[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: The Underground Myth ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #65 | Release date : 2008-11-04 | Editor : TCLH
IntroductionTCLH
Phrack Prophile on The UNIX TerroristTCLH
Phrack World NewsTCLH
Stealth Hooking: another way to subvert the Windows kernelMxatone and IvanLeFou
Clawing holes in NAT with UPnPFelineMenace
The only laws on Internet are assembly and RFCsJulia
System Management Mode HacksBSDaemon and coideloko and D0nand0n
Mystifying the debugger for ultimate stealthnesshalfdead
Australian Restricted Defense Networks and FISSOthe Finn
phook - The PEB HookerShearer and Dreg
Hacking the $49 Wifi Finderopenschemes
The art of exploitation: Technical analysis of Samba WINS overflowFelineMenace
The Underground MythAnonymous
Hacking your brain: Artificial Conciousness-c
International Scenesvarious
Title : The Underground Myth
Author : Anonymous
                             ==Phrack Inc.==

               Volume 0x0c, Issue 0x41, Phile #0x0d of 0x0f


|=-----------------------------------------------------------------------=|
|=-----------------------=[ The Underground Myth ]=----------------------=|
|=-----------------------------------------------------------------------=|
|=---------------------------=[ By Anonymous ]=--------------------------=|
|=-----------------------------------------------------------------------=|


1 - Hacker's Myth
2 - The Security Industry
3 - Black Hat, Two Faces
4 - Technology
5 - Criminals
6 - Forgotten Youth
7 - The Forward Link

-------------
Hacker's Myth
-------------

This is a statement on the fate of the modern underground. There will
be none of the nostalgia, melodrama, black hat rhetoric or white hat
over-analysis that normally accompanies such writing.

Since the early sixties there has been just one continuous hacking
scene. From phreaking to hacking, people came and went, explosions of
activity, various geographical shifts of influence. But although the scene
seemed to constantly redefine itself in the ebb and flow of technology,
it always had a direct lineage to the past, with similar traditions,
culture and spirit.

In the past few years this connection has been completely severed.

And so there's very little point in writing about what the underground
used to be; leave that to the historians. Very little point writing
about what should be done to make everything good again; leave that to
the dreamers and idealists. Instead I'm going to lay down some cold hard
facts about the way things are now, and more importantly, how they came
to be this way.

This is the story of how the underground died.

---------------------
The Security Industry
---------------------

	Then in the U.S. music scene there was big changes made
	Due to circumstances beyond our control... such as payola
	The rock n roll scene died after two years of solid rock
		- The Animals, circa 1964

There is little doubt that the explosion of the security industry has
directly coincided with the decline of the hacking scene. The hackers
of the eighties and nineties became the security professionals of the
new millennium, and the community suffered for it.

The fact is that hackers, mostly on an individual basis, decided to
use their passion as a source of income. Whether this is good, bad,
or just pragmatic is completely irrelevant. Nearly all the hackers that
could get jobs did. For the individuals that decision has been made (for
better or worse), and in general there's nothing that will change this.

This was a hacker exodus. What really mattered was not the loss of any
individuals, but the cumulative effect this had on the underground. The
more hackers that left the underground for a corporate life, the fewer
that came in. And those who stayed became entrenched, increasingly
disconnected.

Collaboration in this new age of career hackers has all but ceased to
exist. Individuals are now obsessed with credit. For their career, for
their standing in the community, it must be absolutely clear who this
research, this vulnerability, or even this opinion belongs to.

There is no trust in this corporate community; an underground issue
greatly amplified by corporate motivations. A single person can go months
or even years without telling anyone exactly what he is working on, and
whats more, will be genuinely worried about someone "publishing" their
results before him. There is no respect for the information he holds,
no belief that information should be free, no belief that research should
be open. All that matters is credit; all that matters is fame and money,
their career.

This is purely the fault of the security industry, who has exploited
and cultivated this culture, designed it for their needs. The truly sad
thing is that the corporate security world hasn't realized that they are
sitting on a gold mine, and as a result the mine is likely to collapse;
and likely to take their industry down with it.

The security industry uses information as its sole commodity, information
about insecurity. Who has the information, and who doesn't is what
makes this economy work. Whats more, the economy has been founded on
the continued output of a finite group of hackers. For the most part,
founded on those hackers that came out of the underground scene at their
technical prime.

But these hackers are not going to continue their production
indefinitely. They will lose their technical edge, move on to other
industries, perhaps climb the ladder up to management, and then
retire. The question is, then what? Then it will be up to the new wave
of young security professionals, whose motivation is as much financial
as it is passion for the technology and the thrill of the hacking game.

To imagine that these new wave office workers, university trained and
disinterested, can match the creative output of a genuine hacker is
laughable. The industry will stagnate under these conditions. The rapid
technical advancement we have seen will end, no more breakthroughs:
no more new security products or services. Just the same old techniques
being rehashed again and again until the rock has been bled dry.

I am trying to show you the symbiotic nature of the security industry
and the hacking scene. Industry needs insecurity to survive, there is
no doubt about this. A secure and stable Internet is not profitable for
long. Hackers provided instability, change, chaos. So the industry became
a parasite on the hacking scene, devouring the talent pool without giving
anything back, not thinking of what will happen when there are no more
hackers to consume.

For this reason, the security industry, much like the hacker underground,
is doomed, perhaps even destined for failure. But for now, all that
matters is that we have a thriving industry and...

A hacker underground proclaimed to be dead.

--------------------
Black Hat, Two Faces
--------------------

It would be easy to lay the blame squarely on the shoulders of the
security industry. A lot of people have. Unfortunately, its not that
simple. Perhaps the underground could have survived without the lure of
a six figure job, but one thing should be made clear. The self-proclaimed
black hat movement does nothing to help.

Various black hat groups have claimed to be the voice of the underground,
but the black hat scene was only ever a pale imitation of the actual
underground. The underground wasn't at all interested in public
self-aggrandizement, but this is all the black hats ever did. All that
their various rants and escapades accomplished was to show how desperate
they actually were for fame and recognition.

But whats worse, while they often talk a big game, they very rarely have
the pedigree to back it up. This is mostly because these self-proclaimed
black hats are really just as self-serving as the white hats they pretend
to detest. With few exceptions, those black hats that aren't already
working in the security industry are those that don't have the skills
to cut it.

The entire anti-security theme was simply embarrassing. This was just the
black hat movement admitting that they couldn't step up and represent
in an increasingly technical world. Where once hacking skill commanded
respect, now the black hats were promoting misinformation in order to
make what few hacks they managed to pull off easier. They couldn't step
up to a challenge, they couldn't outsmart the white hats they so detest.

This ineptitude and misguided fervor of the black hat scene had a
massive negative impact on the hacking underground. The true voice of
the underground was lost behind the noise and drama, until the voice
became a whisper.

And then eventually fell silent.

----------
Technology
----------

The very nature of technology, a dynamic and intractable force, had a lot
to say in the demise of the hacking world. In many cases, if a black hat
had been active 5 or 10 years earlier they would have been technically
competent and may well have contributed significantly. This is because
with the utmost respect, and despite all the nostalgia, hackers of the
past had it easy.

In the early years, the problems hackers faced were largely related to the
availability of information. Isolated groups of people had their tricks
and techniques, and sharing this information was problematic. This is
in direct contrast with the situation today, where there is an excess
of information but a void of quality.

As a result of many differing factors, the world is becoming aware of the
threats posed by lax security. When there is money at risk, steps will
be taken to protect those assets. We see now an increasing move towards
technical security mechanisms being employed as part of a defense in
depth strategy, and as a result, to be a hacker today requires immense
technical ability in a broad range of disciplines. It takes years of
individual study to reach this level.

But unfortunately, fewer and fewer people are willing, or indeed capable
of following this path, of pursuing that ever-unattainable goal of
technical perfection. Instead, the current trend is to pursue the lowest
common denominator, to do the least amount of work to gain the most fame,
respect or money.

There has also been an increasingly narrow range in what is published. In
part this is because of the lack of accessibility of certain systems
(through obscurity or price), but this is also increasingly dictated by
fashion. In a desire to fit in with the community, to be accepted in
to conferences, to be seen doing the right things in the right places
with the right people, researchers are all too happy to slot in to this
pattern of predictable and narrow progress.

And even then, the standards of what makes acceptable research, or for
what makes a vulnerability interesting, drops with every year. The gap
between offensive research and defensive implementations continues to
grow, to the point where public vulnerability research has become a
parody of what it once was, a type of inside joke.

There is no creativity, no sense of arcana anymore.

---------
Criminals
---------

From Operation Sundevil to cyber terrorism. The criminalization of
computer hacking and, by association, computer hackers had a devastating
impact on the underground. Hacking was criminalized in two ways, both
of near equal importance: by legislation of computer crimes, and by the
new trend of genuine criminals using hacking as a method for fraud.

There should be a clear separation between these two things. The fact
that the underground collectively became criminals under the law for
what they had been doing for, in some cases, decades. And the fact that
in public perception, even among professionals that should know better,
there was very little distinction between a genuine hacker and those
criminals using hacking purely as a method for profit.

Indeed, little of what organized crime and terrorist/activist groups
are doing could justifiably be labeled hacking. It is simply convenient
to make this simplification, in media and in industry. The security
industry knows the difference, but they have no economic interest in
there being any clarity on this point. Any sort of hacking, anything
they can sensationalize enough to scare their profit margin up suits
them perfectly.

For the underground, these issues largely affected individuals, not the
broader structure of things. Each person had to make a personal decision
on whether it was worth 1) being seen as a criminal under the law and
2) being seen as a criminal in public perception. Why should the hacker
face this when such an easy, safe, respectable alternative is available
in the security industry?

Even the term black hat has been twisted into something more closely
aligned to organized crime. For all their faults, black hats were not
(in theory) motivated by this type of money.

It comes down to an aging hacking population deciding, on an individual
basis, to settle down with their families, their material possessions,
their careers. No one can argue that there is anything wrong with this. It
is just a fact that these hackers left the scene behind.

Leaving a void too large to be filled.

---------------
Forgotten Youth
---------------

The forgotten aspect of this whole story is, without doubt, the importance
of new talent entering the world of hacking. Historically, hacking has
belonged to the young. With every passing year, the average age of hackers
collectively increases. Some would claim this is a sign of a maturing
discipline. For surely, what could youth possibly contribute in this
technological landscape? They call them kids, dismiss them as irrelevant.

Despite all of the issues facing the underground, if hackers had managed
to get this one aspect right, if they had recognized the importance
of those who would come after them, if they had given them something
to aspire to be, if they had directly or indirectly taught them the
accumulated wisdom that so often separates a hacker from the crowd;
then perhaps there still would be a hacker underground.

Nearly all of the situations surrounding the disestablishment of the
underground were circumstantial, there was nobody to blame, and nothing
that could be done. But one point for which this was not true was the
underground's obligations to young hackers. An entire generation of
talented hackers have lost the opportunity to become a part of something
bigger than themselves by participating in a functioning hacking
community, simply because hackers were too self-absorbed to notice.

The decline of the underground scene happened relatively quickly, and
also relatively quietly. The hacker who left the underground behind
for his new life was unlikely to justify or explain his choices. In
fact it was more likely he would deny being changed at all. It's likely
he'd even continue to have contact with his fellow ex-hackers, in some
imitation of the underground scene. This only helped to obscure what
was actually happening.

Today's youth, for the most part, have no true understanding of hackers
or hacking. They have no knowledge of the history, no knowledge that
a history even exists. Their hacker is the media's hacker, the cyber
terrorist, the Russian mafia. This is unfortunate, but the real trouble
begins for those few that somehow become interested enough to look a
bit deeper.

The average person requires some form of role model, something to aspire
to, to imitate and to an extent, to idolize. At this time, the only
visible efforts were the white hat researchers, the black hat horde or
various other technically inept self-proclaimed 'experts'. There is so
little inspiring research, and even less inspiring hacking, that anyone
new to the world of hacking is almost invariably left with a skewed
impression of things.

Indeed, for a lot of the young people that managed to acquire the
necessary technical base, hacking was seen as simply an interesting career
path. There is no passion in these people, no motivation to extend and
create. A competent professional, valued employee.

But no longer a hacker.

----------------
The Forward Link
----------------

The hacker underground has been systematically dismantled, a victim of
circumstance. There was no reason for this, no conspiracy, no winner. A
conquered people, but with no conqueror, no enemy to fight. No chance
of rebellion. Conquered by circumstance, if not fate.

At first this would seem to be a bleak message. What is the point of
even trying anymore? Why practice a dead art? But the truth is that the
art is not dead, just the circle that brought the artists together. The
hacker underground is broken, but the hackers are not.

Casualties have been high; but there still exists a scattered,
marginalized, and misrepresented people who are the hackers. Hackers,
not black hat nor white, not professionals, not amateurs (surely none
of this matters), are still out there in this world today, still with
all the potential to be something great.

The question is not then how to artificially group these people into a
new underground movement. The question is not how to mourn the passing of
the golden days, how to keep the memories alive. There are no questions
of this sort, no problems that can be solved or corrected by individual
action.

All that remains is to relax, to do what you enjoy doing; to hack purely
for the enjoyment of doing so. The rest will come naturally, a new
scene, with its own traditions, culture and history. A new underground,
organically formed over time, just like the first, out of the hacker's
natural inclination to share and explore.

It will take time, and there will be difficulties. Some will not be able
to let go of the past, and some will fail for not remembering it. But
in the end, after everything has been said and done, the equilibrium
will be restored.

A new world, at the frontier of cyberspace, belonging to the hackers
by right.
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.