Carolyn P. Meinel Hall of Shame
Media Whoring
[My comments are in brackets. No portion of this article has
been left out.]
Carolyn Meinel -- Hack 101
People will tell you that there are some things in the world you
just can't teach. Carolyn Meinel would probably be among the first to
disagree. She has set about the task of teaching a skill she feels
will be increasingly important in the years to come -- hacking. This
mother of four, horse-trainer, and sometimes professor at the
University of New Mexico produces The Happy Hacker, a mailing list
devoted to bringing would-be hackers into the fold. Its methods,
simple; its results, startling. Through an up-beat, up-tempo style,
littered with "You Can Go to Jail for This" warnings, Mrs. Meinel
makes it not only fun, but also easy to learn basic hacking skills.
Carolyn recently took the time to have a little talk with verbosity
about her endeavors, past, present, and future.
verbosity: Okay, your background differs from a lot of the hacker
stereotypes we see today. Can you tell us a little about yourself and
how you got into hacking?
Carolyn Meinel: My first husband, H. Keith Henson, is a dynamite
hacker with a gonzo sense of humor. When we got married in 1967, I
was an Earth Mother type, content to bake bread, sew, garden and
raise children and chickens. But one day in June 1971, Keith
abruptly bundled me off to a University of Arizona summer class in
Fortran programming. I was hooked.
v: What inspired you to start The Happy Hacker? What do you hope to
accomplish as a result of it?
CM: All sorts of guys were begging me, "Teach me how to hack."
I'm an industrial engineer (MS, U of Arizona, 1983). I believe in
efficiency. Instead of teaching all these guys one-on-one, I
figured I'd set up a production line. Also, a bunch of elite
hackers joined the list so they can show off how brainy they are.
So they end up doing most of the work. I'm learning more than I
teach.
v: Have you gained any negative feedback from your work? Any hackers
getting incensed? Any attempted hacks on your person?
CM: Yeah. Hacker war-time. Here's a sample flame from a guy
styling himself "se7en": "You're claiming membership in a community
you have contributed nothing to, and are raping for information for
your own financial gain. You resort to blatant theft of material
and ideas from others so you can further your financial agenda."
The Happy Hacker What really bugs se7en and others like him is
that I'm sharing hacking information with anyone who wants to
learn. I'm showing people that hacking is actually easy to do. And
they're afraid I'll someday make money on a book about hacking.
Tough.
[What really bugs him (and me) is that you are teaching these kids
incorrectly. Your guides are full of contradictions and incorrect
statements.]
I had to move The Happy Hacker list twice after it got hacked.
Most system administrators chicken out in the face of even mild
hacker attacks. But now we are being hosted by Cibola
Communications in El Paso as a public service. Cibola sysadmin
Patrick Rutledge and the head sysadmin at the University of Texas
at El Paso, Gerard Cochrane Jr., are now holding the hack attacks
at bay. Actually, so far the hack attacks have been pretty lame. So
that tells me none of the truly elite hackers are excessively
ticked off at The Happy Hacker list.
[She says this after being hacked over a dozen times on five different
providers.]
v: You're a strong advocate of responsible hacking. What would you
define as responsible in the world of hacking?
CM: Anything short of accidentally setting off World War III.
Seriously, you can hack without breaking the law and without
harming anyone. Even the hairiest hacks such as breaking into the
superuser account of a computer or making it crash can be OK if the
owner of the computer has consented to the experiment. In fact,
sometimes several hackers make an agreement try to break into each
other's computers. It's the most exhilarating game on the planet!
[Yet she maintains that it was her idea of "king of the hill" or
"hacker wargames".]
Bottom line: follow the Golden Rule. It worked in Jesus' day.
It still works today.
v: What advice would you give a young pup, ready to break into the
world of bona fide hacking?
CM: Get a college degree in either math, computer science,
electrical engineering or industrial engineering. These all give
you the theoretical foundations you need to reach the stratosphere
of the hacker world. Also, spend every extra cent you have on
computer manuals.
Gerard Cochrane, Jr., is a great example. He's a graduate
student in computer science and owns $40,000 worth of manuals. He
has several secret hacker identities, each one more elite than the
last. "Kewl d00d" uneducated hackers are totally left in the dust
when they try to attack his University of Texas at El Paso (UTEP)
computers. In fact, sometimes people who try to hack UTEP suffer
mysterious problems...
Jerry adds, "A quest for knowledge is the biggest need.
Hackers explore possibilities and are not bound by traditions...we
always wonder how can it be done. We tend to self teach subjects
not covered in traditional schooling. I would say hackers are the
Electronic Scholars of this day and age."
Now Patrick Rutledge has a slightly different perspective. He
doesn't have a college degree (yet). But Patrick tells me "I think
the best hackers are uneducated but curious 12-year-olds with their
older brother's Commodore 64's and that is no joke, they are
probably the only people on the net who truly scare me. You don't
need a PhD to hack a system, actually SOME PhD's are the most
clueless people I know anyways, but maybe they are just as scary.
No offense if you know/are/see any PhD's ;)"
The important thing to remember is that it is much harder to
defend a computer than to attack it. If you can get a job as a
sysadmin, you can have all the fun of hacking but do it as the good
guy. And you'll know you are vastly better than the "code kiddies"
who go to places like the Scriptors of Doom website to pick up
programs (e.g. Perl scripts) to use to break into people's
computers. You'll be vastly better because every day you'll be
checking out all the websites and e-mail lists where hackers pass
out these "exploit programs." You'll be the one figuring out ways
to keep these programs from hacking your computers.
But the guys who are atttacking you will mostly be ordinary
back-alley hackers who barely know how to run a program, much less
patch a computer so it resists an exploit program.
v: Do you feel that there's been a bastardization of the term "hacker"
in recent years? Is it becoming too synonymous with "warez puppy" in
many people's eyes?
Quote CM: I'm even more worried about the confusion of us
old-fashioned harmless hackers with criminals who enjoy "cracking"
into the computer of someone who doesn't consent to the attack.
These crackers often do serious damage before they leave. The
hacker code of ethics -- yes, it does exist -- says you should
never harm anyone else's computer.
I'm also bothered by people who ascribe almost supernatural
talents to hackers. Like the Superman episode in which Jimmy
complains that a hacker blew up his TV. OK, it was meant as a joke.
But does the average Superman viewer know that it is impossible for
someone to use a computer to blow up his or her TV?
v: In recent months, the media has been giving increased coverage to
hackers and their deeds? How do you feel about the way the media has
been treating hackers? How about the hacks on government web sites?
CM: The media should get a life. Sheesh, they make such a big
deal over this stuff, like it takes an act of supreme genius to
steal credit card numbers or hack a Web site.
On the other hand, putting pornography up on a government Web
site was pretty childish. If I were to hack a Web site, it would be
to play out a harmless practical joke on a good friend. Oh, oh, I
can see all my friends rushing out to secure their Web sites...
v: As a hacker, how secure would you feel in ordering products via the
Internet with your credit card? Is the technology approaching
hack-proof, or is there still a long ways to go?
CM: I've had my credit card abused. Big deal. Two teenagers used
it to buy computer games and subscribe all their friends to
Prodigy. I protested the charges and got them removed.
You are more likely to get your credit card misused by buying
something from a telephone solicitor than through some sort of
computer attack. In fact, that was how those teens got my credit
card number. They pretended to represent my ISP.
So, yes, we still have a long way to go on credit card
security. But compared to all the other ways to commit credit card
fraud, the Internet is still in the noise level.
v: What would you say is the "best" (or most impressive) hack you've
ever been made aware of?
CM: It was back before most of today's hackers were even born.
In 1968 a group of computer scientists at the University of
Illinois at Urbana-Champaign got funding from the Advanced Research
Projects Agency to set up the first nationwide computer network:
Plato. It was four CDC 6400s ganged together. Attached to them were
1024 dumb vector graphics terminals with touch-sensitive screens.
Plato hosted the first flight simulation programs in history.
We could fly MIGs, Phantoms, F-104s, X-15s, Sopwith Camels -- you
name it. Anyhow, these simulators were all tied into this air fight
game. We'd buzz around shooting each other down and bombing each
other's airports. We also could hurl insults at each other via text
messages displayed at the bottom of the screen. I remember making
too tight a turn in my Phantom while trying to evade an air-to-air
missile. The screen went blank to simulate me blacking out. Then
the message cam up: "You just pulled 47 g's on that turn. You now
look more like a pizza than a human being as you slowly flutter to
Earth."
Of course this was just too good to resist. One day in 1974 (I
think) some guys programmed in the Starship Enterprise. They came
bombing in from outer space, shot everybody down and then vanished.
v: Hollywood has also become interested in the hacker over the past
decade, dating as far back as War Games. Do you feel that their
portrayal has been a positive thing for the hacking community? Do you
have any personal favorite hacking movies?
CM: I adore Sneakers (1994 release). The writer/producer, Larry
Lasker, is really into this stuff. Basing a plot on what would
happen if someone were to discover a polynomial-time-bounded
algorithm for factoring numbers is beyond cool. The car chases and
murders were pretty good, too. And the sex scenes. OK, just kidding
there. Sneakers has no sex scenes and minimal violence. It's a
great movie to show to children, yet is deep enough to entrance
even a jaded, ancient hacker like me.
Quote v: Where do you see the Internet five years from now?
CM: I can hardly wait for China Online and a billion clueless
newbies posting to Usenet. Hackers from Uzbekhistan and Madagascar
ping flooding each other off IRC. Spam from Mongolia. Kewl.
v: Where do you see yourself five years from now? Any upcoming
projects you'd like to talk about?
CM: I want to improve my wool-spinning and bread-baking skills.
Maybe some of my four daughters will have produced grandchildren by
then. I figure around age two or three is a good time to start them
on hacking.
v: What's the typical daily routine for Carolyn Meinel?
CM:
* 6:00 AM -- feed horses
* 6:30 AM -- read e-mail
* 7:00 AM -- do something to make money
* 7:15 AM -- wow, I wonder if it will work! I get on my shell
account and try out a new way to forge headers on e-mail
* 8:00 AM -- try again to do something that makes money
* 8:15 AM -- rush over to Scriptors of Doom website to check out the
latest HP exploit code. Regret that no one will give me permission
to try to crack their HP box.
* 9:00 AM -- try again to make money
* 9:15 AM -- e-mail
...
* 4:00 PM -- start bread
...
* 10:00 PM -- get Happy Hacker Digest out
* 10:15 PM -- beddy-bye
* 3:00 AM -- wake up. Gosh, did someone send me exciting e-mail in
the middle of the night? Rush to computer. Wow, look at this:
[Consistancy Alert! Above she condems those people who rush to sites
for the latest script that someone else wrote. Yet she does it
at 8:15 every morning.]
From: Don Whiteside
This URL is most fun when you add something to it. Namely:
http://web-proto.ua.com/cgi-bin/sfx/http://your.url.here
Some suggestions:
http://web-proto.ua.com/cgi-bin/sfx/http://www.duke.org
http://web-proto.ua.com/cgi-bin/sfx/http://www.microsoft.com
http://web-proto.ua.com/cgi-bin/sfx/http://www.apple.com
I rush to the Web and enter an URL. I desperately stifle my
laughter. Don't want to wake up the family! Don't want them to
discover I'm sneaking in wee hours time on the computer again!
v: If you could let the world know any one thing about you, what would
it be?
CM: Forty-two.
Also, Evisance University has back issues of The Guide to
(Mostly) Harmless Hacking. You can subscribe to our e-mail list by
mailing hacker@techbroker.com with the message "subscribe."
We'd like to thank Carolyn for the awesome interview! Be sure to
check out her Guide to (Mostly) Harmless Hacking archives here and
here, get on the discussion group, or join up on the list today; it's
well worth your time. Who knows? Maybe you have that hacker ethos
buried deep inside...
_________________________________________________________________