%%T%%%H%%%E%%%%%%%%E%%%Y%%%E%%%%%%%%O%%%F%%%%%%%%A%%%%%%%%S%%%T%%%O%%%R%%%M%% .--.-. ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДД .-.--. ( ( )__ A CULTURAL RESURRECTION PUBLICATION __( ) ) (_, \ ) ,_) ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДД (_, ( / ,_) '- \\---' T THE EYE OF A STORM T '---// -' _\\ E ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДД E //_ \\ . O TEOAS O . // '.\:. A ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДД A :./ .' і .':`\ S ROCK'N INTO 2000 S /':'. і ЫіЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫіЫ ЫіЯ The Cunning Circumvention of Imposed Limitations by the Distribution ЯіЫ Ыі to the Public of Suppressed Information... Disclaimer in Isщ00 іЫ ЫГДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДґЫ %%T%%%H%%%E%%%%%%%%E%%%Y%%%E%%%%%%%%O%%%F%%%%%%%%A%%%%%%%%S%%%T%%%O%%%R%%%M%% ЫіЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫіЫ Ыі іЫ Ыі Authored by: [§tхrm] Release Dates: [Monthly] іЫ Ыі іЫ Ыі Edited by: [Demented Pixie] Issue [Isщ05] іЫ Ыі іЫ Ыі Released by: [Cultural Resurrection] Language: [English] іЫ Ыі іЫ Ыі Distribution by: [City of Angels] Issue Content: [Divide &] іЫ Ыі [Conquer ] іЫ Ыі ~~~Plz View Ezine in Fixed Width Font such as Courier~~~ іЫ ЫГДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДґЫ %%T%%%H%%%E%%%%%%%%E%%%Y%%%E%%%%%%%%O%%%F%%%%%%%%A%%%%%%%%S%%%T%%%O%%%R%%%M%% ЫіЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫіЫ ЫіIsщ05 іЫ Ыі Think about it! іЫ Ыі іЫ Ыі You've probably seen all of the articles lately on both Mainstream and іЫ Ыі Alternative news sites. "NSA Recruits Hackers" "FBI Enlists Hackers helpіЫ Ыі in digital sting", etc...etc...And if you've happen to notice, this typeіЫ Ыі of activity and newsprint is becoming much more common place today. іЫ Ыі Could this be because the NSA & FBI (Along with several other agencies) іЫ Ыі doesn't have the technical skillz necessary to combat Cyber-Crime, and/ іЫ Ыі or Cyber-Terrorism? Even with all there vast funding and expertise, do іЫ Ыі they really need the help of hackers? HARDLY! These agencies recruit іЫ Ыі degreed Computer Professionals from within corporate private sectors іЫ Ыі and Universities, not some high school midnight Hackers! It's not the іЫ Ыі Technical aspect of the Feds troubles that is the problem there facing. іЫ Ыі There Problems are in the sheer numbers of net citizens and Hackers thatіЫ Ыі are not willing to submit to there control and intrusions. You see, it'sіЫ Ыі not about recruiting hackers to aid the battle on cyber-crime. It's all іЫ Ыі about control. Hackers are being used by government agencies all right, іЫ Ыі but is it for the purpose that is being claimed? Or is it possible that іЫ Ыі this is only the beginning of a governmental plan that runs much deeper іЫ Ыі then what is only visible at the surface level. And the Hackers that areіЫ Ыі involved - "all pawns in the game". The game of "Divide & Conquer"... іЫ Ыі іЫ Ыі This article "Divide & Conquer" is written exclusively for the TEOAS іЫ Ыі publication by "§ilentwing§" BS in psychology, statistician and CulturalіЫ Ыі researcher with many years experience in the above & related fields. It іЫ Ыі is the second in her series of underground cultural topics. іЫ Ыі іЫ Ыі §tхrm іЫ Ыі іЫ ЫГДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДґЫ %%T%%%H%%%E%%%%%%%%E%%%Y%%%E%%%%%%%%O%%%F%%%%%%%%A%%%%%%%%S%%%T%%%O%%%R%%%M%% ЫіЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫіЫ Ыі іЫ Ыі .-. S A L U T E іЫ Ыі |-| іЫ Ыі | | And keeping with the theme of this zine Issue... іЫ Ыі _.-|=|-. TEOAS throws a hardy Salute to AntiOnline.com, JP іЫ Ыі / | | | | and all his merry band of misfits. іЫ Ыі | |\ іЫ Ыі | / For being the clueless pawns that they are in the game. іЫ Ыі \ / Taking notes JP? іЫ Ыі | / You should! іЫ Ыі іЫ Ыі іЫ ЫГДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДґЫ %%T%%%H%%%E%%%%%%%%E%%%Y%%%E%%%%%%%%O%%%F%%%%%%%%A%%%%%%%%S%%%T%%%O%%%R%%%M%% ЫіЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫіЫ Ыі іЫ Ыі Divide and Conquer (or The Price of Maintaining Status Quo) іЫ Ыі іЫ Ыі Human technology is outevolving human nature. As technological advances іЫ Ыі are becoming more prevalent at an alarmingly fast pace, many of us fall іЫ Ыі by the wayside trying to understand and keep up with those advances. іЫ Ыі Those with a natural aptitude are far fewer than those of us who have toіЫ Ыі struggle through the implications of the technology which has become a іЫ Ыі part of the lives of so many. A new world order is evolving right beforeіЫ Ыі us and many panic from the implications of that, especially governments іЫ Ыі who see their lack of control over this new order as a threat to their іЫ Ыі own powers. іЫ Ыі іЫ Ыі One way governments can try to maintain control is to gain the knowledgeіЫ Ыі for themselves and compete for supremacy. One way to gain such knowledgeіЫ Ыі is to recruit from among the very people they villify as dissidents, іЫ Ыі namely script kiddies and hackers. Those who can be bought are bought іЫ Ыі while the rest are labeled as anti-government and criminals. Okay, so a іЫ Ыі hacker can find security holes in Os's and applications that most of us іЫ Ыі use on a daily basis. So what... If their purpose was to snoop into іЫ Ыі systems why tell about the security breaches that are found? Would you іЫ Ыі rather not know who's snooping or could be snooping around in your іЫ Ыі system? Invasion of privacy? What privacy? There is none and never has іЫ Ыі been. That's an illusion that most of us prefer to live with. Your next іЫ Ыі door neighbor probably knows as much about you as you do yourself. And IіЫ Ыі bet he didn't have to find a security hole in your applications to know іЫ Ыі it, either. People tend to forget that if you don't want something to beіЫ Ыі known about yourself, then the subject matter is best left unsaid to іЫ Ыі begin with... because regardless of the medium used to say it, someone іЫ Ыі will always know. іЫ Ыі іЫ Ыі Humans are social animals and cannot survive well in isolation. The іЫ Ыі script kiddies of today are no different from the young adolescents who іЫ Ыі used to peep into girls' windows in the middle of the night, or write іЫ Ыі graffitti on walls making a statement of their own, usually to bring іЫ Ыі notice to themselves in a world that doesn't spend much time thinking ofіЫ Ыі kids as people, too. "All the world's a stage".. William Shakespeare. InіЫ Ыі truth today, all the world is a stage as technology has delivered it іЫ Ыі into the hands of the masses. іЫ Ыі іЫ Ыі So, why the governmental interference and the ongoing fight for free іЫ Ыі speech and the advancement of knowledge? Because the government wants іЫ Ыі and must maintain control in order to survive itself. Freedom of speech іЫ Ыі itself is an illusion that most journalists have been trying to make a іЫ Ыі reality for centuries. As an example, Kennedy vs. Clinton. What's the іЫ Ыі difference? (okay, so Monica Lewinski isn't a Marilyn Monroe). The pointіЫ Ыі is one made media headlines while the other did very little except raiseіЫ Ыі a few eyebrows from time to time, neither of which incident would have іЫ Ыі any bearing on whether either was capable of leading a nation, but in іЫ Ыі the most recent case it did accomplish something: a division within the іЫ Ыі ranks of a political party. The story was 'allowed' to become public іЫ Ыі knowledge and fanned flames of outrage throughout the nation within someіЫ Ыі parts of society, while other parts did little more than raise an іЫ Ыі eyebrow from time to time. But the division gave another political іЫ Ыі faction more power. іЫ Ыі іЫ Ыі The word hacker according to the dictionary basically means a tinkerer іЫ Ыі or someone who tinkers. The dictionary doesn't specify a certain thing іЫ Ыі a hacker tinkers with. By that definition, many of us in the general іЫ Ыі population could be called hackers. The word has become a negative labelіЫ Ыі for a group of tinkerers who happen to be very good at tinkering with іЫ Ыі something the general population has little or no knowledge about... іЫ Ыі : computers. The word hacker engenders in most people's minds with the іЫ Ыі picture of someone sitting in a darkened room nosying around on the net,іЫ Ыі writing out code to breach the security of countless computers for іЫ Ыі nefarious purposes, be it corporate espionage, snooping in someone's іЫ Ыі email or whatever. Granted, hackers can do that and more.... but as in іЫ Ыі one of my opening statements, so what? Just because you can do somethingіЫ Ыі doesn't mean you will or should. It's a matter of choice. Hackers are asіЫ Ыі much a part of society as any other culture. They have the knowledge іЫ Ыі that government wants, to preserve a way of life that is dying. The іЫ Ыі governments want control and have none. The media has become little moreіЫ Ыі than a governmental ragbag to cut off the very people who could advance іЫ Ыі that knowledge. Very seldom do you see an article about what the cultureіЫ Ыі has done that has advanced knowledge and when there is such an article іЫ Ыі it is placed in such a way that it receives very little notice from the іЫ Ыі general population. іЫ Ыі іЫ Ыі Such is the way of politics.... divide and conquer. The divisions withinіЫ Ыі the culture itself are a threat as differences in philosophies among theіЫ Ыі leaders create gaps in the sharing of knowledge while garnering power toіЫ Ыі each faction for an intercultural war. The only thing left for the іЫ Ыі governments to do will be to monitor the war from the outside and woo іЫ Ыі contenders with promises of wealth and power, while those who don't іЫ Ыі "sell out" are labeled dissidents and criminals. The dissidents and іЫ Ыі criminals (usually the notorious script kiddies) are used to fan public іЫ Ыі outrage and fear. As public outrage and fear escalates, lines are drawn іЫ Ыі in the proverbial sand as factions form to compete with each other for іЫ Ыі supremacy. іЫ Ыі іЫ Ыі Remember your history lessons... Lincoln once stated that a divided іЫ Ыі nation cannot stand. How so can anything stand divided against itself? іЫ Ыі A culture divided becomes a dead culture. There will always be hackers іЫ Ыі in one form or another, hiding out in the darkened rooms for fear of іЫ Ыі discovery, but will the culture itself survive? If so, how will it іЫ Ыі survive? іЫ Ыі іЫ Ыі This author writes from a personal perspective based on conclusions іЫ Ыі drawn from psychological, sociological, scientific, and historical іЫ Ыі research. None of the views contained within the article can be іЫ Ыі attributed to any one piece of research but are a composite of the іЫ Ыі writer's own worldview. іЫ Ыі іЫ Ыі §ilentwing§ іЫ Ыі іЫ ЫГДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДґЫ %%T%%%H%%%E%%%%%%%%E%%%Y%%%E%%%%%%%%O%%%F%%%%%%%%A%%%%%%%%S%%%T%%%O%%%R%%%M%% ЫіЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫіЫ Ыі іЫ Ыі SO WHO DO YOU WANT TO ROOT TODAY? TEOAS...ROCK'N INTO 2000 іЫ Ыі іЫ ЫГДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДґЫ %%T%%%H%%%E%%%%%%%%E%%%Y%%%E%%%%%%%%O%%%F%%%%%%%%A%%%%%%%%S%%%T%%%O%%%R%%%M%% ЫіЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫіЫ Ыі іЫ Ыі .| іЫ Ыі | | іЫ Ыі |'| ._____ іЫ Ыі ___ | | |. |' .---"| іЫ Ыі _ .-' '-. | | .--'| || | _| | іЫ Ыі .-'| _.| | || '-__ | | | || | іЫ Ыі |' | |. | || | | | | || | іЫ Ыі ___| '-' ' "" '-' '-.' '` |____ іЫ Ыі - Cultural Resurrection - - City of Angels - іЫ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ,, ЫГДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДґЫ %%T%%%H%%%E%%%%%%%%E%%%Y%%%E%%%%%%%%O%%%F%%%%%%%%A%%%%%%%%S%%%T%%%O%%%R%%%M%% ЫіЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫЫіЫ ,, W () |->< | )(\_v [Isщ05 End]