Volume One, Issue Six, Phile 3 of 13 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ The Techno-Revolution by Doctor Crash $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Hacking. It is a full time hobby, taking countless hours per week to learn, experiment, and execute the art of penetrating multi-user computers. Why do hackers spend a good portion of their time hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true roots of hacker motives run much deeper than that. In this file I will describe the underlying motives of the aware hackers, make known the connections between Hacking, Phreaking, Carding, and Anarchy, and make known the "techno-revolution" which is laying seeds in the mind of every hacker. To fully explain the true motives behind hacking, we must first take a quick look into the past. In the 1960's, a group of MIT student built the first modern computer system. This wild, rebellious group of young men were the first to bear the name "hackers". The systems that they developed were intended to be used to solve world problems and to benefit all of mankind. As we can see, this has not been the case. The computer system has been solely in the hands of big businesses and the government. The wonderful device meant to enrich life has become a weapon which dehumanizes people. To the government and large businesses, people are no more than disk space, and the government doesn't use computers to arrange aid for the poor, but to control nuclear death weapons. The average American can only have access to a small microcomputer which is worth only a fraction of what they pay for it. The businesses keep the true state of the art equipment away from the people behind a steel wall of incredibly high prices and bureaucracy. It is because of this state of affairs that hacking was born. Hackers realize that the businesses aren't the only ones who are entitled to modern technology. They tap into online systems and use them to their own advantage. Of course, the government doesn't want the monopoly of technology broken, so they have outlawed hacking and arrest anyone who is caught. Even worse than the government is the security departments of businesses and companies. They act as their own "private armies" and their ruthless tactics are overlooked by the government, as it also serves their needs. Hacking is a major facet of the fight against the computer monopoly. One of the ways hackers accomplish their means has developed into an art in itself: Phone Phreaking. It is essential that every Hacker also be a Phreak, because it is necessary to utilize the technology of the phone company to access computers far from where they live. The phone company is another example of technology abused and kept from people with high prices. Hackers often find that their existing equipment, due to the monopoly tactics of computer companies, is inefficient for their purposes. Due to the inexorbitantly high prices, it is impossible to legally purchase the necessary equipment. This need has given still another segment of the fight: Credit Carding. Carding is a way of obtaining the necessary goods without paying for them. It is again due to the companies stupidity that Carding is so easy, and shows that the world's businesses are in the hands of those with considerably less technical know-how than we, the hackers. There is one last method of this war against computer abusers. This is a less subtle, less electronic method, but much more direct and gets the message across. I am speaking of what is called Anarchy. Anarchy as we know it does not refer to the true meaning of the word (no ruling body), but to the process of physically destroying buildings and governmental establishments. This is a very drastic, yet vital part of this "techno-revolution." Hacking must continue. We must train newcomers to the art of hacking. We must also increase computer Crashing. I know that crashing a computer seems a waste, but when there is no other way to subvert a business, their system must be shut down. As I stated above, this is only on the motives. If you need a tutorial on how to perform any of the above stated methods, please read a file on it. And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. Don't worry, you're on the right side. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - If you have a question or comment about this file or the "techno- revolution" just leave mail for me on the Metal Shop AE (314)256-7284, or any other BBS I may happen to be on. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$