It's the weekend, you have nothing to do so you decide to
play around on your computer. You turn it on and then start up, you
start calling people with your modem, connecting to another world,
with people just like you at a button press away. This is all fine
but what happens when you start getting into other peoples computer
files. Then it becomes a crime, but what is a computer crime really,
obviously it involves the use of a computer but what are these crimes.

Well they are: Hacking, Phreaking, & Software Piracy.

To begin I will start with Hacking, what is hacking. Hacking is
basically using your computer to "Hack" your way into another. They
use programs called scanners which randomly dials numbers any
generating tones or carriers are recorded. These numbers are looked
at by hackers and then used again, when the hacker calls up the number
and gets on he's presented with a logon prompt, this is where the
hacking really begins, the hacker tries to bypass this anyway he knows
how to and tries to gain access to the system. Why do they do it,
well lets go to a book and see "Avid young computer hackers in their
preteens and teens are frequently involved in computer crimes that
take the form of trespassing, invasion of privacy, or vandalism.

Quite often they are mearly out for a fun and games evening, and they
get entangled in the illegal use of their machines without realizing
the full import of what they are doing" , I have a hard time believing
that so lets see what a "hacker" has to say about what he does "Just
as they were enthraled with their pursuit of information, so are we.

The thrill of the hack is not in breaking the law, it's in the pursuit
and capture of knowledge." , as you can see the "hacker" doesn't go
out to do destroy things although some do. It's in the pursuit of
knowledge. Of course this is still against the law. But where did all
of this start, MIT is where hacking started the people there would
learn and explore computer systems all around the world. In the views
of professional hacking is like drugs or any other addictive
substance, it's an addiction for the mind and once started it's
difficult to stop. This could be true, as hackers know what they are
doing is wrong and they know odds are they will be caught. But as I
mentioned some hackers are just above average criminals, using there
skills to break in banks and other places where they can get money, or
where they can destroy information. What a hacker does at a bank is
take a few cents or even a few fractions of a cents from many
different accounts this may seem like nothing but when all compiled
can be alot. A stick up robber averages about $8,000 each "job", and
he has to put his life and personal freedom on the line to do it while
the computer hacker in the comfort of his own living room averages
$500,000 a "job". As for people destroying information, this is for
taking some one down, destruction of data could end a business which
for some is very attractive. It can cost a company thousands of
dollars to restore the damage done.

Now that you have an understanding of what a "hacker" is, it time
to move on to someone closely associates with a hacker. This is a

Phreak, but what is that. For the answer we turn to the what is known
as the "Official" Phreakers Manual "Phreak [fr'eek]

1. The action of using mischievous and mostly illegal ways in
order to not pay for some sort of telecommunications bill,
order, transfer, or other service. It often involves usage of
highly illegal boxes and machines in order to defeat the
security that is set up to avoid this sort of happening.
v. 2. A person who uses the above methods of destruction and
chaos in order to make a better life for all. A true phreaker
will not go against his fellows or narc on people who have
ragged on him or do anything termed to be dishonourable to
n. 3. A certain code or dialup useful in the action of being a
phreak. (Example: "I hacked a new metro phreak last night.")"

The latter 2 ideas of what a phreak is, is rather weird. A Phreak
like the hacker likes to explore and experiment, however his choice of
exploring is not other computer but the phone system as