European Stars And Stripes (Newspaper) - March 8, 1989, Darmstadt, Hesse Bad rap for hackers by Sid Moody associated press subject file hackers. Computer hackers. Define uis perceived As an electronic subculture of humans who Noddle Al computers10 hours a Day subsist on cokes and takeout chinese Tood typically Young smart males who rarely become nose guards Oten found at schools whose initials end int for tech nerds with acne who Dowse fiendish Booby traps to blow the fuses of the Republic vital computer systems. Enter caution Don t believe everything you read. Hackers Are More Likely a National treasure seated at a terminal in the computer lab at the University of California Berkeley be one has been sacrifice i Lor aesthetic purity Poskanzer a longhair of 30 years is poised like Vladimir Horowitz about to bring magic from a keyboard. Sock Ely plock plock. Suddenly on the screen appears a detailed portrait of the Earth s Moon. Every 20 minutes throughout offic 28-Day Funar Cycle he portrait changes to update the sunlight s progression from Ingemar Sliver to Complete illumination Moon Jot programmed the computer to do this during several nights when the machines usually do neat. But Why did Jet do this for Ghoul the same reasons that Michelangelo painted ceilings Columbus went sailing or Hiliary Tenzing worried up the ice of mount Everest. What use is a Newborn baby replied Ben Fra win when a rain soaked fellow onlooker asked him in Paris in 1t63 what possible purpose Jacques Alexandra. Cesar Charles could have had in mind in launching a huge balloon a into the ewouds .,.-. Poskanzer s Moon is an intellectual descendant of that balloon and is in the purest sense of Iho term a Hack. can an attitude toward problem. Solving a human urge to outwit conventional Wisdom ,. An exploration of limits not always absent whimsy. When Cal tech students at the 1961 Rose bowl rearranged the code of the cheering Section s halt Lime show so their synchronized cards spelled Cal tech instead of huskies Lor the University of Washington. Then spelled huskies backward this was a Hack since Robert Morris a 23-year-old Cornell Grad student was strongly suspected of planting a virus am Nota wizard. Maybe a Semi wizard says computer Whiz Leo Schwab of san Rafael Calif. Been do Vinci who Hal Leo models one a fits two capes a Velv Elcon item that has wizard written implies Fly All o Veril. Ardc his several wands. To also wears tue for Hals the kind european Wear to commance Menis a ii oppy disks at headgear. A menial processes Are Davin Cian which is to say in contemporary terms Hackena the Abi uly to see left handed responses to Rig til handed challenges i it make a mental note of something a shape a sequence and store it Iii be talking to Mysell and with pick it out. I lend to see things Ihrcke dimensionally we be now in Leo s work space in his bedroom it is lined with slotted toys the Yale his. Not his Gal s Sorne from Tii Lahood and some from his adulthood. To likes figures lion the comic strip Bloom county his computer s cursor is a replica of he Penguin like Bird from the step. Curiosity is essential to sacking he says. So is imagination because often you re confronted with problems that Don t yield to usual solutions you probably have to be a mite maniacal and you have to enjoy in if nol you re cheating yourself a lot of people would lather emulate reality rather March 8.1989 than invent it it s More fun to create to. Play god inside the works of a computer you can Pul the key in door put a tape Ori the Var and watch it and rest want to know fial s inside How it works trs soms Lhing of a Power trip.". Leo does his a Amcis on an Amiga desktop. There Are 10 n a downfall o balls i asked myself How can i use the tools of the machine 16 do this do have the tools How much rouble will Al be a the unicycle got Leo a following software makers have visual proof he can do something neat. Amiga can use it to show what its computer is capable of plus it s amusing Leo estimated up to Hall of Amiga s 700,000 owners have nig unicycle Hack last All actually a hut Dorfel bolder your head about the distinction thai gave 6.000 interconnected computers electronic Juls. A acing has become a Nasty word should ii to. According to Stolon Levy the a to Credolus of Hocking in his estimable history hackers the word seems irom Mit at the Dawn of the computer age in 50s. The incubator was the tech Model Railroad club in the real world Deli cd by the Hacker s dictionary As a place Whoso inhabitant Wear lies and Are thought of As not in like deceased persons hacking. Was now Hinfy Viii solved is Marira dissonances or Tiai inept gaiters or writers do.1al Mit where ingenious students had Long since advanced from reassembling Model a Fords in a protestor s room hacking Al the Railroad club Mccanl. Creating something of Greal panache and inc Noily Wilhour necessarily an Ull Imale Lilily. Circuits could Toj rewired no to make Trie tiny rams run on Tomc. But to Mako them do it More elegantly. When compel cars Jogan allowing up on Campus some1 railroaders were Immord Calely drawn to them like mocha to a Diode. They set behaviour patterns which abide. They lived by night when corp ulcers were Idle neglected families food studies sunlight soap. The last May account for the Scarcity of female hackers. Early on hackers marked More by preoccupation Han misogyny ignored girls because they considered them. A programmable. Poskanzer. However backpacks play ii soccer and admits he has a children have Long been prodigies in music. And math. Add now. Computers,11 the Young Don l know there a Walls says Glenn. Tenney a Fotois 39, Sigil Hacks bul knows he Nusl buy \ foodstuffs in there no world. It s easier to spend 40 hours a Day hacking when you re a kid than when you re Middle aged /. The hacking instinct in the years b c. Belor computers might have expressed itself in of hot rods but this is dirty work. Coi spuling is Clear. There s a a Hoff world at your fingertips Youdon to vhf to risk Renee Tori when Iho neighbourhood gang chooses up sides for one o Cal. Years ago those Kiefs would have been Tipp Brj Over or the Ike,1 says Don poker. An a Shonty on computer crime at sri Kinlein Aljonia in Menlo Park Call and once an expert in Bam demolition. His childhood males would almost saw through the sup Poms of an abandoned barn Ropos then collapse the slur cure before Iho of Alfed eyes of the owner Moused from his bed by the adolescent clamor. Delinquency1, perhaps but with a hair toward a Haik. Most kid hackers arc not socially skilled says Dave Flory they socialize through i to computer it s a Way to nudge the system impress your Friend say Here i assays Tom Mandy. A Hacker who also wears a lie in the real would As a fun lust Al a Silicon Valley think Lank Dave Rory traces Down computer malfeasance As head of the fraud squad Tor the san Jose police although. 50, to Hacks � his spare time but was not amused when someone filched his password and ran up an $80 Bill on his phone playing computer games Long distance. I was never popular ust a loner Mark Duchaineau a former High school re actor told Levy. You feel a oneness Wilh the computer without u there would have been this Greal void. Tike you did l have your sight or hearing a lot of Bright kids not socially Well developed who Are mrs Erable in Junior High Crispin an author of the Hacker s dictionary they Are naturally drawn to computer hacking Somo Lhing where they have Complete control Over the Les urls humans have Basic needs and Don t get them society they la gel elsewhere and computers scorn a better answer than drugs " Tenno is hacking in his basement in san Maleo it looks like the command module of a space capsule the morning after a saturday night linkup Wilh some Vodka toasting rus skies computers army Hobby and my Wing. Hackers do it because they enjoy it. That does t moan you can t think about Money the stars and stripes Paga 1s
