----------------------------------------- PIRATES ON THE LETTER "X"
-------------------
HACKER - this word means so much... Dedicated to users, users, and other newbies.
Delayed passersby watched in surprise as strong guys in bulletproof vests walked in circles around their native Khrushchyovka in one of the quiet Moscow districts, talking on radios. Periodically, patrol cars appeared near the house. "They must be catching some tough bandits," the locals thought. And they were very wrong.
Both the security and the police were indeed dealing with tough bandits. But they were not catching them; on the contrary, they were protecting them from possible excesses from the FSB and Interpol. Meanwhile, in an apartment rented under a false name, these very protected individuals enthusiastically hacked the computer network of a respectable European bank to plant a virus. Modems squealed, phones crackled, and alongside calls and reports, curses poured from a radio station standing on the table. Among the heaps of equipment and beer cans wandered dazed assistants and guards. And above all this, in clouds of tobacco smoke, behind a powerful computer hovered the unflappable main character - a classic Russian hacker. The future storm of the victorious West and the last hope of the defeated Russia.
Americans complain
------------------------
The word "hacker" comes from the English verb "to hack" - to break into. For about twenty years, it has been used to refer to "curious" hooligans who infiltrate the databases of various reputable institutions through computer networks and steal everything that is poorly placed. The recognized pioneer and living legend of hacking remains American programmer Kevin Mitnick, who managed to break into the super-secret air defense computer network of his home country back in 1974. The scandal at that time was grandiose, and the hacker escaped severe punishment only due to the absence of computer crime articles in American legislation. This shortcoming was quickly corrected.
It is clear that with the arrival of computer networks in Russia, hackers of their own "brew" immediately appeared, and in huge numbers. But they had little room to operate here: the networks were underdeveloped, and the databases were poor... However, with the emergence of the famous international Internet, hungry Russian natives were able to step onto the international stage. The first blow of the powerful Russian hacking fist fell on the West.
Just two years ago, in an interview with the BBC, FBI Director Louis Freeh complained that Russian hackers conduct up to a thousand successful raids a year solely on American databases. That is, even then, there were about three hacks per day. Louis Freeh specifically traveled to Moscow and tearfully requested to create a joint corporation to combat this evil. Our people responded to the request, and a year ago in St. Petersburg, they discovered a certain Vladimir Levin, who managed to siphon approximately three million dollars from the American Citibank, one of the top ten largest banks in the world, through his computer to Israel in several attempts. Since we also lacked "anti-computer" laws, Levin had to be lured to friends in England, where he was arrested right at the London airport.
Bring down a satellite? Elementary!
-----------------------------------
It so happened that the author of these lines became one of the few who had access to Moscow's hacker circles. Now it is a whole caste, very closed, with its own laws and classifications. Recognized experts explained to me that although Citibank is in the top ten worldwide, its famous hacker is not in the top hundred Russian hackers. They openly laughed while discussing the details of Levin's work, relayed to them by their St. Petersburg "colleagues."
As it turned out, the Petersburg resident made a number of mistakes during the hack that were worthy of a novice. He accessed the database via the Internet instead of the much less exposed new X25 network, executed the hack several times from the same phone number, using the same network password... Finally, Levin failed to create and launch a "cleaning up traces" program after the hacking program. That's how he got caught.
Meanwhile, I know for sure several people who have been regularly infiltrating, for example, NASA's networks for several years and stealing programs from there. One even managed to access the program controlling an active spy satellite and gained access to its operations. If he had the appropriate knowledge, he could have sent the satellite to hell or even brought it down from orbit. Another Russian hacker was caught during a similar hack by an automatic computer security service. A message appeared on his monitor: "Sir, you have gained unauthorized access to classified information and thus grossly violated U.S. laws. Please disconnect immediately and report to the nearest police station." Not lacking in humor, the pirate immediately replied: "Sir, I would gladly do that, but the nearest police station is five thousand miles away from me." Such geographical news was beyond the computer's comprehension, and it went silent...
Once, I placed a case of cognac with a familiar hacker to infiltrate the database of NATO headquarters in Brussels. My disbelief in the capabilities of Russian hackers cost me dearly and quickly. For right before my eyes, saving the honor of the uniform, the programmer siphoned and displayed on the monitor the protocol schedule of foreign delegations' visits to Brussels in twenty minutes (!) from his home 386 computer. The information was stolen through the regular Internet from the server (central computer of the internal network) of NATO headquarters' office, and some terrorist organizations would have paid a lot of money for it. But such cases are relatively rare. A hacker must be very motivated to decide to hack such an organization. However, breaking into the computer of some gaming company and stealing a new game is quite commonplace.
REFERENCE
-----------
At the very beginning, we talked about how Moscow hackers bombarded a certain Austrian bank with viruses with precautions. For the curious, we present the technical data of this unique operation.
* Main hacking equipment: 586 IBM computer, autonomous power supply, telephone with an answering machine and anti-Caller ID, modem, two so-called mirror monitors, five "Alan" radios for security.
* Peripheral resource support: nine 486 and 586 machines, twenty-eight radio buoys throughout the city, twelve operators (three as doubles).
* Security and backup: two police crews, five of their own guards, their people in MGTS and the bank.
* Preparation for the operation - 25 days. Time for the operation itself - nine hours.
* Payment: hacker - 5 thousand dollars, no data on operators, police - 200 dollars per person, security - 40 thousand per head. Total costs - approximately 40 thousand dollars.
* Effectiveness of the hack: bank's computer systems were disabled for a day. Direct damage - about one hundred thousand dollars, moral damage in the form of tarnished reputation is hard to assess.
What types of hackers are there
------------------------
* ROMANTICS. These are loners who hack databases out of curiosity. One of my acquaintances infiltrated the Louvre's computer and now regularly views the exhibition, immersing himself in world culture. Overall, they are safe and selfless, but also the most talented.
* PRAGMATISTS or classics. They steal whatever they can: games, programs, databases, operating systems, electronic versions of various publications... For instance, last September, in Moscow, MICROSOFT presented its then newest operating system WINDOWS-95 with great fanfare. The Western press reported that the company spent 300 million dollars on advertising its new product. And the company executives could not understand why this system was selling so poorly in Russia. But as early as spring, our hackers had broken into MICROSOFT's database, downloaded the then-classified "ninety-five," and quickly set up its pirate production at accessible prices.
* SPY HACKERS. Today, any self-respecting company has its own hacker on the payroll, officially registered as a programmer, for example. His task is to hack into the networks and databases of competitors to obtain confidential information. They have already caused harm to Petrovka-38. Some skilled individuals stole the telephone and address database from its server for all of Moscow and put it on a regular compact disc. Today it can be purchased for several dozen dollars.
* CYBERGANGSTERS. These are professional computer bandits. There are not many of them yet, and they work for large mafia structures. They almost always operate in groups, sometimes numbering 10-15 people. Their tasks are specific: blocking or dismantling the operations of computer networks of various "undesirable" Russian and Western companies, as well as stealing money from bank accounts. It's an expensive and unsafe business, but the most lucrative.
Material prepared for publication
POLTERGEIST From Samara
based on an article in
"Express Newspaper" N34(100).
to be continued...
----------------------------------------- So, how is it? Is there a difference? And which source does the average ordinary citizen read more often, "Computerra" or "Express Newspaper"? That's right, "Express"! And what facts will they "throw" around? And in what mortal sins will they accuse whom?
On this not very joyful note, I will conclude today's narrative about computer literacy. Don't believe everything that is written - not everything that seems true is actually so.
Until we meet again.
E. Milun (Paul Atrides)
Contents of the publication: Oberon #03
- From the Authors
The editorial of the third issue of Oberon reflects on its wide distribution across Russia and nearby countries, overcoming production challenges, and its aim to cater to various readers, including gamers, programmers, and hackers.
- How to Write in Oberon - M.M.A
Guide on submitting articles to Oberon using ZX-WINWORD. Detailed format and process explanations for text, graphics, and music. Insight into editorial practices and preferences.
- Scroll - M.M.A
A historical overview of the game THE EIDOLON on ZX Spectrum, covering its restoration process and gameplay mechanics, including level challenges and story background.
- Scroll
Dark Star is a space shooter game where players pilot a ship against a tyrannical alien race. Players customize settings, navigate space, and combat enemy forces on various difficulty levels. Strategic planning and skill are vital for successful gameplay.
- Scroll - M.M.A
Detailed gameplay mechanics for the game with Mechnotech klp2. Strategy involves disarming reactors and managing droid transformations. Insight into different droid types and weapons available.
- About Everything - M.M.A
Discussion of reader interactions with the 'Oberon' editorial team, including feedback on previous issues and commentary on game compatibility and magazine content improvements.
- About Everything - M.M.A
The autobiographical article explores the author's role in Samara's ZX Spectrum scene, detailing his contributions and aspirations. M.M.A positions himself as a leader and innovator in the community. It highlights the importance of local distribution and cultural impact.
- Amiga rulez? - M.M.A
Critical essay on contemporary computer culture, contrasting IBM and Amiga platforms. Discusses societal impact of IBM standardization and advocates Amiga as a symbol of creativity and individuality. Reflects on the evolution of computer usage and preferences since the ZX Spectrum era.
- What Should 'Boot' Be - Unbeliever
The article explores the evolution of boot programs for ZX Spectrum, discussing early developments and key innovations over time. It highlights significant breakthroughs in automation and design, including fully assembler-written boots and the introduction of modern features. The text concludes with reflections on ideal boot characteristics from a contemporary user's perspective.
- Letter from Queen Software
An open letter from Queen Software criticizes ZX-WINWORD's design and Russian keyboard layout, denounces 'Mortal Compot' and the degradation of games, and shares views on demoscene events and computer emulation.
- Review - Unbeliever
The review provides insights into various 128K exclusive games for the ZX Spectrum, highlighting titles like 'Space Gun', 'World Championship Soccer', and 'Night Breed'. Special attention is given to their graphical prowess and gameplay mechanics. Furthermore, the article addresses the acquisition of Spectrum software via the Internet.
- Review of Assemblers - Maxsoft
Review of various assemblers for ZX Spectrum, highlighting their strengths and weaknesses. Focus on EDAS 3.3, AFS, XAS, ZX-ASM, ALASM, MASM, and TASM 4.1. Each assembler is evaluated on performance, features, and usability.
- Our Answer - M.M.A
Critical analysis of the electronic journal FAULTLESS, highlighting plagiarism issues and content quality. Discussion on the comparison with OBERON and other journals. Suggestions for improving FAULTLESS are provided.
- Our Response - Alex Noman
Debate over the compatibility and capabilities of Scorpion and Profi computers with the ZX Spectrum. Critique of programming claims by Chung Software regarding outdated languages and methods. Discussion on operating systems like CP/M and iS-DOS in the context of their utility in modern computing.
- Our Response
Exploring the varied interpretations of the term 'hacker' in Russian, highlighting distinctions and misconceptions.
- Hardware - Dr.Death
Connection instructions for AY-3-8910 on Spectrum-compatible machines. Solutions for common audio issues in Russian computers. Advice for improving digital sound compatibility.
- Hardware - Dr.Death
Discussion on modifying SCORPION ZS 256 for better performance, focusing on timing issues and TURBO mode. Explanation of improvements and potential problems with multicolors. Suggestions for further upgrades.
- Hardware - Poltergeist Corp.
Analysis of hardware issues with Profi, a ZX Spectrum clone, focusing on INT signal problems causing graphic flickering. A solution is proposed involving a simple hardware modification. The author shares their success and the widespread adoption in Samara.
- Let's Gurm
A microdrama illustrating the chaotic interaction between computer components during a printing task.
- Let's Feast
Satirical story depicting an alternate reality where American culture and symbols are humorously twisted by Soviet influences.
- Let's Feast
The story humorously describes Popov's efforts to help Papuans progress, amid desert struggles, political intrigue, and personal challenges.
- Let's Discuss
Overview of military jargon known as 'Army Absurdities' collected by students, highlighting unique language and instructions used in military training and communications.
- Let's Feast
Satirical article describing military humor and fictional military equipment.
- Literacy Campaign - Paul Atrides
Analysis of hacker misconceptions and societal attitudes, exploring hacker culture's roots and ethical dilemmas.
- Primer - Paul Atrides
Article discusses the role and activities of Russian hackers in the late 1990s, highlighting notable cases and categorizing different types of hackers. It covers the operations, risks, and impacts of hacking on international and local levels. The text also examines the societal perception of hackers and their portrayal in media.
- Contest - M.M.A
A contest involving identifying songs from poorly translated lyrics, inspired by a radio segment. Participants guess the song and artist. No specific prize yet, but a free journal issue is promised.
- Contest
A poetic reflection on personal struggle, misunderstood communication, and the burden of saving the world.
- Contest
A poetic reflection on isolation and inner dreams, contrasting with harsh reality.
- Contest
The article presents a poetic tribute to the community, emphasizing themes of unity, immortality, and strength through metal music.
- Advertisement
Advertisement in Oberon magazine offers free publication and discusses available software, hardware, and stores related to ZX Spectrum.
- Advertisement
Advertisement of computer repair and upgrades with pricing for various services. Options include drive connection, signal normalization, and memory upgrades. Specific services for different computer models like Pentagon and ATM.