“I am calling you from a payphone using my red box.”
I hear a sigh come from the earpiece, “Johnny, you are going to get us in trouble. I am hanging up. Goodbye.”
Well, ok my girlfriend wasn’t Impressed (no wonder things didn’t work out in the end) but I got a high five from my friends. Like 99.44% of my hacks, I just wanted to see if I could do it. I began to assemble the red box on a perf board with wire wrapping tools, but I never finished. I pulled it off, it worked, and payphones, where it would work, were becoming scarce. Once I had proof of concept the need to steal from the phone company or make free phone calls just weren’t important anymore.
I built the red box out of curiosity and fun, not to defraud anyone. All I did was rob a phone monopoly of the cost of a 15-second local phone call which certainly only used pennies of resources. If I had been caught I potentially could have been sent to jail and heavily fined for withholding a corporation worth more money than you or I will see in a lifetime a quarter. Hacking has always had a disproportionate response from the authorities because they cannot brook someone using technology in a way with creativity and imagination to merely explore its capabilities instead of leveraging it for fortune and capital. Capitalism only wants profit and the Hacker Ethic of free access and wide sharing threatens that because we dare show them a world not bound by their rules.
The first panels are fields of white, cinematically revealing a city – could be any city in the world. Then we see a CRT with the YouTube homepage transitioning to thick-bordered square panels we see the events of the video later known as “Collateral Murder” play out in comic-book form.
A powerful opening for a powerful story. The story follows Julian Assange’s life using flashbacks and flash-forward to present its engaging story beats as events in Assange’s past give a context for the events portraying his work at Wikileaks. The creators use a motif of hallucination of shadow puppets to portray Assange’s internal dialog artistically but make clear in the forward that this is artistic license used in the storytelling and not based on anything reported about Assange, as when it was originally written in 2011, and there was little knowledge and rumor about Julian Assange For this 2021 English edition by Countershock Press, a new final chapter has been added which brings the story up to 2021 with Julian Assange detained by the United Kingdom Government while the United States Government seeks his extradition.
This story is a breath of fresh air in the tradition of the Italian political novel for me who has been subjected to character assassination of Assange by politicians and amplified by the complicit press who seem to value access to the powerful over the duty of reporting their crimes.
The story articulates Julian Assange’s version of the Hacker Ethic, namely:
First: Don’t damage computer systems you break into. Second: Don’t change the information in the systems. Third: Share Information
Julian Assange From Hacker Ethic to Wikileaks p. 17
From these three principles, the story unfolds first as the young computer Hacker, Mendax, exploring systems through his home computer and a modem, to the publisher of crimes of the powerful on Wikileaks. The art is charming, and the story’s pace makes this an easy and engaging read.
The medium of the graphic novel combining illustration and literature has long been a favorite way for me to consume stories, and this tome was quite enjoyable while working as a precis to the events that have led to Assange giving up his freedom to tell the world the truth, and the machinations since of the United States and its allies to silence those that expose their crimes. With the United States refusing to be a member of the World Court, the only way to hold them accountable for war crimes is for journalists to bring forth that which the Military Industrial Complex would rather remain hidden so as to protect their profits through conflict throughout the world at the cost of human lives, warfighters and civilians alike like the 2 Reuters journalists among the 18 dead and 2 children wounded in the video known as Collateral Murder all of who were unarmed.
The people must have the facts surrounding the actions of their government so that they can form public opinion without manipulation. This is the mission of Wikileaks. This graphic novel teaches the underlying philosophy that drives Julian Assange in an approachable manner, and I urge everyone to read this, as he is awaiting his extradition hearing in the United Kingdom.
Free Julian Assange now! Journalism is not a Crime!
Every November 5th members of Anonymous take to the streets for the Million Mask March. There are no leaders, everyone brings their own agenda and issues they are protesting for. Anons seek a better world and this kind of direct action is one of the many tools used for change.
In 2021, because many Anons are quarantined due to the global pandemic, and others cannot safely attend a street event. With this in mind, a Virtual Million Mask March is being organized in the virtual world of Second Life.
The information for the Virtual Million Mask March is as follows:
Location: Ahern Welcome Area, Second Life
Use the following SLURLS to attend the March if a sim is full, try the next one.
Download a viewer. Either the Default “Linden” viewer or a third party viewer such as Firestorm Viewer
Run the viewer and enter your Avatar Name and Password you created when you signed up for Second Life and login.
Second Life can have a bit of a learning curve, so avail yourself of several orientation areas to learn how to best use Second Life. Once you are in world, you can search for and join the group “Anonymous Million Mask March” and connect to other anons for organizing planning, help, and free items for the march.
UPDATE: We have collected in a Notecard everything you need to plan for & Attend the Virtual Million Mask March in Second Life on November 5th. Everything is completely FREE and FULL PERMS meaning you can modify and distribute it all as much as you want. Join the group, “Anonymous Million Mask March” or contact ZenMondo Wormser to get your own copy of this notecard.
Good luck anons and see you at the Ahern Welcome Area on November 5th!
Set the wayback machine for 1986. I had just checked out a book from the school library by Steven Levy entitled, Hackers: Heroes of the Computer Revolution. This book, along with the 1983 Movie Wargames were major influences on the Hacker Johnny Fusion aspired to be, being presented as they were to a young, adolescent demiboy socialized as male along with all the privilege, taught ignorance, and toxic attitudes being male in the 1980s brought.
So when I read this tome I was enamored by these heroes of the computer revolution, and the misogyny and sexism went unnoticed as it aligned with what I had been taught my entire life up to that point.
I have not given my well-worn copy a re-read in a while but a tweet I saw came across my feed, and the misogyny and sexism in this work, expressed by the personalities portrayed and editorialized by the author. Consider these two passages from the book:
You would hack, and you would live by the Hacker Ethic, and you knew that horribly inefficient and wasteful things like women burned too many cycles, occupied too much memory space. “Women, even today, are considered grossly unpredictable,” one PDP-6 hacker noted, almost two decades later. “How can a hacker tolerate such an imperfect being?”
Steven Levy, 1984, Hackers: Heroes of the Computer Revolution, Dell Publishing
And they formed an exclusively male culture. The sad fact was that there never was a star-quality female hacker. No one knows why. There were women programmers and some of them were good, but none seemed to take hacking as a holy calling the way Greenblatt, Gosper, and the others did. Even the substantial cultural bias against women getting into serious computing does not explain the utter lack of female hackers. “Cultural things are strong, but not that strong,” Gosper would later conclude, attributing the phenomenon to genetic, or “hardware,” differences.
Steven Levy, 1984, Hackers: Heroes of the Computer Revolution, Dell Publishing
What a load of steamy piled-on bullshit! I am sorry to say that in many hackerspaces and in the tech world, this toxic misogyny is the rule, and its absence is the exception. Women must be twice as good to be given half the credit and train themselves to speak in a lower more “masculine” register as well as other changes to typical feminine characteristics to even be taken seriously in the tech world. Not because feminine traits are not serious, but because sexism is so rampant.
In this same book, Levy often talks about the Hacker Ethic as the core value of hackers, and my young, impressionable brain soaked that up and it has guided my entire hacking career and inspired the name of this blog. I always liked Levy’s 6-bullet point encapsulation of the Ethic, even if only the first two points (The Free Flow of Information & Access to Computers) seem to be universally accepted by most hackers. Which the Jargon File defines as “The belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing open-source code and facilitating access to information and to computing resources wherever possible.”
In Levy’s six-point version, the fourth point reads, “Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.” The absence of gender as a bogus criterion is a glaring omission. But given the attitudes of the subjects in Levy’s biographical work, it is easy to see why it was omitted. Also omitted is sexual orientation. But for a book written in the 80s when queer individuals were still highly discriminated against and oppressed, It is also understandable why it was omitted. So, in good hacker fashion, I have modified and distributed the Hacker Ethic with this patch and bug fix to include them whenever I write it out.
I am a hacktivist, and it is my view that we are not free until we all are free. And this means fighting for the liberation of the most oppressed and marginalized members of our society in all the intersections of their oppression. By helping those at the bottom, we help everyone and not just ourselves. “A rising tide lifts all ships” We must patch our internal source code to eliminate the bugs of discrimination, toxicity, and oppressive attitudes, and replace them with equity and justice so that in transforming ourselves, we can then transform the world into something more just and equitable for all.
1) If there is a password, it will be something in plain sight from the desk.
2) Even if there are many windows and a graphical interface: NEVER TOUCH THE MOUSE, only use the keyboard.
3) Computers do not need cryptic commands just type what you want to happen in plain English.
4) Believe it or not, everything in every building is networked to the computer system and can be controlled from your keyboard, including all the lights and sprinkler system.
5) You can use your hacking skills to blow that shit up. I mean there are explosions due to computer hacking every day, right? In fact, computer hacking is so good at blowing stuff up, all the world governments have stopped making bombs and are using the money for computers and routers. Of course, 12 percent of the time when trying to blow up a building you just turn on the sprinklers.