==Phrack Inc.== Volume Four, Issue Forty, File 3 of 14 ==Phrack Pro-Phile== Written and Created by Taran King (1986) Welcome to Phrack Pro-Phile. Phrack Pro-Phile is created to bring info to you, the users, about old or highly important/controversial people. This month, I bring you perhaps the most famous all underground hackers and the founder of the Legion of Doom. Lex Luthor _______________________________________________________________________________ Personal ~~~~~~~~ Handle: Lex Luthor Call me: I really no longer identify with "Lex Luthor" and don't ever expect me to use the handle again with regards to calling boards so you CAN call me "Johnson." Past handles: I was too status conscious to have more than one handle. All my effort went into just one persona. Handle origin: From the Superfriends/Justice League of America (ABC TV) cartoon series where the Legion of Doom (LOD) kicked their asses until the series writers thought up some lame way for them to win, but of course, LOD always escaped to fight another day. Date of Birth: You should know better than that. Height: You should know better that that. Weight: Approximately 610 Newtons plus or minus a few. Eye color: With or without colored contact lenses? Hair color: With or without my wig disguise? Computer: Apple //+ collecting dust and a soon to be obsolete IBM 286. Email address: lex@stormking.com The Interview Of Lex Luthor! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Taran King TK = Taran King LL = Lex Luthor TK: So Lex, why have you finally relented to a Pro-Phile/interview when I have been after you to do one for about 5 years now? LL: Well, I have to admit that I am still reluctant. This whole issue of computer security/insecurity, hacking/phreaking, philes/electronic publishing, etc. is still quite controversial and I would prefer to concentrate on strictly legitimate activities. Especially areas where the importance of opinions are negligible and the importance of facts are paramount, as in Science and Engineering. However, I realize that Phrack won't be around forever, so I thought that if I had any last words left to say I'd better say it now so here I am. TK: How did you get started into hacking/phreaking? LL: It was easy. I had a delicious shake for breakfast, one for lunch and oh sorry. No really, it WAS easy. I had a friend who bought an Apple and I used to go over to his house and watch him play Ultima I, a fantasy/ adventure game. After drooling over Ultima long enough, I took all my savings and bought a system, which was in excess of $1000 at the time. Being penniless, I had nothing else to do but learn the machine. My friend then purchased a modem and started calling boards. I followed suit. He was interested in cracking software and became rather well known using the handle "The Punk". After he gave me some codes for various LD companies I started calling around. A short while later, I noticed that there were boards, sections of boards, and most importantly INFORMATION that I was not permitted to use/see. I was unhappy about being excluded especially from RACS III (Tuc eventually came around though) and took it upon myself to learn what was involved in accessing these systems and getting more information. I realized as most have, that providing information that others do not possess allowed me to be noticed and therefore gain more information. By the way, I still play Ultima, I BOUGHT Ultima VI two years ago but am just getting around to playing it now. TK: What was more important to you, getting noticed or getting information? LL: The information was undoubtedly the goal. I realize now, as many hackers and phreaks have in retrospect, that I am an INFORMATION JUNKIE. The notoriety was simply the means to be trusted with more information and knowledge. Unfortunately back then I was unaware that most of the information that I seeked was available LEGALLY. I was blinded by the information itself, and did not concentrate on the *methods of obtaining information*. Now with the advent of CD rom databases, and also online databases, the information is readily found. The problem is that the service providers are pricing the disks and online time out of the reach of common people, which of course puts me back to square one in a way. TK: Why do you need information? LL: Look, if there is one thing that prevents people from doing things or pursuing their dreams, its INFORMATION. Not money, not guts, not anything. With the right information just about everything else can be obtained with the exception of health and happiness I suppose. TK: Give me an example. LL: Okay. If you have ever been up late watching TV and 'ol Dave Del Dotto or Carlton Sheets or whomever gets on and is trying to sell you their "courses" on Real Estate, Buying at Government Auctions, etc. then you know what I am talking about. These guys made millions simply by obtaining information that the majority of people were not aware of and put it to use, they could have been anybody. TK: What types of information do you look for? LL: Although I always look to learn new ways of how to obtain information in general, i.e., what new databases are available and how to use them, etc. I am currently concentrating on scientific data since I am working on my Master's Thesis and a comprehensive literature search is required to prevent me from duplicating what has already been accomplished. The "don't re-invent the wheel" philosophy. TK: You mention a thesis, what schooling have you had/are pursuing? LL: I don't want to be too specific, however, I have an undergraduate engineering degree and am currently in the process of completing dual Master's degrees, one in Quantum Physics and the other in Engineering. TK: Sounds heavy, but why be vague, you must have a computer-type or electrical engineering degree? LL: No, and I get that a lot from old friends: "You are so good with computers, why aren't you doing that?" My interest in computers now is simply to make them calculate equations and do simulations of physical systems. And to help me get more information. TK: Let's get back to the H/P subject, there's a few people who have always contended that you and the guys in LOD really didn't know much of anything, is that true? LL: Well I can't speak much about the old members, but their expertise satisfied me and other members (we would usually vote on new members, I wasn't a dictator you know). As for me, I realized early on that only certain people can be trusted with certain information, and certain types of information can be trusted to no one. Giving out useful things to irresponsible people would inevitably lead to whatever thing it was being abused and no longer useful. I was very possessive of my information and frequently withheld things from my articles. By not providing much data, some people may conclude that I didn't know anything at all. Its just that I didn't release it to just anyone and that dismayed various people probably to the point of lashing out at me and LOD. Some People to Mention ~~~~~~~~~~~~~~~~~~~~~~ Taran King: You were always hounding me for a Phrack Pro-Phile. Hope you are enjoying it. Knight Lightning: Great guy, but how did he get so famous even though he never even broke into the E911 computer? Sad to see him get screwed by overzealous "professionals." Wish I had some money to donate to his defense fund. The Blue Archer: Always wanted to meet him. I never got a chance to meet him face to face although I have known him for 8 years. To be honest, he was better at getting into systems than I was. Tuc: Always willing to bend over backwards to help you out. I still use the briefcase he bought me in NYC many years ago. Paul Muad'Dib: The one in New York. He is one of the smartest people I've ever met. I hope he is doing something worthwhile. Bioc Agent 003: Talked to him quite a number of times and met him at TAP meetings, but we never got to be friends. Cheshire Catalyst: I still owe him $20. He lent it to me in NYC. Control-C: A wildman with the women. I hope he gives me his STARGATE videogame when he gets tired of it. I don't play it every day like him, but I still can kick his ass. Phantom Phreaker: He has a spiritual side to him that most people never realize. The Videosmith: A fun person with talent. I was sad to see him leave the scene so early. Met with him in his home state two years ago just to say hello. Dr. Who: Here is a guy who loved hacking and exploring systems. I mean he really enjoyed it. He got quite good at it too. Telenet Bob: Met him up in Massachusetts at Dr. Who's conference. Jester Sluggo: Met him up in Massachusetts along with The Sprinter. Obviously he knew more than he let on even way back then. Compu-Phreak: I liked listening to his pirate radio station while he operated it. The FCC never did catch on. Silver Spy: A very smart guy with a future. Someone who knows when to stop, but was a little bit panicky at times. Erik Bloodaxe: Part of the original LOD group. I think he always wanted my job. I consider him a friend even though we had our misunderstandings. Mark Tabas: Part of the original LOD group and sysop of Farmers of Doom (FOD) for the short time it was up. I hope he isn't in any trouble again. Flash Hoser: A fellow information junkie in the Great White North (GWN). Gary Seven: Probably one of the least known yet talented hackers around except that I mentioned him in the acknowledgement section of many of my files. He has since quit. Digital Logic: Ran a good board for quite a while. An idealist who could give a great speech. Too bad no one would listen. The Ronz!: Old friend who no one ever heard of unless they called Digital Logic's Data Service BBS. Al Capone: Should have been born a few years earlier so he could have gotten into hacking when it was fun. He got into it too late and the risk became a little too high for him. Quasi Moto: Sysop of Plovernet. Was a good sysop, but not much of a hacker. Still talk to him on the net. King Blotto: Known him a long time. Glad he never put me on TeleTrial! The Mentor: A fantastic writer. He ran a great board (Phoenix Project). The last time I talked to him was a few years ago, but he wasn't very talkative. I think he fell for the 'ol Lex is a rat rumors. The Leftist: I hitched a ride with him to one of the SummerCons in St. Louis. Haven't talked to him since his trouble began, I hope he's cleaned up his act. I thought he was cool until I heard he was making stuff up about me to the investigators. The Prophet: A kindlier gentler hacker. Sorry to see him get screwed by the system. The Urvile: Met him at SummerCon '89. Definitely seemed to be the type who you could trust not to screw you over. Sir Francis Drake: Met him at SummerCon '87. I'm glad I got a chance to. Sir Knight: What a character. Shooting Shark: I appreciate the favorable comments he made about me in HIS Phrack Pro-Phile. A Few Other Things ~~~~~~~~~~~~~~~~~~ While I'm on the subject of people, there is one thing that I have not see published in any form, and that's a "Where are they now" type of thing for ex-hacks/phreaks. Just so people know, there are a number of us who are doing quite well at lawful pursuits. For example: Silver Spy - Completing a Master's Degree in Electrical Engineering. Knight Lightning - Working to become a lawyer. The Unknown Soldier - A high level manager at a successful software company. The Mentor - Creating games at a well known game company. Jester Sluggo - Working for a 'high technology' company. The Disk Jockey - Working in the computer business. Gary Seven - Chief engineer at a radio station. The Interview With Lex Continues ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ TK: In an early issue of Phrack you were referred to by the following: "There is paranoia and beyond paranoia there is Lex." How do you respond to that? LL: Ha Ha, I remember that one. Well of course there is some truth to it. And the saying, "better paranoid than sorry." is true as you can see since I am not behind bars... not that I ever did anything illegal of course, ahem. I should mention that I met two individuals early in my hacking career that had a significant influence on me, and both are the absolute epitome of paranoid. One was "Eliott Ness" who was probably in his late 30's to 40's by the sound of his voice. He used to call LOD, I met him on a local board. He was extremely knowledgeable, but always knew when to stop giving general information, never gave out ANY personal information, and never communicated for any length of time. The other guy was "Number 6" from TAP meetings in NYC. I met him a few times. Six was another older gentleman. He was very calm until anyone showed up with a camera. Then he "went off" until the camera threat was negated. This guy had a way of extracting information out of you without you even realizing what he was up to. As I recall people would ask him a question and he would simply turn it around and say, "well, what do you think (or know) about so and so" and the hapless phreak would spill his guts with Six taking notes and sometimes making corrections to what the phreak said much to the phreak's surprise. But Six never really gave out much information although it was completely apparent to me that he knew a great deal just by the way he carried himself. A few phreaks would try to follow him after the TAP meetings, but he always lost them without ever letting on that he knew he was being followed. It should be mentioned that paranoia can destroy you (as the song goes). A number of times I ran into real problems trying to escape from suspected problems that probably weren't anything to worry about. TK: What memorable H/P BBSes do you recall? LL: OSUNY: Caught the tail end when I first started. I was impressed. Plovernet: That BBS was crazy. Constantly busy since it had hundreds of active users and Quasi Moto let everyone post whatever they wanted and never deleted messages unless there was no disk space left. We helped start the "philes" trend there also. It was easy to spot who knew what they were talking about so I invited them onto the LOD BBS. Some of the people on the LOD BBS were then asked to join the now infamous LOD group. TK: (*Interrupts*) Did you ever think the group you started would become a household name in security and hack/phreak circles? LL: Although I knew the guys in the group were good hacks/phreaks, I had no clue of where it was leading. Since we did not tolerate destructive/ malicious behavior nor things like credit card fraud I did not think there was much risk in the group as a whole getting any real attention. Of course, all that changed with time. TK: Sorry for the interruption. Please continue. LL: Metal Shop Private: The users were idealistic and good natured which was refreshing. I liked it most because it was a good source of information/files and we were the first to see new Phrack issues. Farmers Of Doom: Mark Tabas did a fantastic job with this one. It was quite busy, but did not remain up very long. Phoenix Project: Again, another fantastic job. The Mentor had some rather unconventional ideas like letting security people on, which I thought was a good idea. RACS III: Tuc didn't give me the time of day at first, but eventually I got on. Then he took it down. Pirates Cove: The board in 516 (Long Island, NY). One of the classics. It's where I met Emmanuel Goldstein and invited him onto Plovernet to help sell 2600 subscriptions. Catch-22: Absolutely positively the most secure BBS I ever encountered. Besides passwording subboards along with requiring users to have a high enough security level to access them, it made use of many concepts from the "basic security model" introduced by Lampson and later augmented by Graham and Dorothy Denning. Of course Silver Spy and I had no clue what an access matrix was and things of that nature. A duress password was implemented so if someone got nailed they could enter the password, not compromise the system, yet appear as to be cooperating with the authorities who we presumably thought would ask the hacker to call. It was never used but nice to have. BlottoLand: Good board for a while, but he let too many of his "loyal subjects" on the system who were locals and they eventually overran it. TK: Do you REALLY think you are ELITE or what? LL: I really don't know how anyone got the idea that I considered myself elite. The only people who said I thought I was elite were those who I never met or talked to. Contrary to some people's belief, I never considered myself as elite. I was just a guy who liked to pass information on to others so I wrote some files. The files did help me get access to more information by making me more well known. When I read the newspaper, I'm one of those annoying people who keeps interrupting your breakfast to tell you details about all the neat stories. TK: Speaking about the group, what do you think about Erik Bloodaxe and others starting ComSec Data Security? LL: When I first called Bloodaxe after I saw them in the papers/magazines he thought I would be mad, maybe that he took my idea or something. I told him I am familiar with the computer security consulting business and don't want any part of it. It's too tough to get people to pay money for something that they cannot get a verifiable return on their investment. Besides, getting them to trust you with their inner most secrets is extremely difficult. I told ComSec to write articles about security until their fingers fell off. Legitimize themselves as soon as they can. There was too much prejudice out there against them with ComputerWorld leading the pack. I really think they could have helped some companies if given a chance. But I don't think they had enough knowledge about the whole security picture, i.e., Physical Security, Environmental Systems (fire suppression, UPS, etc), Administrative Security (Hiring/firing policies, etc.), what goes on in big IBM shops MVS, CICS, ROSCOE, etc. There is a lot involved. TK: How did you feel when Knight Lightning and Phrack erroneously insinuated that you might have informed on other hackers, maybe even the Atlanta Legion of Doom members a few years ago? LL: Well as you now know, Craig (KL) has seen all the documents and records from his trial and many documents from the Atlanta case and there was no mention whatsoever of me in regards to providing information, being a witness, testifying, etc. Although I haven't talked to the Atlanta guys since before their trial I am sure they know I had absolutely nothing to do with what happened to them. The real story has since come out. If there is one thing I hate, it's being accused of something you didn't do. If someone does something they are accused of, he should be man enough to admit it. I have said this before a number of times, I have never provided information to anyone about other hacks/phreaks that directly nor indirectly led to them being visited, arrested, or prosecuted. It's just not my way. What goes around comes around and that kind of boomerang is something I knew I didn't want to play with. My success in avoiding trouble is fairly straightforward: Most of all it was secrecy and misdirection (ala Stainless Steel Rat), avoiding phone company computers especially those in which I was a customer of (i.e., my local RBOC) because if you get THEM pissed at you, they'll get you one way or another. Also, lots of LUCK and not intentionally making any enemies although there have been a few hackers mad at me whom I never even talked to and I have no idea as to why they didn't care for me. TK: Do you have any advice for people out there who may want to begin hacking or phreaking? LL: I am not one to dictate what people should or should not do, but I wouldn't if I were them. The technology to prevent and detect security breaches and then to track down their source is ever improving. The Cuckoo's Egg (by Cliff Stoll) provides a good example of that. But that shouldn't even come into the picture. I think they should examine objectively why they want to do it. Then make an honest attempt at finding other legal ways to accomplish whatever they were trying to do. I don't care how you justify it, its dishonest. Forget about the law part of it. It just causes other people problems. I didn't know how much until my school's systems were hacked and I was unable to read my e-mail for a week. I was angry and thought to myself that I'd like to get my hands on that asshole hacker. Then I laughed for quite awhile realizing what I was thinking and the irony of it all. Poetic justice I suppose. None of my data was touched, but I was denied service and denial of service can be just as damaging. As for the challenge of it, well I can't deny that that was very addicting, but there are many legal ways to challenge yourself. TK: What conventions/involvements outside of phone calls have you done? LL: TAP meetings were probably the first. Then a Con in Massachusetts, the Con in Philly with Videosmith et al. and of course the few SummerCons (1987 and 1989) in St. Louis. There were some computer security conferences that were interesting also. Those helped to sensitize me to the "other side." TK: I remember at SummerCon '89 that you were accidentally caught on video tape for about 2 seconds and requested that it be erased, which it was. What is the deal with cameras? LL: It may sound a little odd, but I don't think anyone has the right to take another person's picture without their permission. Especially when the person who is on film has no idea where the picture will end up. I predict within 5-10 years maximum that states will start using video cameras to digitize your picture when you go for a new driver's license. The digitized image will be stored with the rest of your personal information and probably be available to people like private investigators and others who gain access to the information illegally. With ISDN, Multi-Media, etc., it will be possible to "set up" people very easily by altering images via computers, etc. to make them look like they are doing just about anything you can think of. When things like that start to happen I will not look crazy but smart, at least to my friends who think my avoidance of cameras is abnormal. Most Memorable Experience ~~~~~~~~~~~~~~~~~~~~~~~~~ TK: What are your most memorable experiences (funny things that happened to you during your phreaking/hacking or not so funny)? LL: Dr. Who in Massachusetts had a conference in which me, Tuc, and The Videosmith drove up at 4 AM in Tuc's VW Beetle hydroplaning all the way due to the rain, and dead tired. We were all in a silly mood and had a lot of laughs. Also, the time when I was in NYC with Paul Muad'Dib and we had no money to eat. He was the first person I know of who had any real knowledge of phone company switching systems. He engineered a switch in Manhattan to put call forwarding on a pay phone. Once this was done, all the money put into the phone would remain in the phone but would not drop into the coin box. Those who put money in didn't really have to since the phone was converted to a POTS (Plain Old Telephone Service). Alas, humans are creatures of habit. So after a couple of hours (since it was a busy phone) he had the guy put the phone back to the way it was. When this was done, all the money held in the phone was returned. It was like hitting the jackpot in Las Vegas. We then proceeded to McDonald's. The story about me running around naked in a Motel 6 parking lot that Control-C has tried to get people to believe is, of course, grossly exaggerated. His girlfriend hooked me up with a friend of her's. Dan and his girl were in another room. He called me to come over, but I was in my underwear. We had been drinking so I ran the 8 feet or so to his room (we were on the 2nd floor with a solid balcony so no one from the ground could see anyway), I said hello and then ran back to my room to go another round. Probably my favorite memory is relatively recent. J.J. Bloombecker, Director of the National Center for Computer Crime Data, spoke at my school. I sat in the very back as usual (I hate to have anyone sitting behind me, anywhere) in a room of about 40 people and listened to his speech which basically was to promote his book, "Spectacular Computer Crimes." I spoke to him but never let on who I really was. He talked about Craig's (Knight Lightning) case and then he went on about whomever named LOD, the Legion of Doom, should have named them something like the "Legion of Ineffectual Pansies." The reason being that, what prosecutor in his/her right mind would go to a judge and say how dangerous a group of ineffectual pansies are. I sat there trying not to blush and thinking that of all the hundreds of people he said that to, he probably never expected to say it to the person who really named the group. I did meet Donn B. Parker, whom I consider the father of computer security, twice. The first time I just shook his hand. The second time was relatively recently and we spoke for 20 minutes or so. I never told him who I really was, not that he would know anyway. But I complimented him enough so even if he found out, he couldn't have gotten too mad at me. TK: What were some of your memorable accomplishments (newsletters/files/etc.)? LL: The REAL accomplishments (non-files) will remain anonymous, but my favorite files were the IBM VM/CMS series because they were well written along with the Attacking, Defeating, and Bypassing Physical Security Devices series. Before I wrote a file I scoured boards and other traditional sources for the information I sought. If I came up empty handed, I researched it and wrote about it myself. Although the COSMOS files helped me get started, they were a complete joke. They provided enough information to be dangerous and didn't help my standing with the RBOC's. The VAX/VMS files got better as they progressed, but except for some of Part III they didn't provide much that wasn't available in manuals. I enjoy writing, but it usually takes me many revisions to get it just right. As for newsletters, the LOD/H Technical Journal is another thing that I was involved in. TK: What is the story behind the LOD/H Technical Journal? LL: The LOD/H Technical Journal almost never was. As you are aware, LOD had gotten a group of files together to be published in PHRACK as an "all LOD issue," but some of the members thought we should put out our own stuff. The idea grew on me and I said okay. I should let it be known that you helped us out for the first issue by spell checking it and performing some editing and critique. But we were only able to produce 4 issues since it was difficult in getting quality non-plagiarized or non-highly paraphrased material. After the third issue, I realized that I was probably not doing anyone any favors by exposing security holes and weaknesses in systems. Some people may not believe hearing this from ME, but I don't agree with those hackers who think they are doing people a service by exposing their system vulnerabilities. Nobody needs someone checking their door at night to see if its locked. And although the old door analogy isn't exactly the same as the pseudo-physical computer login, its close enough. Sorry about getting off the subject a little. TK: That's okay. Why did you quit the H/P community? LL: I wrote a letter to 2600 Magazine about a year ago that goes into it a little. Between that and what I've said here, it should be fairly apparent. In brief, I realized I was mainly in it for the purpose of getting information. It got too dangerous and I decided to direct my energy to graduating instead of how to defeat security systems. The thought processes involved in hacking and those in solving problems in Engineering Design are remarkably similar and I think my hacking experience makes me a much better designer and problem solver. Not that I am advertising for a job or anything... Lex's Favorite Things ~~~~~~~~~~~~~~~~~~~~~ Women: Without Diseases. Cars: So fast that you are terrified to put the pedal all the way down to the floor. Foods: Anything that does not contain pesticides, herbicides, heavy metals, radioactive elements, toxic chemicals, harmful microorganisms, artificial colors, or preservatives. I guess that rules out fish, produce, meat, processed foods, drinking water, and so on. In other words there's nothing left to eat. In all seriousness, I do like great big salads and if I was rich I would have an awesome wine cellar. Music: Heavy Metal, some Punk, and Classical. Authors: Richard P, Feynman, Isaac Asimov, Stephen Hawking, Jane Roberts, Budd Hopkins, Jacques Valee, Bruce Sterling, K. Eric Drexler, and Matthew Lesko. Books: I liked the Cuckoo's Egg, anything about physics, and non-kook metaphysical books. The only thing I collect these days are books. I have hundreds of them. Games: Atari's ASTERIODS DELUXE was probably the most difficult videogame ever (even though it's more than ten years old) and which I am one of the best there is at playing it. When it comes to this, I admit I AM Elite. There's almost no one on this planet who can beat me. Defender and Stargate are also great. They don't make games like they used to. And of course, the Ultima series. Actors: Dana Carvey, Bill Moyers, Patrick Stewart (ST:TNG), Jonathan Frakes (ST:TNG), Andy Griffith (Matlock), and too many movie stars to mention. The Interview Concludes ~~~~~~~~~~~~~~~~~~~~~~~ TK: Is there anyone specifically that you want to say a few things to? LL: To all those who subscribe to the "Once a thief, always a thief" mentality and to those few die-hard law people who would love to get their hands on me and other ex-hackers: Don't bother, people are basically good and can be "rehabilitated" without going to prison. LL: The other thing that I have never understood about the hack/phreak community is some of the obsession with tracking people down. I could understand it a little better when the reason was to check out others to make sure they were not feds. I never compiled lists of who I talked to with anything except their handle, first name, and phone number. I never CNA'd them for their last names, or tried to find out where they worked. But some guys just had to know everything about everyone. Don't they have anything better to do? I was careful yes, but not to the point of invading everyone's privacy especially when the person stated they just wanted to be left alone. I am not saying I NEVER invaded another's privacy, but I don't now and almost never did it in the past. I left an Internet mailing address at the beginning of this Pro-Phile so people can contact me. I don't mind talking to people, but I just don't think it's fair to harass and threaten people who don't want to be bothered. I am open to useful and constructive conversations via email, but I really don't think it's necessary to compile individual's personal information. I never did it and will never understand why people do it. Besides, it's no great accomplishment to find people these days. The ways of getting information are numerous and many are legal, so how much skill does it really take to get someone's info? Almost none. Anyone can do it... on just about anyone they want. TK: What do you think about the future of the hack/phreak world or telecom communications in general? LL: As for the hack/phreak aspect, every time I think hacking is dead and people would have to be deranged to break into computers or make phone calls illegally for free, I read about another hapless person or group of people who have done it. Don't they realize there are better and easier ways of going about whatever they are doing? Don't they realize that the technology to CATCH you is such that you have lost the fight before you even get started? Yes there will be new technologies that will help both sides, but there is the law of diminishing returns. As for what hackers should be doing, if anything they should keep an eye on our right to privacy. If it weren't for hackers, TRW would still be screwing people over (worse than they do now) and would have never apologized for not correcting invalid credit information. TK: And of course the question that no Phrack Pro-Phile does without... Of the general population of phreaks you have met, would you consider most phreaks, if any, to be computer geeks? LL: Absolutely NOT. I don't judge people on how they look anymore (yes I used to). As The Mentor so eloquently put it in his Hacker Manifesto (Phrack 7 and again in Phrack 14), of which this is, but a lame paraphrase, it's more important to relate to people on what they know and on their ideas than what they look like or what color their skin is, etc. And the vast majority have non-geeky ideas. TK: Thanks for your time, Lex. LL: Thank you for letting me ramble on for so long.