2600 The Hacker Quarterly
   HOME

TheInfoList



OR:

''2600: The Hacker Quarterly'' is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems,
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
protocols and services, as well as general news concerning the computer underground. With origins in the
phone phreaking Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a sen ...
community and late 20th-century
counterculture A counterculture is a culture whose values and norms of behavior differ substantially from those of mainstream society, sometimes diametrically opposed to mainstream cultural mores.Eric Donald Hirsch. ''The Dictionary of Cultural Literacy''. Ho ...
, ''2600'' and its associated conference transitioned to coverage of modern
hacker culture The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware (mostly digital electronics), ...
, and the magazine has become a platform for speaking out against increased digital surveillance and advocacy of personal and digital freedoms.


Publication history

The magazine's name comes from the
phreaker Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a sen ...
discovery in the 1960s that the transmission of a
2600 hertz 2600 hertz (2600 Hz) is a frequency in hertz (cycles per second) that was used in telecommunication signaling in mid-20th century long-distance telephone networks using carrier systems. Tone signaling carrier systems operated in the sta ...
tone – which could be produced perfectly with a plastic toy whistle given away free with
Cap'n Crunch Cap'n Crunch is a corn and oat breakfast cereal manufactured since 1963 by Quaker Oats Company, a subsidiary of PepsiCo since 2001. Since the original product introduction, marketed simply as ''Cap'n Crunch'', Quaker Oats has introduced numerou ...
cereal, discovered by friends of
John Draper John Thomas Draper (born March 11, 1943), also known as Captain Crunch, Crunch, or Crunchman after a toy boatswain's call whistle once given away in boxes of Cap'n Crunch breakfast cereal that for some years could be used to make free long d ...
– over a long-distance trunk connection gained access to ''operator mode'', and allowed the user to explore aspects of the
telephone system A telephone network is a telecommunications network that connects telephones, which allows telephone calls between two or more parties, as well as newer features such as fax and internet. The idea was revolutionized in the 1920s, as more and more ...
that were not otherwise accessible. The magazine was given its name by David Ruderman, who co-founded the magazine with his college friend, Eric Corley. Ruderman ended his direct involvement with the magazine three years later. The magazine traces its origins to early
Bulletin Board Systems A bulletin board system (BBS), also called a computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user performs functions such as ...
as a place for hackers to share information and stories with each other. It was launched in January 1984, coinciding with the book of the same name and the break-up of AT&T. It is published and edited by its co-founder Emmanuel Goldstein (a
pen name A pen name or nom-de-plume is a pseudonym (or, in some cases, a variant form of a real name) adopted by an author and printed on the title page or by-line of their works in place of their real name. A pen name may be used to make the author's na ...
of Corley which is an allusion to
George Orwell Eric Arthur Blair (25 June 1903 – 21 January 1950) was an English novelist, poet, essayist, journalist, and critic who wrote under the pen name of George Orwell. His work is characterised by lucid prose, social criticism, opposition to a ...
's ''
Nineteen Eighty-Four ''Nineteen Eighty-Four'' (also published as ''1984'') is a dystopian novel and cautionary tale by the English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final completed book. Thematically ...
'') and his company 2600 Enterprises, Inc. ''2600'' is released on the first Friday of the month following a season change, usually January, April, July, and October. Goldstein has published a compilation of articles from the magazine entitled ''The Best of 2600: A Hacker Odyssey''. The book, an 888-page hardcover, has been available from July 28, 2008, in the US and August 8, 2008, in the UK and is published by Wiley.


"Hacker" term

In the usage of ''2600'' and affiliates, the often loaded term '' hacking'' refers to
grey hat A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. The term came into u ...
hacking, which is generally understood to be any sort of technological utilization or manipulation of technology which goes above and beyond the capabilities inherent to the design of a given application. This usage attempts to maintain neutrality, as opposed to the politically charged and often contentious terms white hat hacking (which some consider hacking motivated exclusively by good, benevolent intentions—such as hardware modding or
penetration test A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
ing), and black hat hacking – which some consider to be hacking motivated exclusively by malicious or selfish intentions, such as electronic theft,
vandalism Vandalism is the action involving deliberate destruction of or damage to public or private property. The term includes property damage, such as graffiti and defacement directed towards any property without permission of the owner. The t ...
, hijacking of websites, and other types of
cybercrime Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
.) Other hackers believe that hat-color labels are an
oversimplification The fallacy of the single cause, also known as complex cause, causal oversimplification, causal reductionism, root cause fallacy, and reduction fallacy, is an informal fallacy of questionable cause that occurs when it is assumed that there is a si ...
and unnecessary designation, best suited for use by the media, and suggest that people who use hacking to commit crimes already have a label, that of ''
criminal In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definiti ...
''.


Conferences and meetings

''2600'' established the H.O.P.E. (Hackers on Planet Earth) conference in 1994, marking the publication's tenth anniversary. The conference is held at the
Hotel Pennsylvania The Hotel Pennsylvania was a hotel at 401 Seventh Avenue (15 Penn Plaza) in Midtown Manhattan, New York City, across from Pennsylvania Station and Madison Square Garden. Opened in 1919, it was once the largest hotel in the world. It remained t ...
, in Manhattan, New York City, and has occurred every two years with the exception of the second HOPE in 1997, held at the
Puck Building The Puck Building is a mixed-use building at 295–309 Lafayette Street in the SoHo, Manhattan, SoHo and Nolita neighborhoods of Manhattan in New York City, New York, U.S. The building was designed by Albert Wagner (architect), Albert Wagner i ...
in Manhattan. The convention features events such as presentations, talks, concerts, and workshops. Speakers have included computer security figures and hackers such as
Kevin Mitnick Kevin David Mitnick (August 6, 1963 – July 16, 2023) was an American computer security consultant, author, and convicted hacker. In 1995, he was arrested for various computer and communications-related crimes, and spent five years in prison ...
,
Steven Levy Steven Levy (born 1951) is an American journalist and editor at large for '' Wired'' who has written extensively for publications on computers, technology, cryptography, the internet, cybersecurity, and privacy. He is the author of the 1984 boo ...
,
Richard Stallman Richard Matthew Stallman ( ; born March 16, 1953), also known by his initials, rms, is an American free software movement activist and programmer. He campaigns for software to be distributed in such a manner that its users have the freedom to ...
, and
Steve Wozniak Stephen Gary Wozniak (; born August 11, 1950), also known by his nickname Woz, is an American technology entrepreneur, electrical engineer, computer programmer, philanthropist, and inventor. In 1976, he co-founded Apple Inc., Apple Computer with ...
, as well as
whistleblower Whistleblowing (also whistle-blowing or whistle blowing) is the activity of a person, often an employee, revealing information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe, unethical or ...
s William Binney,
Daniel Ellsberg Daniel Ellsberg (April 7, 1931June 16, 2023) was an American political activist, economist, and United States military analyst. While employed by the RAND Corporation, he precipitated a national political controversy in 1971 when he released th ...
, and
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
, and countercultural figures like
Jello Biafra Eric Reed Boucher (born June 17, 1958), known professionally as Jello Biafra, is an American singer, spoken word artist and political activist. He is the former lead singer and songwriter for the San Francisco punk rock band Dead Kennedys. Init ...
and
The Yes Men The Yes Men are a culture jamming activist duo and network of supporters created by Jacques Servin and Igor Vamos. Through various actions, the Yes Men primarily aim to raise awareness about problematic social and political issues. To date, t ...
. There are monthly meetings in over 24 countries. The meetings are listed in the back of the magazine, and are advertised as being open to anyone regardless of age or level of expertise.


In other media

2600 Films produced a feature-length documentary about famed
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
Kevin Mitnick Kevin David Mitnick (August 6, 1963 – July 16, 2023) was an American computer security consultant, author, and convicted hacker. In 1995, he was arrested for various computer and communications-related crimes, and spent five years in prison ...
, the Free Kevin movement and the hacker world, entitled '' Freedom Downtime'', and is currently working on one titled ''Speakers' World''. Corley is also host of ''Off The Wall'' and '' Off the Hook'', two New York
talk radio Talk radio is a radio format containing discussion about topical issues and consisting entirely or almost entirely of original spoken word content rather than outside music. They may feature monologues, dialogues between the hosts, Interview (jo ...
shows. Both shows can be downloaded or streamed via the 2600 site, and are also broadcast on various radio stations: *'' Off the Hook'' is broadcast on
WBAI WBAI (99.5 FM) is a non-commercial, listener-supported radio station licensed to New York, New York. Its programming is a mixture of political news, talk and opinion from a left-leaning, liberal or progressive viewpoint, and eclectic musi ...
(99.5 FM) *''Off The Wall'' is broadcast on WUSB (90.1 FM). In the 1995 movie ''Hackers'', a character named Emmanuel Goldstein, also known as "Cereal Killer", was portrayed by
Matthew Lillard Matthew Lyn Lillard (born January 24, 1970) is an American actor. His film work includes Chip Sutphin in '' Serial Mom'' (1994), Emmanuel "Cereal Killer" Goldstein in '' Hackers'' (1995), Stu Macher in '' Scream'' (1996), Stevo in '' SLC Punk!'' ...
.


Court cases

''2600'' has been involved in many court cases related to technology and
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
alongside the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
, perhaps most significantly '' Universal v. Reimerdes'' involving the distribution of DVD copy protection tool
DeCSS DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, free and open source operating systems (such as BSD and Linux) could not play encrypted video ...
, where courts upheld the constitutionality of the
Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
anti-circumvention provisions. The magazine itself received a copyright claim for the ink spatter stock image featured on the Spring 2012 issue from Trunk Archive, an image licensing agency, using an automated image tracking toolkit. While Trunk Archive identified its own image that featured the ink spatter as the source, it was discovered that the original ink spatter was created by the Finnish artist Jukka Korhonen, on
DeviantArt DeviantArt (formerly styled as deviantART and thus abbreviated as dA) is an American online community that features artwork, videography, photography, and literature, launched on August 7, 2000, by Mathew Stephens, Scott Jarkoff and Angelo Sotir ...
, who had released it into the
public domain The public domain (PD) consists of all the creative work to which no Exclusive exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly Waiver, waived, or may be inapplicable. Because no one holds ...
. Trunk Archive later retracted the claim and sent a letter to ''2600'' apologizing for the mistake.


See also

*


References


External links

* * * o
2600 Index mirror
a searchable index of 2600 The Hacker Quarterly magazine article information. {{Authority control 1984 establishments in New York (state) Computer magazines published in the United States Quarterly magazines published in the United States Hacker magazines Magazines established in 1984 Magazines published in New York (state) Works about computer hacking