IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled

 
                          

 


 

                                             
                                        
      _____ _            _   _            _    _   _       _     _   
     |_   _| |__   ___  | | | | __ _  ___| | _| |_(_)_   _(_)___| |_ 
       | | | '_ \ / _ \ | |_| |/ _` |/ __| |/ / __| \ \ / / / __| __|
    .: | | | | | |  __/ |  _  | (_| | (__|   <| |_| |\ V /| \__ \ |_  :.
  .::: |_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\\__|_| \_/ |_|___/\__| :::.
.::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::.
:::::::::+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+::::::::
:::::::::|E|l|e|c|t|r|o|n|i|c| |C|i|v|i|l| |D|i|s|o|b|e|d|i|e|n|c|e|::::::::
:::::::::+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+::::::::
..........................:[www.thehacktivist.com]:.........................
    
                     _ _.:'¤~¤':._.:'¤~¤':._.:'¤~¤':._ _
....................(_(_(_(The Hacktivist Magazine)_)_)_)...................
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
                                                      (V. 2.0 February 2001)
                   
      Contents:
      ~~~~~~~~~
      [01] Introduction........................................metac0m
      [02] Media Watch.........................................metac0m
      [03] Interview with WFD..................................metac0m
      [04] Linux and the protest movement ..........the electrohippies
      [05] The CyberArmy.......................................Phydeau
      [06] The Real World......................................metac0m
      [07] Interview with VR...........THOMAS ISLER AND OLIVE ZIHLMANN
      [08] My Love / Hate Relationship With Technology..........Scully
      [09] On The Strategic Use of Spam......................Anonymous
      [10] Zapatista Tribal Port Scan .............................EDT
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | THE HACKTIVIST CONTAINS INFORMATION THAT IS TO BE USED FOR      |
    | EDUCATIONAL PURPOSES ONLY. IN NO EVENT WILL THEHACKTIVIST.COM   |
    | OR THE HACKTIVIST MAGAZINE BE LIABLE TO ANY PARTY FOR ANY       |
    | DIRECT, INDIRECT, SPECIAL OR OTHER CONSEQUENTIAL DAMAGES FOR    |
    | ANY USE OF THIS WEB SITE, FILES CONTAINED THEREIN, THIS TEXT    |
    | FILE OR ANY OTHER HYPERLINKED WEB SITE, INCLUDING, WITHOUT      |
    | LIMITATION, ANY LOST PROFITS, BUSINESS INTERRUPTION, LOSS       |
    | OF PROGRAMS OR OTHER DATA OR OTHERWISE. SHOULD YOU CHOOSE TO    |
    | USE THE INFORMATION CONTAINED HEREIN FOR ANY PURPOSES           |
    | THE CONSEQUENCES OF YOU ACTIONS ARE SOLELY YOUR RESPONSIBILITY. |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 
.::[01]-[Introduction/What's New]
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::[metac0m]
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
The Hacktivist has survived its first month in production and the response has 
been overwhelming. We've had emails of support from around the world and things
are looking good.

There are a few new projects on the go and we'll keep you 
updated as they come into existence. We now have an IRC channel setup:

irc.afternet.org
port: 6667
channel: #Hacktivism

Once again The Hacktivist appreciates any articles/writings that you, the reader, 
could contribute. We are trying to sustain a dialog, a discussion actually, and 
your responses to past articles and your own views for future articles would be
greatly appreciated.

The discussion board is up and running. Please make use of it to discuss your views 
on hacktivism.

The Hacktivist would like to thank the WFD for a great interview along with all the 
other contributors: www.nettime.org, the electrohippies, the EDT, Scully from 
cipherwar.com, Phydeau and cyberarmy.com along with all the rest of our contributors 
and friends.

A special shout out to Oxblood Ruffin of the cDc, thanks for your insights and advice.

Any perl programmers wishing to get involved in a future project please contact
metac0m@thehacktivist.com

Peace.
metac0m

fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff 
 

.::[02]-[Media Watch]
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::[metac0m]
:::[http://thehacktivist.com/mediawatch.html]::::::::::::::::::::::::::::::::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Of  hacktivists and hackers
http://www.lanka.net/lakehouse/2001/01/14/fea07.html

The familiar neighbourhood activist ever eager to stage a sit-in or join a 
picketline may never quite go out of fashion but they should be looking out 
for some competition from a new breed of protesters called "hacktivists". 
-----------------------------------------------------------------------------

Publisher Appeals Injunction Against News Story
EFF & 2600 File Strong Appeal in DeCSS/DVD Case
http://www.eff.org/IP/Video/MPAA_DVD_cases/20010119_ny_eff_appeal_pressrel.html

On behalf of a magazine and its editor, Internet civil liberties group the 
Electronic Frontier Foundation (EFF) today asked a federal appeals court to 
overturn a lower court's interpretation of the Digital Millennium Copyright Act 
(DMCA) as creating an unconstitutional restraint on free expression. 

EFF appealed a lower court's injunction against 2600 Magazine preventing it from 
publishing and linking to information about how DVDs work as part of its news
coverage of the debate surrounding the encryption applied to DVDs. The banned 
information is a computer program called DeCSS that decrypts the data contained 
on DVDs. 
------------------------------------------------------------------------------

CyberArmy declares war 
http://www.zdnet.com.au/news/dailynews/story/0,2000013063,20150480,00.htm

With a member base of 35,000, CyberArmy may have the biggest armament the Net 
has ever seen, rallying to take down Web sites that 'abuse' the World Wide Web - 
and removing power from governments. 
------------------------------------------------------------------------------

Pentaguard defaces multiple government Web sites in US, UK and AU
http://attrition.org/security/commentary/pentaguard0119.html

Tonight the Attrition.org staff has mirrored one of the largest, most systematic 
defacements of worldwide government servers on the Web. The defacers, known as
Pentaguard, took out various government Web sites from 3 countries - the United 
Kingdom, Australia, and the United States.

While the message was the same on all Web sites targeted, we are intrigued by 
the fact that this was not a mass defacement of a series of government Web 
sites within an agency or even within a country - but 3 different nations in 
different time zones all at the same time with all sites remaining defaced 
for a period longer than 15 minutes.
-----------------------------------------------------------------------------

Anti-Fur Protesters Post Protest on Chanel Web Site
http://dailynews.yahoo.com/h/nm/20010123/wr/fashion_protest_dc_1.html

Animal rights activists hacked into French fashion house Chanel's Web site 
and posted a protest against fur clothes only hours before the label 
presented its latest haute couture collection Tuesday.
-----------------------------------------------------------------------------

Hackers replace Ariel Sharon website
http://www.ananova.com/news/story/sm_191321.html

The website of Ariel Sharon, favourite to win the Israeli election
on February 6, has been removed by hackers.

It has been replaced by a site criticising him and praising Palestinians.

Israel radio's internet reporter, Eli Hacohen, said the website
was replaced by a "well-constructed" one with slogans
"blasting" him.

The rogue site includes pictures and slogans praising the
Palestinians and Hezbollah, the Lebanese guerrilla group that
fought Israeli soldiers during an 18-year-long occupation of
south Lebanon.
-----------------------------------------------------------------------------

World Economic Forum hacked 
http://www.theregister.co.uk/content/6/16624.html

Intruders, possibly hacktivists, compromised a computer network of the
World Economic Forum and obtained credit card details from a number
of its attendees during its annual meeting in Davos, Switzerland, Reuters
reports. 
-----------------------------------------------------------------------------

Anti-Globalists Turn To Hacking 
http://dailynews.yahoo.com/h/ap/20010207/tc/hacktivism_1.html

This week, similarly motivated ``hacktivists'' grabbed headlines, announcing 
they'd collected credit card and other personal data on some 1,400 business 
and political leaders by breaking into the database of last month's World 
Economic Forum.

Increasingly, social activists have turned to hacking to make their point, 
breaking into computer systems and wreaking havoc on organizations they oppose. 
The Internet has turned out to be a remarkable tool for nonviolent protest on a 
scale activists could only dream of before.
-----------------------------------------------------------------------------
Network of dissent 
http://www.thestandardeurope.com/article/display/0,1151,14752,00.html

The battle lines have been drawn, and the Web is proving to be a key battle
ground for the social protest movement - as the alternative forum to Davos
proved.

"Knowledge and information are the common property of humanity as
a whole: they cannot be transformed into merchandise" - this was
one of the many slogans of the WSF, and one which, like the rest,
was little examined for its practicality and its financial sustainability.

But it expressed an ideal: that corporations should not be allowed to
monopolise the creation or ownership of the data on which public life
depend. It was, for the first time, a drawing of the battle lines of the
information age.
-----------------------------------------------------------------------------

FBI Renames Carnivore
http://www.business2.com/content/channels/technology/2001/02/14/26317

The Federal Bureau of Investigation has given its controversial
Carnivore email-watching technology a new name, "DCS1000", the FBI
announced Tuesday. But the new moniker hasn't pacified consumer
privacy advocates, who continue to fight the use of Carnivore. 
-----------------------------------------------------------------------------
Cyberspace Is a Human Rights Frontier 
http://www.iht.com/articles/10762.htm

Internet access free of arbitrary or punitive
governmental restrictions may be potentially the most
significant weapon in the fight for human rights.

This has created a dilemma for countries that wish to profit from
the opportunities of e-commerce but want to keep this
democratic genie trapped in its bottle. Tunisia has made
Internet access increasingly affordable through government
controlled Internet companies - but routinely censors Web
pages. Cuba has criminalized unauthorized Internet access.
The Chinese have created special Internet police in 20
provinces to ban "objectionable" postings.
-----------------------------------------------------------------------------

Are Privacy Issues Coming Out on the Web for Gay Consumers?
http://gay.onmoney.com/Editorial/plan/luken/gaypriv1.html

Online or offline, nobody wants private information shared with someone else 
without his or her permission. But more consumers than ever are opening themselves 
to that possibility as they surf the Web, and end up with cookies placed on their 
computer hard drives because of their visits to certain Web sites. 

Marketers reassure everyone that those curious electronic markers are used only to 
gather aggregate data. Businesses, they say, use the information to extend offers and 
better customer service, but there is no identifying user information being shared. 

Some in the gay and lesbian community are not so sure. Many are concerned that online 
marketing technology is getting a little too user-friendly for everyone's comfort. 
And human rights activists say that even in these somewhat more progressive times, 
creeping paranoia about the online world among gay Americans is somewhat warranted. 
That is particularly true when one's online identity intersects with their offline 
employment. 

Only 251 of the Fortune 500 companies maintain a written nondiscrimination policy on 
sexual orientation, according to the Human Rights Campaign in Washington, D.C. 
Another Washington-based group, the National Gay and Lesbian Task Force, says it is still
legal in 39 states to deny employment based on a person's sexual orientation. 

fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff

.::[03]-[Interview with The Worlds' Fantabulous Defacers (WFD)]
:::::::::::::::::::::::::::::::::::::::::::::::::::::[Interviewed by metac0m]
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

metac0m:
Can you tell me a little background info about the World's Fantabulous
Defacers (WFD) regarding when it was formed as group, its members, and
its goals?


WFD:
The WFD was formed at around mid-November when the Mid-East cyberwar was at its 
peak. We have around 12 members and some are more active than others.  Our main 
goals as far as the Middle East cyberwar is concerned were and are to raise 
global awareness on Israel's inhumane dispossession, subjugation, and aggression 
against the Palestinian people, a tragic tale that has lamentably been going on 
for 53 years.  Furthermore, we decided to follow suite with raising global awareness 
in other such places in the world, in which the repressive forces of tyranny have 
oppressed human populations, limited freedoms, and violated even the most basic 
human rights of people.  These places are Palestine, in which Israel has, since 
its fateful inception in 1948, waged an ethnic cleansing campaign against the 
indigenous, native Palestinian population, literally stripping a whole people of 
their native land, driving millions from their homes into destitution-full refugee 
camps, murdering in cold blood over 1 million people, torturing others horribly  
- even children -  in overcrowded, dungeon-like jails and etc. etc. etc.  The list 
goes on and on. And all this is documented by acclaimed human rights groups like 
Amnesty International and Human Rights Watch.  Similarly, the Indian occupation 
army has denied the people of Kashmir their inalienable right to self-determination 
(a right guaranteed to them by U.N. resolutions) and has instead suppressed a 
popular rebellion movement that began in 1989 by going on a campaign of murdering, 
gang-raping, looting, torching, and other heinous actions in Kashmir. The same goes 
for Chechnya, in which more than a million people live as refugees and are dependant 
everyday on food from humanitarian agencies in order to survive.  In both Kosova 
(Kosovo) and Bosnia, Yugoslavia committed mass genocide against innocent populations, 
and there is still unrest in both places.  So essentially, raising "global awareness" 
through defacement campaigns (we have never harmed any data/files) has been our overall 
goal, although our goals are gradually evolving, as you may see in our future operations. 


metac0m:
Your slogan is "Fighting against injustice and oppression... Hacking for
worldwide truth", are your motivations this altruistic? What is WFD's
primary motivation and what results do you expect to see realized as a
result of your activities?


WFD:
We do like to see ourselves as fighting against injustice and oppression, and hacking 
for world-wide truth, although we realize there certainly is a limit to the extent of 
our "fight against injustice and fight for truth" and what it can feasibly accomplish.  
There is definitely a degree of altruism involved in our motivations, because we really 
feel for those in the world who are...fettered by the chains of oppression, those who 
cry out day and night for emancipation, patiently persevering for their call to be heard.  
All these people desire are their rights to life, liberty, and the pursuit of happiness 
(as Thomas Jefferson eloquently wrote) , and yet they are denied these fundamental 
freedoms by transgressing tyrants like the Israeli government and army, Indian government 
and army, and the other tyrants that be in the world.  We feel close to the oppressed whom 
we feel we are defending, so it is certainly the one thing that drives us, but let it not 
be forgotten that the REAL individuals who unselfishly feel for the common welfare of 
humanity - those whose motivations are entirely and truly altruistic - are the human rights 
agencies like Amnesty International, Human Rights Watch, and the U.N. human rights teams 
among others, and relief agencies like Doctors without Borders, U.N. Food Program, 
Benevolence, among thousands of other relief groups.  These are those who are so benevolent 
that in order to aid those in need, they even risk their lives on the battlefields, whilst 
we hack happily from the comfort of our homes.  The U.N. human rights team's vehicles have 
been shot at repeatedly by Israeli gunfire, yet they persist in their mission to find the 
truth about what is happening in Gaza, the West Bank, and East Jerusalem.  Amnesty 
International faced abuse by Israeli authorities in their visit to the Occupied Territories 
as well but they too found the vile facts that the Israeli government and IDF 
(Israeli Defence/Death force) wanted to keep hidden from the world.  Our primary motivation 
also stems from the flagrant lies the Western media has reported and has continued to report 
since the beginning of the Palestinian uprising against the cruel Israeli occupation 4 1/2 
months ago, lies that we feel are heinous crimes in themselves - blatant Israel propaganda, 
myths, distortion of facts, and falsehoods about the Middle East perpetrated by Western mass 
media outlets such as CNN, the New York Times, and countless other networks and newspapers 
against good-willed, good-hearted American, Canadian, and other Western populations.  The 
results we expect to be seeing as a result of our activities, especially our more high-profile
activities, are, at the very least, an increase in awareness amongst people and a sincere 
desire amongst people to view both sides of the story.  In times like these, it's natural for 
each side to accuse the other of spreading propaganda, so what we say is let the people read 
both viewpoints (not be fed by continuous one-sided extremist/fascist drivel as most Westerners,
especially Americans, are by the vast majority of their super-pro-Israel newspapers and news 
stations), so they can judge the truth for themselves, and verily, it is always the truth that 
prevails.



metac0m:
What is the "Kashmir Day hack attack"? 
http://attrition.org/mirror/attrition/2001/02/04/www.allaboutpm.com/
http://attrition.org/mirror/attrition/2001/02/05/www.doeacc.org.in/
http://attrition.org/mirror/attrition/2001/02/03/www.ivcaonline.com/
http://attrition.org/mirror/attrition/2001/02/02/www.indialegal.com/
http://attrition.org/mirror/attrition/2001/02/01/www.numtv.com/


WFD:
The Kashmir day hack attack was intended to be a mass defacement marathon on a good
amount of potentially strategic India web-sites.  It was originally intended to 
coincide with Kashmir Solidarity Day, which was February 5th.  The operation never 
really materialized, so it was more or less just an average series of defacements.  
The situation in Kashmir has once again turned for the worst and once again the Indian 
occupation army in Kashmir has shown its true face to the world.  4 Kashmiri civilians 
who were protesting, along with several hundreds, the arrest of a prominent activist were 
shot dead February 15 by Indian troops.  On the 16th, another civilian was killed by Indian 
troops.  The Indian army continues to be in defiance of the Universal Declaration of Human 
Rights and the 4th Geneva Convention.  They continue with their human rights abuses against 
the Kashmiri population.  Once again, we, like Gforce Pakistan has said, say that 
self-determination for the Kashmiri people is the only solution.  Kashmir is their home, 
their land:  Let them decide what they want to do!  Whether they want to join Pakistan 
(which many of them have said they do), or whether they want to have their own independent 
state, let them decide.  In any case, India does not by any means have the authority to dictate
the wills and aspirations of the people of Kashmir.  And it's high-time for the lying 
hypocrites in the Indian government to realize that.  If they don't see it now, they will 
eventually see it when they face the inevitable consequences of the armed struggle that is 
being carried out by several freedom fighter groups in Kashmir.


metac0m:
The WFD seems to have an added level of intentionality behind
defacements and I'm particularly thinking of the defacement of Ariel
Sharon's website with a quite lengthy account of his past, a bloody past
that the mainstream media has glossed over. Can you describe the
decision making process that led to the Sharon defacement and what
effect you think the defacement had on the public?
http://attrition.org/mirror/attrition/2001/01/30/www.sharon.org.il/


WFD:
The hack on Ariel Sharon's official election campaign web-site was by far the most 
well-coordinated attack that our group has carried out.  From meticulously planning
to finally executing, this attack was an exceptional team effort that we hope to 
mirror - perhaps even surpass - in the future.  And we tried to time the attack so 
that it would be on the eve of the Israeli elections.  Part of the inspiration for 
this attack came from Dr. Nuker's hack on the American Israel Public Affairs 
Committee (www.aipac.org) in November.  That was probably the single most effective
act of "hacktivism" in the entire Mid-East Cyberwar.  AIPAC is the single most 
powerful pro-Israel lobby in all of America and seeing that Dr. Nuker had not only 
defaced their site but had also gained access to credit card numbers and other 
sensitive information, really motivated us to emulate and follow with a similar 
type of attack that would  send a strong message.  We feel the most important thing
in our defacements, especially the big-shot defacements such as the Sharon one, is 
the message sent.  Therefore, the very first thing we did after finishing up the 
technical details of the hack itself, was to make the defaced site.  Basically, 
all we did was make a spin-off of the original www.sharon2001.com/www.sharon.org.il
web-site.  We changed around the images, modified the gif animation, made our own 
images and text explaining in detail the truth about the murderer Sharon.  We felt 
very proud of what we were doing.because here is a man... who was not content with 
Palestinian and Lebanese children bleeding profusely in ambulances, but was so vile
and sick that he ordered his men to bomb these ambulances, so that, in his own words
"no child be left alive to fight for Palestine's freedom."  And it still goes on.  
Israeli troops routinely shoot at Palestinian ambulances, and then when the world 
asks them why, they either tell them that it was (1) Palestinian gun-fire that hit 
the ambulance (2) Palestinian propaganda and that the world media should pay more 
attention to stone-throwing terrorists who are "besieging" Israel with rocks (3) 
the ambulances have weapons in them (4) Arafat's fault.  You see, they like to 
blame everybody but themselves.  Getting back to the subject of the Sharon hack...
Reflecting back on it now, we feel we could've done a better job as far as the 
message went.  We emphasized Sharon's evil role in the utter annihilation of the 
Lebanese people, but I think we could've gone further in his bloody past, like the 
massacre he led in Qibya in the 50's, when he and his men threw grenades through 
the windows of all homes in a Palestinian village at night, or how he organized 
the massacres at the Shabra and Shatila refugee camps in '82( which we did 
indirectly refer to), in which over 2,000 refugees who thought they were under 
the world's protection were horrifically slaughtered in a period of 48 hours.  
Sharon was the man responsible for the bulldozing of thousands of Palestinian 
homes in order to make room for more illegal Jewish settlements.   And Sharon 
has committed so many other crimes against humanity....Quite literally, Ariel 
Sharon's bloody stains are so much that they can never, ever be washed away.  
That being said, it was our utmost pleasure to hack this murderer's official site.  
What was even more satisfying was that we were able to snatch an extra goodie - a 
database apparently related to voting.  Israel radio's internet reporter was right when 
he speculated that the database was in our hands.  This subsequently resulted in our hack 
having a double impact, since it was a defacement + something important was stolen.  
As far as the effect the defacement had on the public, we certainly hope people heard of 
it and upon hearing of it did their own research on Ariel Sharon, and found the truth on 
this despicable, animal of a man.   Israel radio covered our hack on Sharon's site and we 
think Abu Dubai television, an Arab satellite channel watched in the Palestinian territories, 
also covered it.  Several prominent web-sites covered it such as CNN and BBC, but we don't 
know if they actually had the stories on their television broadcasts.  Anyhow, we feel it 
gave the public a chance to remind themselves of who Ariel Sharon really is: a cold-blooded, 
merciless murderer who will most likely lead the Middle East, and perhaps the world, into war.  
You see, the Western media was trying to "purify" Sharon's abominable atrocities by making him 
out as a "grandfather" and "family man" and this was really angering us...but the truth will 
eventually prevail...


metac0m:
Do you feel that the WFD is taking the lead when it comes to the
effectiveness of defacements, the quality and content of defacements,
and will others follow your lead?


WFD:
Whether we are taking the lead is up for our viewers to judge.   We feel that some 
of our defacements were better than others.   We feel the Sharon defacement was 
definitely one of our more superior ones and we think our most recent flash movie 
regarding freedom was also a high point, and we are under the impression that our 
pictures and captions depict the whole story in a nutshell.  There is still room 
for improvement in all aspects of our defacements.  Once we get more cohesive as a 
team, the quality and content of our defacements overall will greatly improve.  As 
for others following our lead, if indeed we do possess a lead,  we certainly hope 
so.  It will certainly be exciting to see other groups fighting for a cause similar
to us. 


metac0m:
Hacktivism is a term that has been thrown around quite frequently lately
but there is currently much discussion and debate on the theory and
practice of hacktivism and particularly on the methods used to challenge
institutions engaged in criminal or unethical activities. What is your
understanding of hacktivism?


WFD:
Hacktivism is e-rebellion, e-protesting, e-activism.  It can be in whatever form 
you want to be... Although nowadays, when one thinks of hacktivism, one most likely
thinks of defacements, which is what we have been mostly doing.  However, the 
recent hack on the World Economic Forum proves that hacktivism, if applied in 
previously unexplored frontiers, has the potential to be so much more.  The 
definition of hacktivism, we feel, is still being formulated, and that the way it 
is defined will undergo drastic changes in the years to come.



metac0m:
Some have suggested that defacements require little technical expertise
and are really the work of script kiddies and that political concerns
are merely used as a cover. Furthermore, does it not violate the freedom
of speech of the target. Do you feel that defacements should be
considered a form of hacktivism?


WFD:
We're not concerned with technical details.  Some of our hacks have been relatively
simple while others have been rather challenging, not that it matters.  As long as 
you hit the right sites, we are beginning to learn, it doesn't matter how you get 
in, whether the method is by a conventional exploit, or by a more careful, 
step-by-step approach on what would be defined as a "harder" system.  This is why 
we intend to hit more targeted sites in the future, rather than just random .il or
.in sites.  We're not 'elite' hackers, and we don't care for showing off any skills.
However, if we must become 'elite' hackers in order to send the message of truth, 
and hit more strategic sites, then we will certainly do so.  Most of the sites 
attacked were random .il or .in sites, but a number of sites were specifically 
targeted, such as the Anti-Defamation League, SFOR in Bosnia, Human Rights Office 
in Bosnia, Newspaper Association of America, and Ariel Sharon's election campaign 
site among some others.  Defacements should certainly be considered a form of 
hacktivism because they can potentially send a clear message, and we feel that the 
Sharon hack particularly was a successful act of hacktivism.  And there are those 
who argue that defacing violates freedom of speech - which is supposed to be an 
innate factor of the internet which every individual has the right to exercise.  
Here's what we say:  We don't believe in free speech for war criminals.  After you 
murder over 30,000 people, after you dispossess, destroy, and dehumanize a whole 
country of its infrastructure, its economy, and most of its people (what Sharon 
did in Lebanon), after you massacre over 2000 refugees who are already living in 
poverty in overcrowded refugee camps (what Sharon organized in '82), when you 
bulldoze away the homes of native people and build illegal homes for other people 
in their place (another thing Sharon was responsible for), you've lost your freedom
of speech in our eyes.  As far as the random sites we hit go, their freedom of 
speech is not being challenged.


metac0m:
The focus of your defacements seems to primarily concern the actions of
states (Israel, India etc...) and politically volatile regions such as
Bosnia, Palestine, Chechnya, and Kashmir. Additionally, there seems to
be a heavy Islamic influence on the content of your defacements
including support for Hezbollah. How do you view the struggle to
maintain e-rights, freedom of speech and information, and the general
health of the Internet?


WFD:
First of all, note that on the mirror of our hack of Sharon's site, all we said 
regarding Hizballah and Palestine was "Long Live Hizballah!" and "Long Live 
Palestine."  The vast, vast majority of the defacement was spent severely 
criticizing Ariel Sharon and giving pictures of his victims and facts regarding 
the ruthless crimes he committed.  Now look at the media.  The media says that we 
"included slogans and pictures praising Hizballah and the Palestinians".  We didn't
have one picture praising anybody.  All our pictures, if they should have had any 
effect, were to denounce Sharon and the brutal atrocities he committed against the 
Palestinians and the Lebanese people.  The Western media portrays Hizballah 
(Hezbollah) as a terrorist group.  Yet anybody familiar with the history of events 
in the Middle East knows that Hizballah (which means Party of God) was formed after
the Israeli invasion of Lebanon which, under the command of Ariel Sharon, destroyed
Lebanon's economy, infrastructure, schools, hospitals, cities, and most of all, its
people.  Hizballah was created in order to fight the ILLEGAL Israeli occupation of 
Lebanese land, an occupation illegal under international law.  Israel still 
occupies the Shebaa Farms, which, once again, is not Israel's land.   Hizballah 
fought for freedom against a violent, blood-thirsty aggressor that annihilated its 
country.  But ofcourse the Western media will never tell you this, nor will they 
ever tell you that Israel besieged Lebanon in '82, and if they do, they will say 
it was a "Israeli crackdown on the militant PLO," when it was in reality an 
Israeli-planned genocide of a whole nation.  That being said, some WFD members are 
Muslim, others are not, but we're united nonetheless towards the goal of spreading 
the truth, and support of Hizballah is there because they're a group of freedom 
fighters who fought - and won with their perseverance and steadfastness - against 
the tyranny of Israeli occupation in southern Lebanon, the same way the 
Palestinians, Kashmiris, Chechens, Bosnians, Kosovars, and all oppressed 
populations all over the world will, by God's grace, one day gain their freedom.  

E-rights will never be taken away.  The internet is an open platform for any and 
every idea, and it is a just platform because both sides of a story can be heard 
unambiguously,  whereas in certain mass-media outlets, only one side of the story 
is constantly heard.  The health of the internet is very well, and the internet 
is proving itself to be a formidable opponent to the lords of the mass media who 
glorify how they can manipulate the minds and hearts of people with their lies.  
Once upon a time, Israelis in particular could hide the crimes they committed 
because no media in the West, especially America, would dare criticize Israel or 
its policies.  However, with the birth of the Internet, the voice of the common 
person cannot be silenced, despite efforts by a certain few who do wish to censor 
the truth.  The Anti-Defamation League (www.adl.org, whose site we defaced in 
December), to cite an example, is attempting to censor the internet on behalf of 
Israel with what they call an "anti-hate software program" that claims to "keeps 
children out of hate sites."  Very ironic that some of these "hate sites" include 
web-sites that present political views from Palestinian and Arab perspectives, as 
well as sites that document Israeli human rights abuses throughout the past 53 
years in the Occupied Palestinian Territories.  Despite such efforts though, we 
feel the Internet is a world that is devoid of laws and rules, a world in which 
anything is possible - a world in which the truth is shown in its true light, 
truth that cannot be suppressed.



metac0m:
In your opinion, what is the level of ethical and/or social
consciousness amongst younger hackers and do you feel that the younger
generations can play a positive role in political hacking and
hacktivism? 


WFD:
The level of consciousness is certainly augmenting amongst the younger hackers, 
and sooner or later, they will feel compelled to join the bandwagon of political 
hacking and hacktivism.  They can play a positive role IF they present clear, 
concise, and well-rounded arguments supported by facts.  


metac0m:
What do you foresee in the future for WFD, the defacement scene, and
hacktivism in general?


WFD:
Rest assured, you can expect more hacks such as the one on Ariel Sharon's site.  
The vast majority of the defacement scene, as it stands right now, is full of 
worthless defacements which symbolize very little or nothing.  We think that 
hacktivism will grow, and will eventually become the norm for defacements, so 
much so that every defacement will be one espousing and supporting a political 
cause or belief.  

Extra Message from WFD:

When you see helicopter gunships, tanks, and fully armed Israeli soldiers going up 
against groups of children and teenagers armed with nothing more than rocks, you 
don't have to be a rocket scientist to see there's something wrong.  The most 
dangerous people in the world are those who have nothing to live for, and that is 
a clear description of the average Palestinian youth.

- World's Fantabulous Defacers

fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff


.::[04]-Linux and the protest movement]
:::::::::::::::::::::::::::::::::::::::::::::::[the electrohippie collective]
:::[http://www.gn.apc.org/pmhp/ehippies/]::::::::::::::::::::::::::::::::::::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
an electrohippies collective article:

Linux and the protest movement -

Will the freedom and flexibility of the Linux operating system find a
natural home within protest groups?

Produced by the electrohippie collective, January 2001.

website: http://www.gn.apc.org/pmhp/ehippies/    
email: ehippies@gn.apc.org

NOTE: This briefing has been developed as a short article summarising the
main points in relation to the use of Linux and open source software by
activists. Please feel free to reproduce this in your own publication - but
on the condition that the text is not sub-edited, that a clear
acknowledgement of source is given, and that a reference for our website,
as noted in the footnote to the article, is given.


Global politics and the traditional software industry have two things in
common - their outlook on the world is dominated by the desire for control
and the accumulation of power (i.e. wealth) to support that control. Recent
national and international demonstrations about the environment and
globalisation have departed from the 'political' ideology that dominated
previous protest movements, and instead it looks for solutions outside of
the 'accepted laws' of the market. Linux, a new operating system for the PC
to rival Microsoft's systems, is based on much the same premise too. But
the features of Linux may also find a new home and purpose amongst these
same groups as the possibilities enabled by this revolutionary operating
system suit their needs far better than the mainstream alternatives.

Linux brings three valuable benefits to campaign groups - low cost, low
hardware specification, and freedom of distribution and development. But it
also builds upon a gradual change, enabled by the widespread use of the
Internet, in the structures of how people dissatisfied with the status quo
express their grievances. As first email, and then the web, achieved early
and widespread use by campaigners because of the benefits this new
communications medium brought to their work. 

For many years the dissatisfactions of society have been represented
through large centralised campaign groups - such as Greenpeace, WWF, or the
Amnesty International. This was a matter of practicality. The only way the
public could engage with governments and share information was through the
establishment of a large organisation, as a 'hub', to carry out work on
their behalf. This model was based purely on the need to achieve certain
actions in the most cost-effective way. The explosion in the use of the
Internet by campaigners during the 1990s broke this model apart by
'short-circuiting' the need for a central hub.

Today, small groups of people, not necessarily based in the same area, can
achieve an impact equal to a small campaign organisation using the
Internet. Much of the information they need is online. Many of the people
they want to lobby or protest are online. More significantly, the low cost
of working over the Internet brings its benefits within the means of far
more people than the traditional means of campaigning did 15 years ago. In
fact, the only groups not fully engaging in this new model are the large
campaign groups themselves - because they still feel the need to retain the
control in order to protect their identity and income.

Linux, and the open source software movement, build upon the benefits and
opportunities that campaigners seized with enthusiasm during the early
1990s. Under the current organisation of the software and hardware market,
campaigners are often at a disadvantage. Activists within grass-roots
protest movements usually don't have the money to be able to have the best
equipment and software available. In a market dominated by the needs of
business this means that they do not have full access to the benefits of IT.

Linux partially answers this problem because most Linux distributions work
well on older machines. There is still a shortage of good office tools for
Linux (but that need is gradually being answered) but this need not hamper
the use of the strengths of Linux - as a cheap and highly flexible
networking system. More especially, the operating system, software updates,
and software applications can be downloaded from the Internet free, or
purchased at low cost, or copied and passed on.

The restrictions of software licensing also impact on campaigners. Many
campaigners at the local level, particularly in Eastern Europe and the
developing world, almost exclusively use pirated software. Although this is
partly due again to the costs levied for software by the major software
companies, it's also due, yet again, for the need to get software that will
work on older and lower-spec. machines such as '486s and even '386s.

An emerging issue within the campaigning community is also the 'digital
divide'. There are whole sections of the community in the developed world,
and a large part of society in the developing world, that are excluded from
IT and the Internet by the costs and technical barriers erected to protect
the interests of the 'closed' IT industry. Open source could partially
break this divide. A good example would be the donation of old computers to
poor communities by corporations - so called 'ethical disposal'.
Community-based projects involving computers and the Internet, even if
donated, often fail because of the costs of the software. Linux could
circumvent these restrictions by providing a common, low-spec. platform
that community groups could use to develop a low cost and accessible
computing. Linux's far superior system configuration and security mean that
computers can be set up with a far lower risk of accidental or deliberate
harm to the operating system taking place as a result of its use by the
general public.

But where Linux could really see innovative use is amongst those groups,
such as the electrohippies collective, who are seeking to develop
widespread campaigns across the Internet. In the same way that Internet
communications have enabled a whole new mode of protest, such as the
protests against Nike's business practices, or against the WTO's Seattle
conference in 1999, so Linux could enable new forms of protest via the
Internet. As campaigners use of the Internet has grown, so have the
restrictions. Some Internet Service Providers terminate the web or email
services of those involved in high profile protest actions. The 'Net tools
themselves, such as web browsers, have recently begun to incorporate blocks
to certain types of activity that help assist online actions.

Linux solves these problems. With a little help, and a high bandwidth
Internet connection such as ADSL or ISDN, campaigners could establish their
own servers for email and web services. They can also establish their own
email lists to circumvent the restrictions on some of the free listservs
currently available to the public. Under Linux, it is also possible to
develop new tools to carry out or automate specific tasks. The ability to
use scripting means that actions could be built around easy to use tools
developed by some 'expert' campaigners, and then distributed freely over
the 'Net. For example, the electrohippies collective has recently begun to
develop web-based tools that, under the users' control, create specific
web-based tools to initiate lobbying action. In the next few months the
electrohippies will also, as a means of testing ways to develop Linux as a
tool for protest action, be launching a Linux-based protest event.

Where Linux could really benefit the campaigns movement is in the field of
'streaming' - the transmission of audio or video over the 'Net. Currently
most streaming application are proprietary, and apart from the cost, they
have many licensing restrictions governing their use. The development of
open-source alternatives to the main streaming software could lead to the
development of a whole new media outlet for campaign groups traditionally
marginalised or prevented from accessing the mainstream broadcast media. In
the same way that we have seen the world-wide-web being used by campaign
groups to supplant the printed word, so we could see the development of
audio and video sites to circumvent the restrictions on campaigners imposed
by the broadcast media.

The recent popularity of Linux has been built mainly amongst two groups -
those engaged in online business and computer professionals. As a means to
expand the use of Linux amongst the public at large the use of Linux by
campaigners could benefit the Linux community as a whole. It builds on the
original radical traditions of personal computing and open-source
programming. The development of the personal computer in the US in the mid
1970s represented a desire to get away from the centrally controlled
mainframe systems that prevailed at that time. Having a computer at home,
even if it had limited capability, was seen as enabling a whole new form of
personal expression.

The use and development of Linux amongst those who are seeking to 'change
the world' can be seen as having much the same basis. The power and
flexibility of Linux has so far only seen use by those for whom computers
for a central part of their lives. The use of Linux as a tool by
campaigners, to bring more meaningful forms of expression to society, adds
a new dimension to this revolutionary system.

FOOTNOTE: This article is extracted from a longer briefing on the use Linux
by campaigners, "I've seen the future and it has a penguin on it",
available on the electrohippie collective's website -
http://www/gn.apc.org/pmhp/ehippies/index.html

fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff



.::[05]-[The CyberArmy ] 
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::[By: Phydeau]
:::[http://www.cyberarmy.com]:::::::::::::::::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
The CyberArmy is an organization that has several thousand members.  Each and
every one of us has dedicated ourselves to making a positive impact on the
Internet. We provide missions for our members to complete: for example, taking
down child-pornography sites or e-mailing congressmen concerning current
regulations. We feel that government and large corporations should have very
little influence for controlling the Internet.  As you know, the Internet has
developed, even thrived, without their intervention. 

Many countries (USA included) filter long-distance telephone calls and emails
through government computers (the 'Echelon' organization in Canada, Australia,
NZ, UK, and the US) to check for communications containing subversive content,
without asking anyone's permission.  

Not just governments, but big businesses are also trying to throw their weight
around on the net, litigating small companies on domain name issues -even the
Music and Motion Picture industries. Recently, the MPAA (Motion Picture
Association of America) tried to ban a Linux software title that plays DVD
movies. Surely you agree; they don't have much legal or moral authority to ban a
piece of software; but unless individuals speak out, we are forced to concede,
or face costly litigation. Here it is imperative that individuals are united in
one effort to make a difference.  On mission "Echelon Takedown" we sent over
1000 faxes and many more e-mails to protest this action.  When the MPAA tried to
ban the previously mentioned software over 500 members complained to them on the
same day.  

This is how we make a difference.  Granted, this doesn't do much to stop spam
and child pornography; however, it is more than the governments have
accomplished.  Ask yourself this; with all the monitoring that the government is
doing, how much impact has it had on stopping your e-mail from being spammed, or
receiving "kiddie-porn"?  Very little indeed! Originally we had posted missions
like this for all to complete, and we still do; but now our organization has
grown to the point that we have created "brigades" so that those with,
particular skills or contacts can be more effective in applying these
principals.  

At this point I would like to introduce a very special brigade in our group:
The CyberArmy Pedophile Fighters or CAPF.  This group is responsible for taking
down the most heinous of the Internet enemies: Child Pornographers.  This group
is still new and has, to date, been responsible for closing down 10 Child Porn
sites. Through interaction with various entities in the FBI and other foreign
intelligence agencies, this group hopes to accomplish two goals: (1) increase
public awareness of the size of the Internet child porn industry, and (2) to
help prevent it from becoming a bigger problem.

Very few Internet users are aware of just how big the problem is these days. 
Each and every member of the team has made huge contributions.  To quote Gen
Yosh1, C/O of the CAPF, "Each and every member of our organization is just as
important as the next, from the 2nd Lieutenants, to the Kernels.  I would like
to thank every person, including those who are not in the CAPF for their help." 
This reporter would like to say "Hat's off" to this very important faction of
the CyberArmy.  

Our organization is constantly undertaking various goals and tasks; we can
always use additional help in fighting for our causes.   Regardless of whether
you are skilled in computer usage, or wish to be part of something that can make
a difference to the users of the Internet, all are welcome in our organization. 
Please, feel free to join


Lt Ker Phydeau 
C/O of Executive Subdivision of Propaganda Command
(edited by Lt Ker Grãy)

     --------------------------------------------------
     CyberArmy is a group of netizens who believe in a 
     deregulated Internet, which is free from external 
     control. We believe in providing tools to assist 
     others who believe in a free Internet - we support 
     Open Source. We campaign against those who abuse 
     the free nature of the Internet. We believe that 
     spammers, child pornographers, web based scammers, 
     and malicious hackers are enemies of the Internet. 
     We believe that the Internet can be self-regulated, 
     and that we, as equipped and knowledgable netizens, 
     can control and suppress abusers of the Internet, 
     with legal methods, by consolidating together as a 
     united CyberArmy. [www.cyberarmy.com]
     ---------------------------------------------------
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff

.::[06]-[The Real World]
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::[By: metac0m]
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Cyberspace is often perceived as a digital realm unto its own and at best a 
distant extension of reality. From this perspective we have come to perceive 
of the Internet as aloof from the "real" world. We recognise the capabilities 
of this medium, particularly with regard to organisation of networks of 
activists but we also recognise that the medium itself is mechanism of activism. 
In this sense we distinguish hacktivism and activism; electronic and civil 
disobedience. Additionally, we recognise that the medium itself - the Internet 
- must be kept as Oxblood Ruffin explains "healthy, vibrant, open, and above all 
free [as in expression]." Whether for purposes of activism, hacktivism, electronic, 
or civil disobedience the Internet has emerged as an essential technology. This 
is the inherent commonality. Regardless of the divisions we, as users, have a 
vested interest in maintain the health of this medium. 

As mentioned, the ethereal status imposed on the Internet often blurs its direct 
link with the real world. In this sense, a striking division has been made between 
electronic and "real" world activism. The resulting antagonism, in which the "real" 
is pitted against the "cyber", is a source of constructive debate but is also based 
on over-generalisations. Granted, for academic or debate/discussion purposes 
generalisations are necessary to organise one's thoughts into an effective argument 
but in this process we've lost sight of an important factor: evolution. Hacktivism 
is a continually evolving and open process; the tactics and methodology are not 
static. We've become accustomed to assuming that hacktivism is synonymous with 
webpage defacement and that electronic civil disobedience (ECD) is an automated 
denial of service attack based on the repetitive refreshing of the browser. 
Additionally, participation in such activities is seen as being removed from the 
"real" world and despite significant media attention is ineffective.

While recognising the criticism as just and acknowledging the dichotomies within the 
hacktivist paradigm there needs to mention of the considerable cross-over occurring 
between those concerned with the cyber health of the Internet and those concerned 
with social, political, and economic realities for they both affect this medium that 
binds us together. There are "real world" consequences to electronic activism.

In November 1999 the Content Scrambling System (CSS) used to encrypt Digital Versatile 
Discs (DVD) was cracked by anonymous German hackers. Although credit is usually given 
to Jon Johansen he was actually involved with the creation of DeCSS, a program that 
decrypts a CSS encrypted DVD and allows the contents to be copied to a computer harddisk. 
The Motion Picture Association of America (MPAA) has been involved in a battle to stop 
the proliferation of DeCSS, particularly against 2600 Magazine which has been "publishing 
controversial material since 1984." 2600 was successfully sued by the MPAA for providing 
access to DeCSS. Furthermore, 2600 Magazine (and anyone else) is now prevented from 
linking to any webpage that posts the DeCSS source code. Judge Kaplan ruled that the 
argument that computer code was "free speech" was baseless and that " computer code is 
not purely expressive any more than the assassination of a political figure is purely a 
political statement." An appeal has been launched by 2600 and the Electronic Frontier 
Foundation (EFF) and eight groups including the Association for Computing Machinery,  
leading cryptographers, and a coalition of journalist organizations including the Online 
News Association and the Newspaper Association of America have called for the decision 
to be overturned.

Of particular note is the judge's reference to electronic civil disobedience regarding the 
linking to and distribution of DeCSS. It is reminiscent of what Oxblood once said, "It 
could involve one programmer writing code that might have significant impact on the entire 
Internet." Here we have one program that has brought to the forefront numerous issues facing
the Internet community including free speech, fair use, reverse engineering, encryption, 
and freedom of information. In his reaction to the ruling Emmanuel Goldstein of 2600 states:


   I won't even get into how the net is being destroyed by advertising and conglomeration. 
   There's no time to go on the offensive when so much time has to be spent defending one's 
   very existence. Every day we get new reports of people being threatened in some way by 
   some huge corporate entity because their opinions and free expression don't sit well. 
   Years ago, this sort of thing would have been laughed at. Today, it's a very different 
   story. Voices are being silenced, criticism is being eliminated. And very unfortunate 
   precedents are being set.


Furthermore, there is a human, "real world" cost to pay. Goldstein likens being dragged 
through a lengthy and costly court process to "facing a major illness." In this case, the 
repercussions of ECD have seriously affected the "real" lives of individuals. This was not 
some abstract form of electronic protest but a serious challenge to the legal system of the
United States for which the ECD participants were willing to face the penalty. It was not 
removed or anonymous and has promoted solidarity rather than division. 2600 is taking a 
stand for all users of this medium who benefit from the free access to information, freedom 
of speech, and freedom of communication be they activist or hacktivist. This is the Real 
world.

Another case, described by 2600 Magazine as "another example of the parallels between the 
hacker world and the real world" is the case of 2600 layout artist Shapeshifter, one of 
the 400 protesters arrested at the Republican National Convention last August. Shapeshifter 
was accused of using his cell phone as "an instrument of crime", a charge that was 
eventually dropped. However, Shapeshifter was "held in prison for a week on half a million 
dollars bail" and was eventually found guilty of "disorderly conduct and obstructing a 
highway" in relation to the protest, receiving a fine of $135.50 and three months probation. 

What is of particular note in this case is the hacker/activist crossover. Taking a activist 
approach Shapeshifter is quoted as saying:

   (We) are challenging the whole electoral process, both Republicans and Democrats, 
   the way  the system works and doesn't represent people but corporations...

Indeed, the electronic world in which hackers exist is affected by the existing social, 
economic, and political reality on the ground. Apart from political critiques of democracy, 
hackers and activists have a vested interest in keeping the Internet a free and healthy 
environment to facilitate the open exchange of ideas. The Internet has become essential to 
both the hacker and activist communities. Activists rely on it for organisation, 
communication and dissemination of information while hackers, on the other hand, also 
require an "emancipated" Internet environment in which to exist. The issues of freedom of 
speech, information and exchange of ideas, the lines along which hackers and activists 
converge, are captured beautifully in Article 19 of the Universal Declaration on Human 
Rights:

   Everyone has the right to freedom of opinion and expression; this right includes 
   freedom to hold opinions without interference and to seek, receive and impart 
   information and ideas through any media and regardless of frontiers.

Thus electronic struggle is not a removed event. It has "real world" consequences. These 
consequences force us to acknowledge that the Internet does not exist entirely separate 
from existing national and international structures and conditions. Thus the fusion of 
hackers and activists is a logical conclusion. With an ever-increasing range of common 
goals along with the diffusion of hacker computer skills the two diverse groups are being 
drawn closer together. In relation to the RNC protests Wired reported that:

   Other hackers, including at least two other contributors to 2600, descended on the 
   convention last week. Some helped the Philadelphia Independent Media Center, 
   a left-leaning collective of journalists and activists, 
   monitor police radio frequencies.

Hacktivism is a powerful yet still emerging phenomenon, "a noun in search of a verb" as 
Oxblood suggests. The theory and methodology is being debated and created. The outcome 
remains to be seen but it will surely have a definite effect on the "real world".


fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff


.::[07]-[Interview with Virtual MonkeyWrench]
::::::::::::::::::::::::::::::::::::::::[By: THOMAS ISLER AND OLIVE ZIHLMANN]
:::[http://www.sonntagszeitung.ch]:::::::::::::::::::::::::::::::::::::::::::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

" all criteria of good sabotage "

Translated through BABELFISH [http://babel.altavista.com]
(Note: the translation is less than perfect but it gets the point across.)
http://babel.altavista.com/translate.dyn?urltext=http%3A%2F%2Fwww.sonntagszeitung.ch
%2Fsz%2FszFeinRubrik.html%3FArtId%3D69780%26rubrikid%3D115%26ausgabeid%3D1224&lp=de_en 

The hackers of the WEF data base over the target of their
internal message, their political motives and their Networking
on global level 

BY THOMAS ISLER AND OLIVE ZIHLMANN 

Sundays newspaper: Who are you? 

Hacker: We are a collective, which calls itself Virtual
Monkeywrench. We operate in changing composition. In this case
four people were involved. But which already collective is called?
Don't all, which live with us, discuss dear and with us in Internet
forums problems, belong likewise to it? 

When did it come to the attack against the WEF? 

Hacker: Sometime in the year 2000. 

Where was the WEF data? 

Hacker: One could say, it was situated in the shop window and
offered themselves. 

How did you penetrate in the system? 

Hacker: To penetrate one cannot call that. We did not only use
special aids, standard software. And we did not modify anything in
the safety configuration. They could ask also someone, how he had
walked into an open yard. 

Why didn't you use the captured data, in order to execute interfering
reactions against the powerful ones of the world? 

Hacker: The publication of the data seems to be already rather
disturbing. The WEF worries itself to limit the damage: One must
lock thousands from credit cards, modify telephone numbers and
E-Mail addresses. All possible determination services come into the
play. The supervisors of the WEF must justify themselves before
their members. Clearly, we could have abzocken from multinational
companies also few millions a dollar. Only: It would not have
changed the system. A manager goes, who comes next. In our eyes
a modification can take place only if an increasing number of people
does not support these mechanisms any longer and rejects each
type of hierarchy. The publication of the data fulfills all criteria of
good sabotage: Will disturbed the well oiled running of the machine,
authorities lose influence and to become undermined. The discovery
of the fallibleness of God is the first step for the fall of its throne. 

What was the target of your internal message? 

Hacker: For us hacker is important it to put all information openly
and to attack in a broader sense the powerful ones and power. We
are against " private AREAS ". Therefore we wanted to the user
names and passwords ran - and suddenly we had batch information. 

What is your political attitude? 

Hacker: A type synthesis between Anarchismus and hacker ethics.
In our eyes mental property is illegitim, it serves the interests of the
powerful ones and disturbs co-operation. There are other forms, as
for instance the free software projects in the Internet shows.
Outstanding software is developed there without copyright and
belongs to all. The idea of free software is directed against the
property term. Everyone can use it. Via Copyleft people are
prevented to abuse it in order to make profit. The ideal of the free
access does not only apply with computer often commodity. The idea
functions also in the society. It should be possible all to profit from
natural, economic and social resources. 

They are against capitalism and against the globalization? 

Hacker: What is globalization called? Does it mean to expand the
patents and copyrights in accordance with the agreement over the
protection of mental property of the WTO? On printing Pharma
pharma-und the music industry is tried to protect mental property
world-wide. We want to disturb these efforts to denationalize public
property. Capitalism is based on the maximization of profits, on
competition and on private property of knowledge and resources.
That does not fit our vision of a world, in the information and other
goods to be divided free of charge. 

Are heels not also a global culture? 

Hacker: Heels means: Everything from the computers
rauszubekommen. That means: To write elegant programs. Only the
mass media never understand that. To break through, correct-proves
Cracken is called safety barriers. In the available case we chopped
neither nor gecrackt. We support communication and Networking on
global level. But we are complete against the global penetration of
rules, which bring some few profit and kill millions of humans. 

Do you find to Internet cool? 

Hacker: Do they believe in God? 

Internet is nevertheless one of the hauptmotoren of the
globalization. 

Hacker: Technology is never good or bad. It depends on how it is
used. Internet opens the possibility of dividing information world-wide.


Don't you have a fear of the police? 

Hacker: Clearly, the police is a fear fear-flow-flowing that apparatus.
But that is not a reason not to offer resistance. 

Which you did, is more than resistance: Swiss the criminal law
places the penetration in other of data processing systems under
punishment. 

Hacker: Property is theft. We hope that we are not discovered, until
nothing more is remaining for stealing. At all: Did we steal something
or did find only something? 

Why didn't you publish your realizations during the WEF? 

Hacker: Our target is it not to prevent the world economy forum to
undermine but the power structures. The world does not become
better, if the forum does not take place. The world changes only, if
attitudes are overcome such as Anpasserei and adding SAMNESS. 

What did you think, when you saw the data? 

Hacker: We were surprised at the fact that such data were situated
simply on the road. It was also interesting to see the things from a
perspective which we should not have: From the inside of a private
club that realms. 

Did you already make different Hacks or Cracks? 

Hacker: This time it was not necessary to break through safety
barriers. But we already did. Ever we did not receive so many private
data at one time. 

Whom already attacked you? 

Hacker: We have similar CD of the CIA - are you interested? 

Do they belong to a hacker network? 

Hacker: It is more important for us to have a common political
attitude than common means. Clearly it is necessary to exchange
experiences but we do not belong to a special network. 

From which countries do you originate? 

Hacker: Whom interthey RTS? 

In which age did you sit for the first time at a computer? 

Hacker: Differently. (your question has just an internal exchange of
life experiences lively.) 

Which age and sex have you? 

Hacker: Differently. Do you have still more so interesting questions? 

What is your largest dream? 

Hacker: A world with certain humans, who want to subordinate
themselves nothing and to nobody. Free software, free love! 

What is your attitude to the internal messages, which took place on
the road against the WEF? Compared with your internal message
their effect was marginal. 

Hacker: Why should their effect have been marginal? Modifications
occur not in the virtual, but in the real world. The activists in
Switzerland brought nevertheless many humans to carry out on the
road resistance. 

What do you think of the police presence in Davos? 

Hacker: The fact that we clean-walked virtually in the WEF, does not
mean that the police presence in Davos would have made or would
have worked not fear in a totalitarian manner. 

What you did, was criminal. Don't you have bad conscience? 

Hacker: Our conscience does not depend on the law books. 

Copyright © 1996-2000 Tamedia AG 

fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff



.::[08]-[My Love / Hate Relationship With Technology ]
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::[Scully]
:::[http://www.Cipherwar.com]::::::::::::::::::::::::::::::::::::::::::::::::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::


I'm ashamed to admit that I was very late getting on the Information
Superhighway, but as a child technology fascinated me. I used to eavesdrop on my
parents' (then fairly new and primitive) wireless phone through a radio. I built
several "kit" and homemade robots, pounded keys in DOS on a an old IBM pc, and
started reading sci-fi books and watching classic sci-fi movies. But if it were
not for a basic FEAR of the future of technology and various social influences
like Orson Scott Card's Ender's Game, the short-lived television show "Max
Headroom", "The X-Files", movies such as "Blade Runner", "Soylent Green",
"Sneakers", and let's not forget the recent modern classic, "Hackers" - I would
not even have an email address. Essentially, I have become a tech addict through
my fear of technology. 

During the 1980s and early 1990s the only use I had for computers was typing
essays and research papers for school. The only fun I had on computers was with
that old Mac game "Dark Castle" (the first version, before color) which I would
sneak onto the school's lab computers via one floppy disk. :-) I still resisted
computers and technology in general for several more years until I started a job
where I HAD to work on computers at a major grocery store chain, I monitored and
audited accordingly all the registers within the store through a local area
network. Later I had a job using AutoCAD in which I was basically submerged in
computers all day, every day. Six months later I bought my first laptop, two
hours later I was online, a few months after that I was forced by friends and
family to get voice mail because my phone line was always busy, and now ...tech
addict. 

This brings me to my passionate love/hate relationship with technology. 

I love technology because it allows us the ability to communicate in so many
different ways. It has brought about the Internet and the wonderful things that
come with it, including the things we haven't even discovered yet. It has given
us appliances and machines to help "save us time" and make our lives easier.
(The microwave is one of my personal favorites!) We all know about the
astounding benefits of technology, that's an undeniable fact. 

I hate technology because I believe it is changing humanity for the worse.
Personal privacy is extinct and almost impossible to achieve in any developed
country. We rely upon machines for everything from waking us up in the morning
to landing our planes with hundreds of passengers. How many people reading this
right now MUST use a computer to perform their job? Phones, pagers, microwaves,
PDAs, stereos, personal computers, calculators, bank machines, mass transit
vehicles, autos, airplanes, entire buildings and cities, and soon the whole
world will be wired. I don't like this, but it is a fact and I thought it best
to be able to navigate and understand technology rather than blindly allow it to
run my life. 

What frightens me most is that if someone really wanted to, they could follow me
around from the time I leave my home to the time I return, and they could do it
all from another continent. Most people laugh at this fear and say, "But who
would want to?" That's not the point, the point is that it is possible. I have
this image in my mind of what the world could be like within my lifetime. It
reminds me of the Talking Heads song, "Life During Wartime" (the lyrics are
located at http://cipherwar.com/news/01/life-during-wartime.txt) in which they
exclaim, "Transmit the message, to the receiver, hope for an answer some day. I
got three passports, a couple of visas, don't even know my real name. ...Trouble
in transit, got through the roadblock, we blend in with the crowd. We got
computers, we're tapping phone lines, we know that that ain't allowed. We dress
like students, we dress like housewives, or in a suit and a tie. ...Try to be
careful, don't take no chances, you better watch what you say." The fact is,
liberties like free speech, freedom of movement, and even freedom of thought are
being threatened by technology and the power it gives to those who would wish to
control us. 

But who would want to "control us", "us" being the majority of people on the
planet? Well, the answer most often given to this question is: "THEM". But who
exactly is "Them"? Frequently the term "Them" is used to describe secret
government agencies, men in black, your local law enforcement agents, the
powerful people seeking to globalize the world through organizations like the
United Nations, or even those illusive groups like the Illuminati. It doesn't
matter who Them is, that is not the point. The point is that there are people
out there with the desire and the power to use technology in a negative way in
order to get what they want. Governments, like communist China's and even the
United States', use technology for monitoring and controlling its masses through
surveillance cameras on street corners, in grocery stores, banks and who knows
where else. Other abuses of technology include mass databases, of which the
United States government has thousands, for tracking the location of
"ex-criminals". What about the recent unapproved and illegal mass facial
scanning that took place at this year's Super Bowl in Florida? What about
programs like Carnivore and Echelon? You don't have to look far to find examples
of technology abuses in order to control and track the general public.

The next phase of frightening technology advances are robots, artificial
intelligence and nanotechnology. There are so many infinte possibilities after
this that it's foolish to assume anything about what could happen. Already
robots and computers are replacing humans in the workplace by thousands if not
millions of people each year. We are allowing computers and machines to make
more and more of our decisions, and as common tools like cars become
increasingly self-aware they will make more decisions for us. People are placing
their lives in the hands of machines. What happens when an entire hospital's
network is infected with a destructive virus and all the machines monitoring
patients and operating on patients are suddenly infected? What if all the
traffic lights in New York City turned green at the same time and stayed that
way? What if the Los Angeles International Airport (LAX) were stricken with a
malicious cyber attack and the radar went down, among other things? Now, what if
machines were self-aware and decided that they can create and maintain
themselves, probably much faster and more efficiently than people? How long
before the machines realize they don't need us? 

These are the reasons I want to stay abreast of technology advances and what the
"machines" are capable of. Someday it could be war, flesh versus metal, will we
stand a chance? 

               Scully@Cipherwar.com 

               =========================================

               --
               | Founder
               | Cipherwar: Information Warfare 
               | http://www.Cipherwar.com
               --
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff

.::[09]-[On The Strategic Use of Spam] 
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::[Anonymous]
:::[http://www.nettime.org]::::::::::::::::::::::::::::::::::::::::::::::::::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

 by Anonymous
 via  
 contact: nettime@bbs.thing.net
 --

When everyone states that Spam is Evil,
an opportunity arises to counter this
absolutist position.

The prevailing mass-logic is as follows:

EITHER it is Spam
OR it is not Spam

The thinking person will be able to
differentiate in the above example that
the definition of 'what is Spam' will be
the determinant for the EITHER-OR conclusion.

What is perceived as Spam?

Superhuman sexual functioning, making lots of
money fast, beating the credit bureaus and banks,
online gambling bargains, crash diet programs, and
`find out anything about anybody' pyramid schemes,
one and all.

The exception comes from good intentioned people,
not looking to make money or cheat or steal, but
to share ideas. They run websites and try to keep
their ideas out in the pseudo-public sphere. If
they are not 'branded', they can only resort to
reaching the masses through the dreaded, multiple
e-mail list spamming of their content. It is as
natural as the survival of the fittest, wherein
there is no cooperation, but only competition. A
name added without permission to a mailing list
or a private mailing of collected e-mail addresses
operates on the same rogue level as Spam, that is,
outside of individuals' control over the content
that reaches their e-mail inbox. But this is not
traditionally considered Spam, but someday it may
also fall under 'anti-Spamming' laws, soon to be
enacted.

The Question:

What one considers Spam is central, but what many
consider Spam is even moreso. Spam is Spam, of course.
Everyone agrees - IT IS EVIL. This is an answer, an
ideological one, assuming that there is no such thing
as a Good Spam. If one can disregard certainty for a
moment, could it be possible that Spam is a paradox,
and offers something beyond its negative value?

The Opportunity:

The Spamming Network is a marketer's dream. Maybe not
a legitimate Professional Marketer though, as much as
as manipulator of desire, emotion, and human stupidity.

The Spammers Network is a communications infrastructure
which possesses tens of millions of e-mail addresses of
people cutting across all demographic boundaries and lines.

The Spammers Network may be the _most_ public sphere that
exists on the Internet, as everyone continues getting Spam.
That is, until it is completely outlawed. And it has not
yet been so.

The Idea:

What if Spam was not about cheating, stealing, or lying
but about telling the being honest, sharing, and telling
the truth? What if Spam were used for Good Reasons? What
if a Spammer sent a Public Service Announcement?

The Operation- Public Policy Spam 2001:

The Spammers Network is the only distributed public
communications infrastructure on the Internet. No other
Listserv or Mailbase can accomplish what the Spammers
Network can. So why not put this infrastructure to use
for the airing of public ideas- that is, human ideas:
things that affect us all- such as war, global warming,
energy inefficiency, pollution, poverty, inequality.

No legitimately sane person would dare become a Spammer
neither by trade nor association, so the sentiment goes.
But what if Public Policy Spam could go beyond purely
economic manipulatin and into opening up `the debate
that never was' for lack of true public representation
in society?

The EITHER-OR logic of the prevailing paradigm of reality
then comes down to this:

EITHER one can walk into a private radio or television station,
or get a well-placed advertisement in a well-read newspaper
to reach millions of 'the public' which would cost more money
than anyone has and would probably not make it past editorial
OR one can go guerrilla and SPAM THE NETWORK WITH PUBLIC IDEAS
and reach millions of the distributed public without millions
of dollars of money or internal connections.

Spam may be the true test of Free Speech, if Public Policy Spam
2001 is taken up. Please consider this, as any such operation
will require institutional and legal support.

A Public Policy Spam could be prepared. All that is needed is
an autonomous webhost and mirrors, and the spirit of artists
and thinkers whom can see beyond the EITHER-OR of Spam and
into its strategic potential to change the course of dis-course.
 
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff


.::[10]-[Zapatista Tribal Port Scan]
::::::::::::::::::::::::::::::::::::::::::::::[Electronic Disturbance Theater]
:::[http://www.thing.net/~rdom/ecd/ecd.html]::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Zapatista Tribal Port Scan:
A Demonstration Tool Now On-Line

by the Electronic Disturbance Theater

Chiapas, Mexico - January 3rd, 2000 - the Zapatista Air Force "bombarded"
the federal barracks of the Mexican Army with hundreds of paper airplanes.
Each airplane carried a message of peace for the Mexican Army soldiers
monitoring the borders of the Zapatista communities. In remembrance of
this event the Electronic Disturbance Theater (EDT) releases a demonstration
of this electronic translation of the Zapatista Air Force Action:
the Zapatista Tribal Port Scan *(ZTPS). A direct-action tool for
net.activist, net.artists, and net.hacktivist everywhere.

*Visit ZTPS a demonstration of
the ZTPS concept and interface here.

Go here:

http://cadre.sjsu.edu/beestal/ztps/

*For the source code distributed on Jan, 3, 2000  by EDT of the
"zapatista tribal port scan (ZTPS)", go to EDT's homepage.**

Electronic Disturbance Theater
http://www.thing.net/~rdom/ecd/ecd.html

P.S. On December 2, 2000, subcomandante Marcos announced that
the central command of the Zapatista National Liberation Army (EZLN)
will travel to Mexico City in February, to lobby for passage of the
San Andres Accords. For Marcos and the Zapatista leadership, this
will be their first public appearance outside of Chiapas since their
uprising began in 1994. In announcing their historic trip to Mexico City,
Marcos has invited the accompaniment of national and international civil
society to join the Zapatistas from February 24 to March 10. The trip to 
Mexico City will start in San Cristóbal de Las Casas, Chiapas, on February 
24 and end in Mexico City on March 6. The Electronic Disturbance Theater 
will join the procession - we invite all of you to join also.

Zapatista March 2001
http://www.ezlnaldf.org

Zapatistas
http://www.ezln.org

***[[Message Sideload]]***

Zapatista Army of National Liberation.
Mexico.

January 12, 2001.

To Civil Society:

Madame:

I am writing to you while it is raining and we are waiting here for the
return of the companeros and companeras who went to the march in San
Cristobal de Las Casas. In a manner which is not customary for us, we are
trying to keep you informed as to how things are going here through letters
like this.

The Zapatista Information Center's mailbox has been quickly filling, being
emptied, and filling up again. Greetings and mobilization proposals from
various states in the Republic are arriving. In the D.F., for example, a
very detailed proposal came from U.A.M. which, however, presents serious
inconveniences. For example, they invite us to dine, but how are we going
to eat with our ski-masks on? Ah, really? So the promises about improving
the menu are of no use if, whenever they want, we're going to end up being
fed intravenously. In Ciudad Juarez, Chihuahua, they were handing out
flyers in the streets today, and in Tijuana, B.C., they held a rally. From
Guanajuato, Morelos, Oaxaca, Puebla and Hidalgo, they are asking us for the
dates and our itinerary in their states. Fine, we're going to make this
public when we have it ready. Don't worry, and have the parties ready.

On the international level, the influx is no less: a delegation of
Italians, between 200 and 300 persons, confirmed that they will be arriving
in Mexico in February, and they'll be prepared for being expelled. From
San Francisco, California, U.S., they are advising us they will be coming
to accompany the delegation, and they will be informing the "Frisco"
community of everything that happens along the route and during the stay in
the D.F. From Switzerland, they have confirmed the attendance of a
delegation. We are being advised of the same from Argentina and France.
In the State of Spain, they don't stop. In addition to hanging from towers
and mountains, they are going to set out (they don't say by what means, but
I imagine it won't be walking) to throw themselves into the entire route.

Something verrry important: accommodations. And I'm not referring to the
accommodations for the zapatista delegation, but those for all the people
who, from the states of the Republic and from other parts of the world, are
going to participate in the march along with us. An idea: that
organizations and groups which can offer places to put people up please
advise the Zapatista Information Center, and the "pilgrims" can then be
informed.

Concerning the technological breakthroughs, I am informing you that the Web
page is now functioning. The address is: http://www.ezlnaldf.org I am
taking the opportunity to make a request of all the web pages that already
exist, or which refer to the zapatones and their movement: please put in a
"link" or "pass", or whatever it's called, so that those visiting your
pages can also have access to the one about the current mobilization. We
also have our e-mail address now. The address is: ciz@ezlnaldf.org

Good, that's how things are up to now. We'll be passing along more
information to you in the next one.

Vale. Salud, and may peace come soon dot com.

>From the mountains of the Mexican Southeast.

Subcomandante Insurgente Marcos.
Mexico, January of 2001.

http://www.ezlnaldf.org

**[[Switch_Over]]**

Zapatista Tribal Port Scan: A Demonstration Tool.

What is a port?

A port is an abstraction for the connection points used for network
services,
such as e-mail and the WWW. Every computer connected to the Internet
has 65536 ports through which other computers on the net might establish
socket connections. Common services such as http (the web) and e-mail are
implemented as socket connections, using standard ports such as 80 (http),
and 25 (smtp).

What is a port scan?

It is possible, actually common, to attempt to make a socket connections
on a server's multitude of ports in order to determine what services reside
on that machine. Why scan ports? Port scans should be non-controversial.
If your machine is connected to the Internet, you are exposing all of your
ports, and you should expect connection attempts on any of them. Because
a port scan is sometimes, very rarely, a prelude to hacking attempts,
many fascist leaning system administrators mistakenly classify the port
scan itself as a hostile act. But just because a port scan may on rare
occasions reveal an exploitable weakness, it is not the same as actually 
exploiting the weakness. It is no different in principle from counting the 
windows and doors of a secure building from a public sidewalk. If a machine is
on the public Internet, the ports are visible from that public sidewalk.
It is the responsibility of building security to evaluate any threat, no
law can be passed against looking. (Except under fascism, of course.)

Who is paranoid about their ports?

Typically it is the most powerful who can afford the high cost
of total paranoia. Some systems utilize sophisticated security
software that report on every attempted connection, or warn
administrators about large numbers of unusual connection
attempts. From this you may draw your own conclusions about
exactly whose machines and people are likely to pay attention
to the kind of tribal scan that ZTPS performs.

What is Tribal?

Tribal is a term that refers to the use of more than one computer
(their different network identities), to distribute the work.
The Zapatista Tribal Port Scan uses the Java Virtual Machine
available in all standard web browsers to implement the port scan.
The participating user simply visits the web site URL of a ZTPS
implementation, and the scanning begins. Designed to be opened
in a smallish browser window and minimized for all day
scanning at home, work, or school, the ZTPS applet will scan
a random port on a particular machine (chosen by the
implementers posting the ZTPS site), from once per minute
to once per hour, selectable by the user. Using both TCP and
UDP socket connections, ZTPS may be configured to
randomly select from an implementer selected list of
text messages, some of which may be logged by targeted
machines. (Messages flying over the fence.) A download
button in the applet interface makes it easy for users to
download ready-to-implement software, and full source
code for their own purposes. ZTPS effectiveness improves
with the number of participating user/activists, so collective
participation, as always, is very important.

Why a Zapatista Port Scan?

The Zapatistas are winning the war. Their intelligent and calculated
application of the responsibility to risk, their creativity and conceptual
edge in terms of activism, and their commitment to provocative
transgressions that turn the opposition's borders into Zapatista assets,
all point toward port scanning as an activist tool, and conceptual art.
 (Remember that Subcomandante Marcos was a Professor of Digital Media. ;-)

EDT offers ZTPS to the community of net.activist, net.artists, and
net.hacktivist with a few requests: please improve, mutate, grow
and spread the code.

(Click the download button in the ZTPS interface for a complete archive.)

Please also think of the system administrators who will pick
up your packet airplanes with a poem when they land in the
security logs on the other side of the fence;-)

Implementation
There are two ways to implement ZTPS on the client side.

1.The participant/user enters the URL of a signed ZTPS implementation
their web browser. The ZTPS then loads into the web browser and
begins scanning the domain pre selected by the implementers of
the ZTPS web site. Code signing is necessary, because the ZTPS
applet must be granted special permission to make a network
socket connection to any server other than the one from which
it itself loaded. (*see demonstration link below for an unsigned sample.)

2.Participants or users may download ZTPS, and run it locally
as a Java application. When running ZTPS as an application,
there are no applet security restrictions, so code signing is unnecessary.
When used as an application, the user can choose which site to
scan instead of having that choice made by the implementers
of a ZTPS web site.

Download Archive Here

*Visit ZTPS a demonstration of the ZTPS concept and interface here.
Go here:

http://cadre.sjsu.edu/beestal/ztps/

This demo is hosted by the Computers in Art, Design, Research
and Education Digital Media Laboratory at San Jose State University.
(CADRE)

Code signing:

If you wish to implement ZTPS via the web as an applet, you will need to
acquire a code signing certificate from a certification authority and
sign the applet code. This will enable the mobile code to ask the
individual user for permission to make the network connections
necessary to scan a third site. If you do not, the applet will not
connect to the target server, giving output similar to this:

port 63351: trying TCP="tactical media"; no connection;
com.ms.security.SecurityExceptionEx[socketChecker.run]: cannot connect to
"www.whitehouse.gov"

This is because the applet loaded from (in this case) cadre.sjsu.edu
is  trying to connect to another server (www.whitehouse.gov).
The target server is not being scanned. The only work around for
a Mass Demonstration  is to sign the applet code (which may
require code modification for some browsers), or to encourage
users to download the  ZTPS archive and run it as a Local Application.

Java Code signing resources:
Excellent educational resource by Roedy Green
http://www.mindprod.com/certificate.html
http://www.securingjava.com
Signing Classes with the Netscape Object Signing Tool:
http://www.securingjava.com/appdx-c/appdx-c-1.html
Signing Java Applets with Microsoft's Authenticode
http://www.securingjava.com/appdx-c/appdx-c-2.html
Get a Certificate
http://www.verisign.com
http://www.thawte.com/

Get Java
Users who wish to run ztps as an application can refer to the
following resources. You will need to download a Java virtual machine
suitable for Java 1.1.x programs.
Sun's Java site:
http://java.sun.com/

Java 2 Platform - install the Java runtime environment
on your system and you can run ztps as a desktop
application:
http://java.sun.com/j2se/1.3/

Related links on port scanning
Wired articles on the Draft Convention
on Cyber-crime, a proposed international treaty that
could make port scan illegal world wide.
Privacy a Likely Loser in Treaty
Dec 7th 2000
http://www.wired.com/news/politics/0,1283,40576,00.html

"[The treaty] could also make it illegal to distribute some
kinds of security products used by system
administrators to secure their networks against intruders."
Police Treaty a Global Invasion?
October 17th 2000
http://www.wired.com/news/politics/0,1283,39519,00.html

"Technical experts have said Article 6 of the measure,
titled "Illegal Devices," could ban commonplace
network security tools like crack and nmap, which
is included with Linux as a standard utility."
(nmap is a sophisticated port scanner)
Draft Convention onCyber-crime (Council of Europe)
http://conventions.coe.int/treaty/EN/projets/projets.htm

Wired article on Norwegian Supreme Court Decision:
Let the Web Server Beware
Dec 23 1998 http://www.wired.com/news/politics/0,1283,17024,00.html

"The essence of [the ruling] is that if you want to join the Internet,
you have to assure that you're protected," said Gunnel Wullstein,
president and CEO of Norman Data Security. "If you don't want to be
visited, close your ports."

 [[Message_Out]]

Zapatista Tribal Port Scan: A Demonstration Tool.
By
Electronic Disturbance Theater
In Solidarity with the Zapatistas

EDT
http://www.thing.net/~rdom/ecd/ecd.html

EZLN
http://www.ezln.org

Zapatista March 2001
http://www.ezlnaldf.org

 fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
 fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff

    
.:::[    Copyright (c) www.thehacktivist.com 2001. All Rights Reserved.   ]:::.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
 fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff 
  ::[                Contact: editor@thehacktivist.com                    ]::
   ::[     ]::::::::::::::::::::::::::::::::::::::::::::::::::::::[      ]::
    :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::