Discus Systems PLC - IT Support Company in Birmingham West midlands
0800 880 3360
 


Posted by Damien Biddulph on Mon 25th Apr 2016

Have you ever considered getting involved in competitive tooth brushing – against yourself?

No, we’re not making this up. A new app has been released that analyses how you brush your teeth and sets you challenges against yourself.
According to its developers in Japan, the G.U.M PLAY app will turn ‘the usual three minutes of brushing into an exhilarating three minutes of discovery’.

All you have to do is attach the G.U.M device to the end of your toothbrush and away we go.

This ridiculous app means brushing your teeth will never be the same

The small device will monitor your brushstrokes, and send data to your phone or tablet app using Bluetooth.

You can then choose one of three options: ‘Mouth Monster’ (oh, behave) where you ‘play a game to defeat oral bacteria’; ‘Mouth Band’, where you ‘make music as you brush’; and ‘Mouth News’, to ‘listen to news as you brush’.

This ridiculous app means brushing your teeth will never be the same

All of the data from your brushing is then recorded in a Mouth Log – so you can see how long you brushed for, and which parts of your mouth you might be neglecting.

You can buy it for 5,000 Yen, which is around £35.

Source: metro.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 25th Apr 2016

If you regularly send WhatsApp or Facebook messages while at work, this might be worth reading.

UK employees are sending up to 100 private messages every day without realising that their employers might be monitoring their content.

The tech career site Dice has released new research which indicates that employees in British companies are sending large volumes of private messages including applications and inquiries relating to other jobs.

Just under 70 per cent of workers in the UK admit to using email, text, WhatsApp, Facebook and other platforms for personal use during work hours, but research shows a large proportion are unaware of the regulations when it comes to the monitoring of private messages.

Almost half had no idea that their employer may be entitled to monitor the content of the messages they send on company devices. The rule came in this year after an employee was fired for messaging his fiancée on Yahoo Messenger while at work.
The research shows it isn’t just the fact that employees are sending private messages that could be problematic, it’s the indiscretion they show in what they discuss too. Forty per cent have communicated with a new or potentially new employer from work, nine per cent have discussed personal matters about their relationship or flirted with a co-worker and 31 per cent have spent their time shopping.

So be careful.

Source: metro.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Tue 19th Apr 2016

TORONTO (Reuters) - Tech companies should comply with lawful requests to access protected data, BlackBerry Chief Executive John Chen said on Monday, in thinly veiled criticism of rival Apple for its recent standoff with the FBI.

Chen made the comment in a blog posting after reports by Vice and Motherboard last week that threw a spotlight on a 2014 case in which Canadian law enforcement authorities used intercepted messages between some BlackBerry devices to unravel an organized crime network.

The devices were consumer phones that were not protected by BlackBerry's BES server, which helps secure any devices running within corporate networks.

"We have long been clear in our stance that tech companies as good corporate citizens should comply with reasonable lawful access requests," said Chen in the post.

"We are indeed in a dark place when companies put their reputations above the greater good," said Chen, who is known to not shy away from publicly sparring with rivals.

Chen, who maintains the BES is "impenetrable" and that only BlackBerry's clients can grant access to messages secured by it, has weighed in on the lawful access topic a number of times in the last few months, including in another blog last December.

He also commented on the topic at a media roundtable earlier this month, when asked to comment about BlackBerry's security capabilities in light of the FBI's hacking of an iPhone used by one of the San Bernardino shooters. Apple had declined to help authorities unlock the encrypted device.

"Not that we can crack every phone, but from the standpoint of BlackBerry's philosophy, policy, and principles, we will help whenever there is a formal subpoena that comes to us and we have been doing it for many, many, years," said Chen.

"But since we don't have a backdoor and since the encryption technology has now gotten to a point where we may, or may not be able to penetrate it, we will have the same difficulties, but we won't have the same attitude about it and it won't be front page news."

"Of course we are not Apple, so it may or may not make front page news either," added Chen with a coy smile.

Source: uk.businessinsider.com
 
corner spacer corner
 


Posted by Damien Biddulph on Tue 19th Apr 2016

Construction giant Dewalt has entered the smartphone market with a tough Android-powered handset designed for building industry workers.

The £379 ($544) device is designed to survive a 2m drop on to concrete and can operate in temperatures ranging from -20C to 60C.

Rival firm Caterpillar has already established itself as a brand in the physically tougher smartphone sector.

The so-called "tough phone" market is flourishing, a retailer told the BBC.

"Lots of people in the trade and construction industries, as well as outdoor sports enthusiasts, have realised that just having a thicker case isn't going to see them through," said James Booker, purchasing manager at UK firm Tuffphones.

Caterpillar's latest model features a thermal imaging camera

To be be certified as a "tough phone", handsets have to undergo more rigorous physical tests, including being subjected to tumbling - turned over and over inside a device for long periods of time, Mr Booker explained.

They also have to be water and dust proof.

Because they are sturdier, they can also incorporate a bigger battery, he added - the Dewalt phone claims to offer up to eight hours of talk time.

"One of the main things about traditional smartphones is that they are svelte and slim - there's an obvious correlation with how large a battery they can get in there," Mr Booker said.

While most of its specifications are fairly standard for the sector, Dewalt's MD501 phone comes with in-built QI wireless charging, which is unusual, he added.

Its touchscreen is made of commercially manufactured Gorilla Glass - a highly robust but thin type of glass that works with gloved hands.

The handset is a collaboration with Global Mobile Communications, a rugged phone specialist.

Source: bbc.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Tue 19th Apr 2016

The UK steel industry is doomed unless it embraces cutting-edge technology, a Cambridge professor has warned.

Prof Julian Allwood said the only way to save steel jobs was to make high-value products for industries in which the UK leads the world.

New methods could scrub impurities from recycled steel to make products for the aerospace and car industries, he said.
It comes as efforts are being made to save thousands of jobs at Tata Steel's Port Talbot steel plant in south Wales.
The announcement by the Indian company that it is to sell its UK business is the latest blow to an industry which has seen a succession of job cuts.

New steel

Prof Allwood said current plans for the steel industry did not go far enough, because they did not utilise the latest technology.
In his six-year study on the steel sector, the predicament of the industry appears stark.

"The global steel industry today has more capacity for making steel from iron ore than it will ever need again," he said.
"On average, products made with steel last 35 to 40 years, and around 90% of all used steel is collected. This is easy because it's magnetic.

"The supply of steel collected from goods at the end of their life therefore lags the supply of new steel by about 40 years."

UK steel crisis

Prof Allwood said the steel market would continue to grow - but all future demand growth could be met by recycling the existing stock of steel.

And it was, therefore, futile for the UK to attempt to compete against low-wage economies for mass market steel.
Reducing industrial electricity costs in Britain would help, but only a little, he said, and the UK should instead concentrate on recycled steel.

That is what is proposed by Sanjeev Gupta, the entrepreneur who has expressed interest in turning the Port Talbot works into a recycling plant.

But Prof Allwood said that plan did not go far enough, because most scrap metal contained impurities that made it suitable for only low-value products, such as steel reinforcing bars, which were subject to heavy international competition.

It would be far better, he said, to harness science to make pure hi-tech steel that met the needs of the UK's leading industries.

"UK taxpayers will have to bear costs of Tata Steel's decision to close the Port Talbot plant," he said.
"If the existing operations are to be sold, taxpayers must subsidise the purchase without the guarantee of a long-term national gain.

"If the plants are closed, the loss of jobs, income and livelihoods will reverberate throughout the UK steel supply chain.

"Instead, the strategy presented here enables taxpayers to invest in a long-term structural transformation.

"This would allow UK innovation ahead of any other large player."

'Common sense'

While many will applaud his analysis, some will ask how this theoretical model can be translated into real equipment and jobs - especially as the UK does not have an industrial strategy that would encourage this sort of thing.

Prof Allwood pointed towards the Danish wind industry as an example of successful government strategy to create jobs with a new product.

The steel transformation in the UK could be funded by a long-term loan from the government, which will have to bear the costs one way or another.

It would involve many of the current jobs being saved, but workers would need to retrain.

Prof Allwood said the hi-tech transformation had not happened yet because low margins in the European steel industry had squeezed investment - and China did not have the stock of old steel to make it relevant yet.

He said it might take three to five years to develop the technologies needed to transform the industry.

It would be estimated to cost £1-2bn, which he said was good value compared with the social costs of shutting the industry.

Dr Sarah Green, a metallurgist from Lancaster University, said: "It's common sense to maximise recycling efficacy in the UK steel materials cycle.

"Whether this alone will generate sufficient economic activity on a suitable timescale to offer a substitute for the current steelmaking sector is something that I am less certain of."

Denmark's wind turbine industry has created hundreds of jobs

Gareth Stace, of UK Steel, told BBC News: "We don't agree that there won't be a new need for virgin steel - we think we need more capacity.

"But we welcome this report - especially the recognition that the steel sector has been starved of investment in technology because of the crisis we have been in for years.

"There are steelmakers in the UK that make world class steel, but we are desperate for more investment."

Another expert also called for more research.

"The task is getting harder at the moment because impurities from copper get greater the more wiring there is in cars," said Prof Sridhar Seetharaman, chair in low carbon materials technology at the University of Warwick.

"Britain could lead the way by government supporting funding in this."

Source: bbc.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Tue 19th Apr 2016

The US Supreme Court has ruled in favour of Google in its 11-year legal battle with an authors group.

The Court said it would not hear an appeal from the Authors Guild, which claimed Google breached copyright laws by scanning books without permission.

he technology giant began the process in 2004, so it could include extracts in a searchable database, and it was sued by the Authors Guild in 2005.

The Supreme Court's judgement is the final ruling on the matter.

Fair use

Google's database of books lets people search through millions of titles and read passages and selected pages from them.
While some of the books in the database are old titles that are no longer protected by copyright, millions are more recent publications.

The Authors Guild had argued that the project undermined authors' ability to make money from their work.
Google said its database was a "fair use" of protected works, describing it as "a card catalogue for the digital age".

The firm could have faced billions of dollars in damages claims from authors if it had lost the case.

The Authors Guild said it was "disappointed" that the Supreme Court would not hear its appeal.

The organisation's president Roxana Robinson said: "We believed then and we believe now that authors should be compensated when their work is copied for commercial purposes".

A Google spokeswoman said: "We are grateful that the court has agreed to uphold the decision of the Second Circuit which concluded that Google Books is transformative and consistent with copyright law."

Source: bbc.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 18th Apr 2016

There are few things more frustrating at the cinema than someone who refuses to put their phone away during the movie.
But it might be about to become a far more common occurrence: The CEO of what will soon be the world's biggest cinema chain says he plans to let people use their smartphones during screenings.

Adam Aron is CEO of AMC Entertainment, a movie theatre chain that is preparing to acquire rival Carmike in a deal that will make it the largest movie-theater operator in the world.

In an interview with Variety published Wednesday, Aron said his company is looking into new ways to attract millennials into its theatres — and that includes letting them text during screenings.

"When you tell a 22-year-old to turn off the phone, don’t ruin the movie, they hear please cut off your left arm above the elbow," he said. "You can’t tell a 22-year-old to turn off their cellphone. That’s not how they live their life."

The CEO does recognise the frustration that the change is likely to cause many cinema-goers. "We’re going to have to figure out a way to do it that doesn’t disturb today’s audiences. There’s a reason there are ads up there saying turn off your phone, because today’s moviegoer doesn’t want somebody sitting next to them texting or having their phone on."

How? One option is is special texting sections, or certain screens where texting is explicitly allowed. "[Texting sections are] one possibility. What may be more likely is we take specific auditoriums and make them more texting friendly."

Source: uk.businessinsider.com
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 18th Apr 2016

A British Airways jetliner may have been hit by a drone Sunday as it approached London’s Heathrow airport, highlighting growing concern about the potential hazard posed by unmanned aircraft.

Flight 727’s pilot reported at about 12:50 p.m. local time that he believed a drone had struck the front of his Airbus A320 from Geneva, according to a statement from the London Metropolitan Police. There were no injuries among the 132 passengers and five crew members, and police are investigating.

“Our aircraft landed safely, was fully examined by our engineers and it was cleared to operate its next flight,” British Airways, a unit of IAG SA, said in a statement. The U.K.’s Civil Aviation Authority, which called it “a possible incident with a drone,” said that “it is totally unacceptable to fly drones close to airports and anyone flouting the rules can face severe penalties including imprisonment.”

The incident underlines the growing risks errant drones pose to airlines. The U.S. Federal Aviation Administration reported 1,200 incidents last year involving drones, up fivefold from 2014. No collisions were reported, though the incidents included flying too close to passenger airliners and other aircraft. The agency predicts 2.5 million drones will be sold in 2016.

“As far as I’m aware this is the first time a drone has collided with a commercial jet,” said Hans Weber, president of San Diego-based aviation consulting firm Tecop International Inc. “It clearly was illegal where this drone was being flown.”
Regulators have been working for years trying to decide how to regulate drones as the number of recreational aircraft soars, according to John Robbins, assistant professor of aeronautical science at Embry-Riddle Aeronautical University in Daytona Beach, Florida.

“It’s another paradigm in aviation,” Robbins said. “There’s a need to make users aware they’re not toys.”
The U.K.’s regulations stipulate users must be able to see their drone at all times, not fly it higher than 400 feet (122 meters) and keep away from planes, helicopters, airports and airfields. In the U.S., the FAA requires operators to stay more than five miles from airports unless they get permission from air-traffic controllers.

“There’s a real tug of war between drone users and regulators,” Weber said, citing reports of some hobbyists competing to get as close as they can to jets. “If people kept to those requirements there would be no problem.”

Source: bloomberg.com
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 18th Apr 2016

Log on to Instagram and chances are at least one of your friends has posted a photo of his or her workout regimes or healthy meals. Maybe you're repulsed and disgusted by it.
Consider that part of the process.

A "first reaction [is] to resent how much their friends are posting sweat selfies and ... drinking their shakes," says Carl Daikeler, CEO of at-home workout company Beach Body.

After all, the constant in-your-face nature of wellness is a sharp detour from how things used to be. It was once easy to ignore the need to have a healthy lifestyle; you could just go about your life without constant reminders that you could be healthy.

"However, it has been easy to completely ignore ... an active lifestyle and food choices that would enhance your life," said Daikeler, whose company introduced iconic programs such as Insanity, P90X, and 21-Day Fix to the world.

"It's been so easy to make that optional because it wasn't in your face [before]. Right?" he said. "You go about your life, you've got to do your job, your kids [are] expecting everything of you, but the one thing that was very easy to skip is exercise, and [it was] very easy to justify grabbing pizza because you worked so hard today and your boss yelled at you and you were under so much pressure that you just need a little gratification."

That's not an option anymore.

"However, the rise of Instagram ... and now, Facebook, and now seeing people like you are fitting it into their day and they're putting in the effort and they're enjoying their life and doing things they never thought they could do," Daikeler said.

That could mean sharing a healthy meal that's diet-friendly or sharing post-workout photos.

Autumn Calabrese, the trainer behind the extremely popular 21-Day Fix, also sees the importance of social media.

"For me, coming from being the trainer, I think that it's huge in the fact that it is all about sharing your success or sharing people's success," Calabrese, who shares clients' results on her own Instagram page, said to Business Insider.

It also serves as a new way to show off results — and perhaps more importantly, the process of getting those results, and the process can be the unfortunate part.

"And you can look though these hashtags and not only see people's results, but see what they're doing to get them," she said. "You can see the meal prepping, you can see them sweaty at the ends of their workouts, you can see them on days [when they're] tired on the floor and [are] like '[I] don't wanna do it' [but still] push play [on the DVD]."

It has helped cultivate fitness communities, too — which is extremely important when people are working out at home, in the absence of a visible community that one might find at a gym or a boutique fitness class.

"Social media has kind of made it easier to come together," she said. "I think that they say, 'misery loves company' and — not that it's miserable to work out and — well, maybe it is for some people — but the fact that they have other people to hold them accountable and to say like, 'great job,' 'did you push play?,' way to get those work outs done!,' and they have other people that they can share those results with and other people cheering them on — it sells the product itself."

Further, Calabrese spoke to a positive business implication of social media. "You don't even have to go out and try to market you just have to go and show what it does ... so I've seen amazing things just through like Facebook and through Instagram and [other social media outlets]," she said.

Marketing that comes directly from the customer is arguably more authentic than a commercial. When women see other women share their own journeys (or when a company shares a photo originally posted by someone), it undeniably can intrigue them to want to try that product, too.

Further, Beach Body isn't the only viral workout sensation to take the Internet by storm.

Other brands have profited off of the Instagram community, as well; Kayla Itsines' Bikini Body Guide program, for instance, has cultivated a massive community that goes so far to call itself Kayla's Army, thanks to highly shareable photos and recognizable hashtags on Instagram. In fact, Itsines has arguably built her empire using impressive before-and-after photos, which zero in on her fans' respective journeys.

As Daikeler said, it's just that much harder to ignore wellness these days — but perhaps it's that much easier to find motivation and inspiration.

Source: uk.businessinsider.com
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 18th Apr 2016

On October 12th, 1983, Bill Landreth called his friend Chris in Detroit to chat. Chris frantically explained that the FBI had raided his house. “Don’t call me anymore,” Chris said in what would be a very short conversation. Bill didn’t know exactly what was happening, but he did know this: If the FBI had come for Chris, then he might be next.

The next day, around a dozen FBI agents stormed Bill’s parent’s house just outside of San Diego, amassing piles of evidence including a computer that Bill, then 18, had hidden under his sister’s bed. Bill and Chris, who was 14 at the time, were the leaders of a coalition of teen hackers known as The Inner Circle. In a single day, the FBI conducted coordinated raids of group members across nine states, taking computers, modems, and copious handwritten notes detailing ways to access various networks on what was then a rudimentary version of the internet.

The Inner Circle was a motley group of about 15 hackers, almost all teenagers, from Southern California, Detroit, New York, and roughly five other regions of the US. Bill, Chris, and other members of their collective had been accessing all kinds of networks, from GTE’s Telemail—which hosted email for companies like Coca-Cola, Raytheon, Citibank, and NASA—to the Arpanet, which was largely used by university researchers and military personnel until Milnet was completed in the mid-1980s. Chris was fond of boasting on message boards about hacking the Pentagon. The Inner Circle wasn’t the only teen hacking group of the early 1980s, but their interference with both government networks and the email accounts of large corporations put them on the FBI’s radar. Along with the 414s, a group busted around the same time, the raids made national headlines. The Inner Circle’s actions would inspire a complete overhaul in how computer crime was prosecuted, through the introduction of the country’s first anti-hacking laws in 1984.

I decided to track down members of The Inner Circle, and find out what happened during their heyday and infamous bust, and where it’s led them today. In the process, I’ve obtained 351 pages of FBI documents about early-80s teen hacker communities through a Freedom of Information Act request. The pages are heavily redacted, but they fill in some of the many holes that remain about The Inner Circle, the FBI’s crash course in computers, and the teen computer underground of the early 1980s.

After WarGames came out in June 1983, every wannabe hacker with more money than sense went out and got a computer and modem...
The story of Bill and Chris is one of simple curiosity, and the birth of the modern internet in an era before computer hacking laws existed. It was an era when most of America—including virtually everyone in the FBI—couldn’t tell you what a modem was. This period, from roughly 1979 until 1983, was a mythical Wild West for kids who became interested in computers, and saw the rising popularity (and declining price) of personal computers as well as the release of the movie Wargames. The kids of this period were early adopters, and they got into plenty of trouble.

After WarGames came out in June 1983, every wannabe hacker with more money than sense went out and got a computer and modem from places like RadioShack, thinking they could get their fingers close to the big red button. It didn’t work that way, of course. But there were plenty of other hijinks that kids of the early 1980s could pull with a computer, a phone line, and the special brand of fearlessness that comes with youth.

The FBI started tracking The Inner Circle in 1982, but it wasn’t until late 1983 that they’d finally bust the group. In large part, that bust was possible because of a 42-year-old pseudo-vigilante hacker known as John Maxfield—a former phone phreak who fancied himself the proto-internet’s sheriff. Maxfield gained the trust of teen hacker communities on bulletin board systems (BBSs) in the early 1980s and fed the information to the FBI.

Maxfield provided the FBI with the intelligence they needed on The Inner Circle’s exploits, especially when it came to the hacking of Telenet’s Telemail email system. Chris, frustrated and bored, had started deleting emails of Coca-Cola executives and using administrator passwords to change the names on accounts. GTE, the company that operated the Telemail service, wasn’t pleased. After all, the hackers were using Telemail “illegally.” Which is to say, for free. FBI documents spell out just how much time was being stolen by these kids, right down to the penny. For example, use of BMW’s messaging service by unauthorized users in September, 1983, cost GTE $0.29. Unauthorized use of Raytheon’s accounts in the same month totaled $298. But it was the widespread loss of faith in the system’s security that was most damaging to GTE.

I spoke with Bill and Chris, but was unable to connect with any other of The Inner Circle members or Maxfield. A letter sent to Maxfield’s last known PO Box has yet to receive a reply, and the last known number I could find for him was disconnected. For all I know, he’s dead. Or he’s elderly and keeping a low profile. Maxfield always tried to stay off the radar, but after he was exposed as an FBI informant in late 1983, he became the most loathed man on the internet.

The Untold Story of the Teen Hackers Who Transformed the Early Internet
Bill’s tablet, coffee, lighter, and DIY apple pipe for his medical marijuana (Photo by Matt Novak)
When I met Bill Landreth at a Starbucks in Santa Monica, he was sitting quietly at a table drinking coffee with two bags on the the seat across from him, and a bag of blankets in the corner. A pipe made out of an apple and filled with what I assumed was medical marijuana sat at the table next to his coffee and Samsung tablet. A passing cop glanced at the spread but didn’t raise an eyebrow.

Arranging our meeting was tricky, because Bill isn’t sure where he’ll be sleeping from night to night. Now 52, with a slight goatee and a tussle of wavy hair that nearly reaches his shoulders, Bill has been living on the streets for 30 years. But if it weren’t for his receding hairline and a certain grayness to his gaze, he’d probably pass for a decade younger. There’s something assertive yet firmly guarded about the way he speaks. It’s as though Bill’s a man who’s not afraid to say what he thinks, but still worries about saying something out of line in front of me.

In our conversation, he was calm, affable, and clearly intelligent, and almost immediately began rattling off computers and computing languages of which I have little to no background or understanding.

Bill got his first computer in 1980, he tells me. It was a TRS-80 from RadioShack. He was 14 or 15, and explains that he planned to get the version with 8K of memory using $500 he had saved. His dad offered to pitch in another $500, and he got the 16K version with a cassette tape drive for storage. He also picked up a 300 baud modem.

Bill was a quick learner, and developed a knack for the BASIC programming language. From there he’d learn other languages, and his desire to explore the world of computing became overpowering. After he’d conquered one area, there was always something new around the corner. He was an explorer; more interested in mapping the entire terrain than in penetrating deep into any given network. Bill, who would take up the moniker The Cracker, found community with an emerging group of misfits online. They gave him a sense of place in the new world he was traversing.

“You didn’t really meet many of the other people,” Bill says. “You could go out of your way to try to.” But Bill’s connections were through his modem and phone.

He’s the son of two hippies who spent much of his childhood living a semi-nomadic lifestyle. His dad, an astronomy lover, built telescopes under the brand name Essential Optics. But he only charged people for parts at cost, and hardly charged anything for his labor. The only moderate business success Bill’s father ever had was selling grow lamps in the 1970s. He even bought full page ads for the lamps (ostensibly to grow tomatoes) in High Times magazine.

Despite his friend Chris’s warning on October 12, 1983, Bill wasn’t sure that the FBI was coming for him when they did. Aside from his grow-lamp business, Bill’s dad had a tendency to go up to Big Bear (a rural, touristy area about four hours outside of LA) to pick up LSD and cocaine. To this day, Bill’s still not convinced that there wasn’t some attempt by the FBI to get at his father through him.

But they had come for Bill. Along with other teenage nerds in his collective, Bill was “hacking” the first commercial packet-switched network, Telenet. The Telenet network (now owned by Raytheon) was inspired by the structure of the Arpanet, and had local hosts in 52 cities by the early 1980s. Tapping into that network’s mail system allowed Bill and his hacker friends to make local calls to chat, rather than tricking the phone system into letting them make long distance calls for free—a necessity if you wanted to post on a BBS outside your area code without amassing huge bills.

Someone told Bill that administrator accounts for GTE’s Telemail simply used a capital A for the password. “So I would just try last names with capital A and I would get a lot of accounts,” Bill tells me. “So that was what let me in to be able to make other people’s accounts, and we’d just have conversations.”

Bill’s plea agreement is thin, with just eight pages detailing his “crimes.” In 1983 there were no computer hacking laws, but the courts in Virginia clearly thought that penetration of computer networks was a serious crime, even if nothing was stolen. So Bill was charged with wire fraud, which essentially amounted to the crime of making three phone calls with his computer.

When we leave Starbucks and go to lunch, Bill packs up his tablet and charger and puts on his backpack. He throws his clear plastic bag, filled with blankets and a small tent, over his head, carrying the enormous parcel with the weight distributed on his pack and the back of his neck.

As we eat, Bill tells me stories of the past 30 years, of his struggles with mental illness and living on the streets of San Diego, Los Angeles, and Santa Barbara. We trade stories about the different psychiatric medications we’ve tried. I’ve been having issues with my depression and mood stabilizer meds, which make me incredibly tired throughout the day. Bill’s convinced that self-medication is the way to go. He shares that he’s been diagnosed as manic depressive and has had a few involuntary trips to the local mental health facility via police—the “taxi service,” as he calls them. Bill tells me that when it comes to basic hygiene, he showers at his brother’s place in town. I can’t bring myself to ask why he doesn’t live with his brother.

Throughout lunch I try asking in at least three different ways what Bill’s motivation for hacking was. Each time, it was like asking someone why they’d read a book or watch a movie. Bill says he just wanted to know what was out there. There’s a blunt cadence in his tone that makes me believe him, and the FBI documents bear this out. When he’d crack into financial institutions it was always shallow. He wasn’t looking to steal a million bucks or get deep into any system for personal gain. But he did enjoy being a voyeur. Bill and his friends would often pull pranks, like getting all the phone operators from a certain area on a giant conference call together. Chris even got a bunch of senior military personnel on what must have been the most confusing phone call of all time.

The Untold Story of the Teen Hackers Who Transformed the Early Internet
A heavily redacted page from the FBI’s file on the Inner Circle hacking group
Despite having his home raided and computer equipment seized, Bill wouldn’t be charged for nine months. He says he didn’t want to get a lawyer and was confident that he could fight on his own. Bill tells me his strategy would’ve been to convince a jury or judge that his crime was like walking into a huge mansion, unlocked. He just wanted a look around. As Bill explains his thought process I hold my tongue, knowing that this line of reasoning makes sense to someone who grew up in a hippie family and the Western ethos of exploration that often comes with it. But I also knew that it wouldn’t have worked for a second in front of a federal judge on the other side of the country.

Bill’s father convinced him that he needed a lawyer; a move Bill still thinks was a mistake. They struck a deal, giving Bill three years probation for pleading guilty to three counts of wire fraud. Bill’s family moved to Alaska and Bill moved in with friends in Poway, California. Without a computer, he went dark on the BBS boards. He attended the University of California-San Diego for a while, but soon traveled to Mexico and then to Oregon. He never told his probation officer where he was going, and was picked up in Oregon and flown to San Diego, where he served 3 months in jail.

After getting out, Bill knew he had to find a way to make money. He weighed about 120 pounds at the time and needed income. Bill says he was “sort of fasting,” though his eyes betray that he probably didn’t have any money for food. Rather, he found his desire for a computer even more important than his hunger.

“I really wanted a computer but I couldn’t figure out how to make money to buy a computer,” Bill says. “When I first bought a computer [in 1980] I already had $500, but by this time I didn’t really have any money saved up or anything.”

So he cut out all the headlines he’d collected from friends across the country; splashy sensationalistic spreads about The Cracker’s big FBI bust. He found a literary agent, and wrote his entire book proposal by hand before hammering it out on an old typewriter. His agent got two responses, one from Microsoft, which offered a $5,500 advance. The book, co-authored by Howard Reinghold, was published in 1984 under the title Out of the Inner Circle. Bill immediately spent the entire sum of his advance on a new computer.

The Untold Story of the Teen Hackers Who Transformed the Early Internet
Bill Landreth in high school circa early 1980s (left) Bill Landreth on the cover of his book Out of The Inner Circle (right)
When his royalty checks started drying up around two years later, Bill looked for work here and there. He took a job with Scientology that promised $200 a week selling books, but quickly learned that he’d be making $1 a day and promptly quit. Today he’s able to feed himself, buy medicinal weed, and sometimes splurge on a tablet thanks to Social Security payments and California food stamps. But he hasn’t had a stable home since high school.

Bill’s entire existence is stuffed into three bags, and keeping an eye on them is a constant struggle. When his stuff is stolen, he often doesn’t know if it’s by other homeless people or the police. He says he has to buy new blankets once every three weeks. And his $150 Samsung tablet is always in danger of getting stolen.

Bill’s life, he says, is a constant stream of indignities and harassment from police. They enforce ordinances arbitrarily and inconsistently, trying to push homeless people out of sight. Bill tells me of a bridge he was sleeping under in Santa Barbara. An officer approached him, handcuffed him, searched all his belongings, and told him he couldn’t sleep on that side of the road under the bridge. He was cited for “illegal camping” but was told that sleeping on the other side was okay. So the next night he moved across the street. The police officer came back and gave him another ticket. Bill figures he has about $10,000 in unpaid legal fees and fines—most of it interest on the debt that grows and grows over time.

It couldn’t be further from the life of Chris, the 14-year-old who exchanged a brief phone call with Bill after his own FBI raid. Chris’s story is that of a kid who grew up to thrive in the culture of our burgeoning internet. With just a few minor tweaks, Bill’s story could have been similar. Bill tells me he hasn’t talked with Chris in 30 years, and they never met in person. But he has only fond memories of their friendship from halfway across the country.

“Growing up in Detroit there wasn’t a vast amount of things to do...”
I spoke with Chris over the phone under the condition that I not use his real name. In the early 1980s he was known online as the Wizard of Arpanet, a moody punk who bragged incessantly about the networks he’d penetrated. Today, he’s an upstanding family man “working with computers” (he declined to get specific) in a suburb of Detroit.

“It’s been a long time since I’ve talked about the Wizard of Arpanet days,” Chris tells me over the phone from his home outside Detroit. Chris was 14 when the FBI came knocking on his door.

Chris was an Atari guy, and his first computer was an Atari 2600. “You could plug in a basic cartridge and it had like 1k of memory and you could do some cool stuff with it. Then you kinda stepped up to the Atari 400, which was cool because you could do some programming but then you could get the modem—that 300 baud modem on there. Then you started to figure out what you could do with a 300k baud modem.”

Much like Bill, Chris found that his computer was a connection to the outside world; a sense of community that he couldn’t find elsewhere. “Growing up in Detroit there wasn’t a vast amount of things to do, so you had this modem and you start exploring,” Chris says. “You find your first bulletin board and then that bulletin board has a little bit of information on it and you kind of... that’s what intrigued me. In a general sense it hasn’t really revolutionized much from there—you called in to the bulletin board, you post messages, and you call in back and forth. It was a lot slower and there were no graphics, but the essential kind of concept was the same [as today].”

The key to hacking in the early 1980s was figuring out how to make free phone calls. Phone phreakers had been doing this since the 1960s, but it was even more vital for precursors to our modern internet. Dialing into a BBS in your area code wouldn’t cost too much. But if you were in Detroit and wanted to access a board outside your area code, that meant long distance calls. And long distance calls used to be damn expensive. So any computer hacker worth his salt quickly learned how to “hack” the phone company—and that’s what the Wizard of Arpanet started doing.

“That opens up the world,” Chris tells me. “Now I can call a BBS in New York or I can call this board over here in San Diego. And then you start getting out there.”

And once you were “out there,” the hackers of The Inner Circle and elsewhere would have a variety of ways to break into networks. Except that during this period, security was so weak that “break” is too strong a word. An operating manual could yield active administrator passwords for a variety of systems simply because nobody bothered to change the default passwords.

Chris’s true love, though he’s reluctant to talk about it today, was hacking the Arpanet and military systems. In fact, that’s how I found him. I was researching what kind of espionage the Soviet Union was conducting on the Arpanet and Milnet in the 1980s. We know of a few Soviet hackers who were looking for state secrets, but there were also kids like Chris rummaging around MIT, Stanford, and UCLA for fun.

“Then we started to get some of the Arpanet stuff, and somehow I got one of the main dial-in connection points,” Chris tells me. “And from there it was just kind of discovering all the different hosts.”

“Once you were able to get into one, I was able to get the full host list. So I got the full list of hosts on the Arpanet just from snooping around. From that point I was able to go through and just test them all out,” Chris says. What he had tapped into was known as a TIP, sort of like a super-modem that routed information along the Arpanet. According to the FBI documents I obtained, the military and researchers at the various nodes on the Arpanet had not detected the penetration. Their informant, the BBS narc John Maxfield, was the one who learned about it straight from the Wizard of Arpanet’s mouth.

Chris had no idea that he was constantly being watched by one of his own. Maxfield, who went by the handle Cable Pair on BBS boards, was never approached by the FBI about the activities he was observing in the early 1980s. Instead, Maxfield approached them. He’d later recall walking into the FBI to tell them about the kids swapping software on BBS boards. The FBI replied that this sounded like a bad thing, but got tripped up when he started using words like “modem.” They had no idea what he was talking about.

But after Maxfield’s initial contact, he developed a long term relationship with the agency. He set up meetings with hackers to gather evidence firsthand, and once allowed the FBI to photograph the kids from across the street in a massive sting operation.

“He invited a bunch of the different hackers from around the country to visit [him in Detroit]. So we all got together—it was like a hacker jam session—at the guy’s offices with all this phone equipment and computers,” Chris says. High school and college kids came from around the country. “It was like… ‘let me show you what I can can do,’ and ‘let me show you this.’”

Maxfield would say later that he was particularly impressed by the Wizard of Arpanet’s skills. Chris had no idea that he was incriminating himself with every keystroke. “The FBI took pictures of everybody that came and went, and they also had some early sort of keyboard monitors back then to see what was going on,” Chris says. “I happened to show them, ‘hey here’s the whole host list for the Arpanet! Take a look at this! This is pretty cool, I can get on any of these computers!’”

Maxfield rarely talked to the press after the raids, but journalist Patricia Franklin spoke to him for her 1990 book Profits of Deceit: Dispatches From the Front Lines of Fraud. When I contacted Franklin recently, she wasn’t surprised that Maxfield was hard to track down. He was secretive and self-righteous, she said, and used the same rhetoric that has become common in the 21st century whenever people talk about hacking or copyright infringement.

“Hacking is a completely impersonal, dehumanized crime,” Maxfield told her. “None of them would dream of taking a knife or a gun and mugging someone on the street. The hacker doesn’t know his victim and the victim never knows the hacker. There is never any physical risk involved. They are introverted thrill seekers.”

That tone would ooze out of the heavyweights at the FBI and elsewhere when it came to software and movie piracy. “You wouldn’t steal a... fill in the blank” is now little more than a punchline in online circles. But at the time, it was the best way to make the case that intellectual property should be considered real property and that virtual locks should be considered real locks. Maxfield literally compared himself to the Lone Ranger.

“With a computer, hackers can carry out their wildest fantasies,” Maxfield said in the late 1980s according to Franklin’s book. “And there is no one supervising them. It’s the alternative to a street gang. The hacker is a street-corner hood, except today the meeting place is a bulletin board.”

Maxfield became so infamous that the first issue of the legendary 2600 magazine, in January of 1984, dedicated its cover to the October 1983 raids and the outing of Maxfield as an FBI informant.

When Chris was finally busted, the FBI turned his bedroom upside down and took all his computer equipment. But Chris’s mother, who was home at the time, later defended him in an Associated Press article. “He bragged he knew how to do it, but he said he would never harm anything if he got in,” she said in 1983. “He would just look and leave. It was just the thrill of getting in.”

The FBI had two problems. One was that they were losing the public relations battle in the press. There are extensive notes in the FBI file about the fact that they’d have to tread lightly, since they were dealing with so many juveniles. The second problem was that there weren’t really any computer hacking laws. “Breaking into” a computer system wasn’t illegal, unless you took a broad interpretation of wire fraud law, as the FBI did with Bill. But since Chris was just 14, they struggled with whether to charge him.

The LA Times ran stories with headlines like “FBI Won’t Go Lightly on Whiz Kids,” but ultimately the agency did go easy on group members who were under 18. It was a calculated move, and one that would pay off, since so many Americans had no idea what hacking was. The idea that the FBI was picking on innocent, curious kids gained traction in communities like Irvine, California, where four of the hackers had their computers confiscated.

The Untold Story of the Teen Hackers Who Transformed the Early Internet
Four group members at a press conference on October 13, 1983 after getting raided. From left: Wayne Correia (17), Gary Knutson (15), Gregg Knutson (14), and David Hill (17)
The local Irvine newspapers questioned heavy-handed FBI tactics, as kids held press conferences insisting that they didn’t do anything wrong. In fact, they pointed their fingers at Bill Landreth, The Cracker, for getting them involved. Bill’s physical isolation from the other hackers—like the four who knew each other in Irvine (two were brothers)—made him a mysterious figure in the press. Unlike the kids from higher income families, Bill had avoided the attention of newspapers.

The FBI never charged Chris with anything. He went back to school and relished in his new celebrity. “I got a lot of newspaper clippings, and then I became very popular and then I got a lot of girlfriends, and it was all good,” Chris says, laughing.

By the end of October 1983, the same month as the raids, the FBI was asking Congress for stronger anti-hacking laws. Or, rather, hacking laws at all. But to do that, the agency acknowledged that they’d have to redefine the legal meanings of both “property” and “trespassing.”

“Right now there is a void in the law,” FBI Deputy Assistant Director Floyd Clarke testified. “Our experience indicates that certain legal issues involving computer-related crime could be clarified, particularly the definition of property in the sense of a computer program having its own clearly defined inherent value, and the issue of trespass.”

The FBI would get their laws—and the teen cowboys of the Wild West would simply continue chasing sunsets. The first computer hacking law, the Counterfeit Access Device and Computer Fraud and Abuse Act (US Public Law 98-473, 1984), was enacted in 1984. But the laws would only grasp at the low-hanging fruit. Richard C. Hollinger’s 1990 paper “Hackers: Computer Heroes or Electronic Highwaymen?” argued that the laws only addressed the least disruptive elements in hacker society:

Currently we are in the midst of a paradox. The computer criminals doing the least harm and who are generally the least involved in malicious activities, “hackers,” have become almost the exclusive prosecutorial focus of computer crime law enforcement.
Bill and Chris were in the “least harm” category; they hadn’t stolen anything but time, if that can be considered a crime. The true computer thieves were those inside a given organization. A 1984 study by the American Bar Association, cited by Hollinger, found that 77 percent of computer crime was committed by a company’s own employees.

Essentially every computer hacking law passed since 1984 is a cousin of the Computer Fraud and Abuse Act. And the original Act itself is still being used (sometimes ham-handedly) by law enforcement today. It’s the law that internet activist Aaron Swartz was charged under after he downloaded a massive cache of academic papers. Swartz faced fines of $1 million and 35 years in prison. He took his own life in January of 2013 before the case was heard.

People get six-figure salaries to find vulnerabilities in networks today.
When I went to Santa Monica to meet Bill, I was pretty sure I’d hear a story about how the FBI had ruined his life. But I left believing that it hadn’t. The world ruined Bill’s life—a world that couldn’t quite find a place for his particular talents, faults, and petty mistakes. While it’s a cliche, it’s hard not to think that perhaps Bill was ahead of his time in many ways. He was smart enough to see vulnerabilities no one else could in what would become the modern internet. Legislation was drafted because few people in law enforcement had even thought what The Inner Circle did was possible, and digital security is now more important than ever. People get six-figure salaries to find vulnerabilities in networks today. But being just four years older than Chris meant Bill was tried as an adult and saw his life set on another course.

The Untold Story of the Teen Hackers Who Transformed the Early Internet
Bill Landreth in Santa Monica on March 18, 2016 (Photo by Matt Novak)
In Los Angeles it’s not uncommon to walk by familiar faces, briefly famous but now forgotten. Nobody does a double take when they see Bill. Instead, given that he’s one of the roughly 40,000 people sleeping on LA’s streets on any given night, people tend to avert their eyes from his gaze.

I thank Bill for sharing his story with me, and I leave him in Santa Monica. The world seems content to punish him for the victimless crimes he committed over three decades ago. But that’s certainly not unique to Bill or computer hackers. Who knows how his life would’ve turned out if he’d been embraced by the FBI, rather than prosecuted?

I asked Bill what was in his future. He says he’s thinking about writing something—maybe a book or a screenplay. But mostly he just isn’t sure. “I’ll probably end up not getting that far along,” Bill tells me with a nervous chuckle before we part ways. “I’d like to buy a house. But I don’t know.”

Source: paleofuture.gizmodo.com
 
corner spacer corner

Veeam Specialist Microsoft Small Business Specialists Birmingham Microsoft Gold Certified Partner Birmingham Siemens Solution 1 Reseller Birmingham Sonicwall Specialists Birmingham Business Link Approved Birmingham Fujitsu Primergy Certified Partner Birmingham Facebook Follow us on Twitter ESET NOD32 VMWare
IT Support
IT Services
IT Solutions
Get Support Now
Sitemap
© 2018 Discus Systems plc. All rights reserved. Content Management by Verve Digital