2600 Films
   HOME

TheInfoList



OR:

''2600: The Hacker Quarterly'' is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems,
Internet protocol The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP h ...
s and services, as well as general news concerning the computer "
underground Underground most commonly refers to: * Subterranea (geography), the regions beneath the surface of the Earth Underground may also refer to: Places * The Underground (Boston), a music club in the Allston neighborhood of Boston * The Underground (S ...
." With origins in the
phone phreaking Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a ...
community and late 20th-century
counterculture A counterculture is a culture whose values and norms of behavior differ substantially from those of mainstream society, sometimes diametrically opposed to mainstream cultural mores.Eric Donald Hirsch. ''The Dictionary of Cultural Literacy''. Hou ...
, ''2600'' and its associated conference transitioned to coverage of modern
hacker culture The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware (mostly digital electronics), to a ...
, and the magazine has become a platform for speaking out against increased
digital surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
and advocacy of personal and digital freedoms.


Publication history

The magazine's name comes from the
phreaker Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a ...
discovery in the 1960s that the transmission of a 2600 hertz tone – which could be produced perfectly with a plastic toy whistle given away free with
Cap'n Crunch Cap'n Crunch is a maize, corn and oat breakfast cereal manufactured by Quaker Oats Company, a subsidiary of PepsiCo since 2001. After introducing the original cereal in 1963, marketed simply as ''Cap'n Crunch'', Quaker Oats has since introduced n ...
cereal, discovered by friends of
John Draper John Thomas Draper (born March 11, 1943), also known as Captain Crunch, Crunch, or Crunchman (after the Cap'n Crunch breakfast cereal mascot), is an American computer programmer and former phreaking, phone phreak. He is a widely known figure wi ...
– over a long-distance trunk connection gained access to "operator mode," and allowed the user to explore aspects of the
telephone system A telephone network is a telecommunications network that connects telephones, which allows telephone calls between two or more parties, as well as newer features such as fax and internet. The idea was revolutionized in the 1920s, as more and more ...
that were not otherwise accessible. The magazine was given its name by David Ruderman, who co-founded the magazine with his college friend,
Eric Corley Eric Gordon Corley (born December 16, 1959), also frequently referred to by his pen name of Emmanuel Goldstein, is a figure in the hacker community. He directs the non-profit organization 2600 Enterprises, Inc., publishes a magazine called '' 2600 ...
. Ruderman ended his direct involvement with the magazine three years later. The magazine traces its origins to early
Bulletin Board Systems A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as ...
as a place for hackers to share information and stories with each other. It was launched in January 1984, coinciding with the book of the same name and the break-up of AT&T. It is published and edited by its co-founder Emmanuel Goldstein (a
pen name A pen name, also called a ''nom de plume'' or a literary double, is a pseudonym (or, in some cases, a variant form of a real name) adopted by an author and printed on the title page or by-line of their works in place of their real name. A pen na ...
of Corley which is an allusion to
George Orwell Eric Arthur Blair (25 June 1903 – 21 January 1950), better known by his pen name George Orwell, was an English novelist, essayist, journalist, and critic. His work is characterised by lucid prose, social criticism, opposition to totalitar ...
's ''
Nineteen Eighty-Four ''Nineteen Eighty-Four'' (also stylised as ''1984'') is a dystopian social science fiction novel and cautionary tale written by the English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final ...
'') and his company 2600 Enterprises, Inc. ''2600'' is released on the first Friday of the month following a season change, usually January, April, July, and October. Goldstein has published a compilation of articles from the magazine entitled ''The Best of 2600: A Hacker Odyssey''. The book, an 888-page hardcover, has been available from July 28, 2008 in the US and August 8, 2008 in the UK and is published by Wiley.


"Hacker" term

In the usage of ''2600'' and affiliates, the often
loaded term Loaded language (also known as loaded terms, emotive language, high-inference language and language-persuasive techniques) is rhetoric used to influence an audience by using words and phrases with strong connotations. This type of language is ve ...
" hacking" refers to
grey hat A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. The term came into use ...
hacking, which is generally understood to be any sort of technological utilization or manipulation of technology which goes above and beyond the capabilities inherent to the design of a given application. This usage attempts to maintain neutrality, as opposed to the politically charged and often contentious terms
white hat White hat, white hats, or white-hat may refer to: Art, entertainment, and media * White hat, a way of thinking in Edward de Bono's book ''Six Thinking Hats'' * White hat, part of black and white hat symbolism in film Other uses * White hat (compu ...
hacking (which some consider hacking motivated exclusively by good, benevolent intentions—such as hardware modding or
penetration test A penetration test, colloquially known as a pen test or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. T ...
ing), and
black hat Black hat, blackhats, or black-hat refers to: Arts, entertainment, and media * Black hat (computer security), a hacker who violates computer security for little reason beyond maliciousness or for personal gain * Black hat, part of black and white ...
hacking – which some consider to be hacking motivated exclusively by malicious or selfish intentions, such as electronic theft,
vandalism Vandalism is the action involving deliberate destruction of or damage to public or private property. The term includes property damage, such as graffiti and defacement directed towards any property without permission of the owner. The term f ...
, hijacking of websites, and other types of
cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...
.) Other hackers believe that hat-color labels are an
oversimplification The fallacy of the single cause, also known as complex cause, causal oversimplification, causal reductionism, and reduction fallacy, is an informal fallacy of questionable cause that occurs when it is assumed that there is a single, simple cause of ...
and unnecessary designation, best suited for use by the media, and suggest that people who use hacking to commit crimes already have a label, that of ''
criminal In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Can ...
''.


Conferences and meetings

''2600'' established the
H.O.P.E. The Hackers on Planet Earth (HOPE) conference series is a hacker convention sponsored by the security hacker magazine '' 2600: The Hacker Quarterly'' that until 2020 was typically held at Hotel Pennsylvania, in Manhattan, New York City. Occ ...
(Hackers on Planet Earth) conference in 1994, marking the publication's tenth anniversary. The conference is held at the
Hotel Pennsylvania The Hotel Pennsylvania was a historic hotel at 401 Seventh Avenue (15 Penn Plaza) in Manhattan, across the street from Pennsylvania Station and Madison Square Garden in New York City. Opened in 1919, it was once the largest hotel in the world. ...
, in Manhattan, New York City, and has occurred every two years with the exception of the second HOPE in 1997, held at the
Puck Building __FORCETOC__ The Puck Building is a historic building located in the Nolita neighborhood of Manhattan, New York City. It occupies the block bounded by Lafayette, Houston, Mulberry and Jersey Streets. An example of the German Rundbogenstil style o ...
in Manhattan. The convention features events such as presentations, talks, concerts, and workshops. Speakers have included computer security figures and hackers such as
Kevin Mitnick Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crim ...
,
Steven Levy Steven Levy (born 1951) is an American journalist and Editor at Large for ''Wired'' who has written extensively for publications on computers, technology, cryptography, the internet, cybersecurity, and privacy. He is the author of the 1984 book ...
,
Richard Stallman Richard Matthew Stallman (; born March 16, 1953), also known by his initials, rms, is an American free software movement activist and programmer. He campaigns for software to be distributed in such a manner that its users have the freedom to ...
, and
Steve Wozniak Stephen Gary Wozniak (; born August 11, 1950), also known by his nickname "Woz", is an American electronics engineer, computer programmer, philanthropist, inventor, and technology entrepreneur. In 1976, with business partner Steve Jobs, he c ...
, as well as
whistleblower A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
s William Binney,
Daniel Ellsberg Daniel Ellsberg (born April 7, 1931) is an American political activist, and former United States military analyst. While employed by the RAND Corporation, Ellsberg precipitated a national political controversy in 1971 when he released the ''Pent ...
, and
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
, and countercultural figures like
Jello Biafra Eric Reed Boucher (born June 17, 1958), known professionally as Jello Biafra, is an American singer, spoken word artist and politician. He is the former lead singer and songwriter for the San Francisco punk rock band Dead Kennedys. Initially ac ...
and
The Yes Men The Yes Men are a culture jamming activist duo and network of supporters created by Jacques Servin and Igor Vamos. Through various actions, the Yes Men primarily aim to raise awareness about problematic social and political issues. To date, th ...
. There are monthly meetings in over 24 countries. The meetings are listed in the back of the magazine, and are advertised as being open to anyone regardless of age or level of expertise.


In other media

2600 Films produced a feature-length documentary about famed
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
Kevin Mitnick Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crim ...
, the Free Kevin movement and the hacker world, entitled ''
Freedom Downtime ''Freedom Downtime'' is a 2001 documentary film sympathetic to the convicted computer hacker Kevin Mitnick, directed by Emmanuel Goldstein and produced by 2600 Films. The documentary centers on the fate of Mitnick, who is claimed to have been m ...
'', and is currently working on one titled ''Speakers' World''. Corley is also host of ''Off The Wall'' and '' Off the Hook'', two New York
talk radio Talk radio is a radio format containing discussion about topical issues and consisting entirely or almost entirely of original spoken word content rather than outside music. Most shows are regularly hosted by a single individual, and often featur ...
shows. Both shows can be downloaded or streamed via the 2600 site, and are also broadcast on various radio stations: *'' Off the Hook'' is broadcast on
WBAI WBAI (99.5 FM) is a non-commercial, listener-supported radio station licensed to New York, New York. Its programming is a mixture of political news, talk and opinion from a left-leaning, liberal or progressive viewpoint, and eclectic music. ...
(99.5 FM) *''Off The Wall'' is broadcast on WUSB (90.1 FM). In the 1995 movie ''Hackers'', a character named Emmanuel Goldstein, also known as "Cereal Killer", was portrayed by
Matthew Lillard Matthew Lyn Lillard (born January 24, 1970) is an American actor. His early film work includes Chip Sutphin in ''Serial Mom'' (1994), Emmanuel "Cereal Killer" Goldstein in ''Hackers'' (1995), Stu Macher in ''Scream'' (1996), Stevo in ''SLC Punk ...
.


Court cases

''2600'' has been involved in many court cases related to technology and
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recogni ...
alongside the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
, perhaps most significantly
Universal v. Reimerdes ''Universal City Studios, Inc. v. Corley'' (originally known as ''Universal City Studios, Inc. v. Reimerdes'')'','' 273 F.3d 429 (2nd Cir., 2001), was a court ruling at the United States Court of Appeals for the Second Circuit.''Universal City S ...
involving the distribution of DVD copy protection tool
DeCSS DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, open source operating systems (such as Berkeley Software Distribution, BSD and Linux) could n ...
, where courts upheld the constitutionality of the
Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
anti-circumvention provisions. The magazine itself received a copyright claim for the ink spatter stock image featured on the Spring 2012 issue from
Trunk Archive Trunk Archive (Located in New York City) is an image licensing agency. The company provides commercial imagery from artists like Annie Leibovitz, Arthur Elgort, Nick Knight, Inez & Vinoodh, Mary Ellen Mark, Nadine Ijewere, Miles Aldridge, and P ...
, an image licensing agency, using an automated image tracking toolkit. While Trunk Archive identified its own image that featured the ink spatter as the source, it was discovered that the original ink spatter was created by the Finnish artist Jukka Korhonen, on
DeviantArt DeviantArt (historically stylized as deviantART) is an American online art community that features artwork, videography and photography, launched on August 7, 2000 by Angelo Sotira, Scott Jarkoff, and Matthew Stephens among others. DeviantArt, ...
, who had released it into the
public domain The public domain (PD) consists of all the creative work A creative work is a manifestation of creative effort including fine artwork (sculpture, paintings, drawing, sketching, performance art), dance, writing (literature), filmmaking, ...
. Trunk Archive later retracted the claim and sent a letter to ''2600'' apologizing for the mistake.


See also

*


References


External links

* *
2600 Index
o
2600 Index mirror
a searchable index of 2600 The Hacker Quarterly magazine article information. {{Authority control 1984 establishments in New York (state) Computer magazines published in the United States Quarterly magazines published in the United States Hacker magazines Magazines established in 1984 Magazines published in New York (state) Works about computer hacking