Chaos presents: Anarchy!! Vol I # 1 ------------------------------------------------------------------------- Welcome to Anarchy!, a new mag from Chaos. As a person who wrote the terrormag series, I wanted to continue to write such mags but expand them. Joining Chaos was the best thing I could have done for this. When I looked at 2 mags called Phun and Phrack, hacking mags, I liked their format and decided to do a newsfile that was more like that. This mag is currently looking for 1 more editor and several writers for the mag and we are looking for submissions to this mag. I don't care what your article is about. If its on hacking, phreaking, the pirate world, a BBS review, I don't care. I would like to see it computer related but that is not neccessary. Things such as incendiary devices explained easily or "How to sabatoge a bridge" or things of that nature are acceptable. Editorials are more than welcome. And now, on to the show. ------------------------------------------------------------------------- Table of Contents 1) Introduction 2) Operation Sun Devil- What happened 3) Operation Sun Devil- New Twists in the case 4) The truth about Caller ID (ANI) 5) Begining Lockpicking 6) General BBS news 7) Chaos News 8) BBS reviews 9) Networking 10) The Conscience of a Hacker ------------------------------------------------------------------------- Anarchy!! Article 2 of 10 by Iys Kyewb What happened with Sun Devil ------------------------------------------------------------------------- Unless you have been in a cave or your modem broke, preventing you from logging on any BBS's, there was a national raid on hackers in mid May. This raid, dubbed Operation Sun Devil, resulted in at least 28 search warrants in 14 cities and 7 arrests according to the police. I estimate that more than 20 people have been arrested as a direct result of Sun Devil. One teenager in long island was arrested, supposedly using the handle "Crazie Eddie" and was charged with "Computer tampering and trespass, and unlawful use of a computer and theft of services." The 1st two charges are felonies while the other two are misdemenor charges. All in all, over 24,000 disks were confiscated, as well as dozens of computer systems. This operation made arrests in early april on some hackers in the Legion of Doom because the feds believed they posed a "frightening threat" to individuals and institutions. It was alleged that they were capable of disrupting 911 emergency phone service in at least 6 states. <911 is a joke, btw.> Much of my information came from New York Newsday and other newspapers but we all know the press is hardly fair in its treatment of hackers and in reporting anything dealing with computers. I should subscribe to 2600 and get the real truth, or at least attend one of their meetings. I think its funny how the feds go all out to bust hackers, but don't seem this agressive to do anything in our war against drugs, or to fight homelessness or to help improve education. Here's a quote from NY Newsday and assistant secret service director Garry M. Jenkins: "Today, the secret service is sending a clear message to those hackers who have decided to violate the law of this nation." According to various phone companies and other companies, the fraud perpetrated by some of the hackers who were busted cost them more than $50 million in telephone services. ------------------------------------------------------------------------- Anarchy!! Article 4 of 10 by Iys Kyewb More on Sun Devil ------------------------------------------------------------------------- As I purchased the Sunday newspapers as I do every week, I rarely purchased the NY Times. However, I scanned the headlines and noticed this headline on page 1: "Drive to Counter Computer Crime Aims at Invaders" "Legitimate Users Voice Worries Over Rights" I looked at it harder and promptly purchased the Times. With Sun Devil over, and certainly newer investigations into hacking activities, there are some questions that needed answers. Are these hackers really a threat to comerce, research and national security? Is the government violating these alleged hacker's civil rights or anyone's for that matter in their attempts to stop this "threat" to security? Some civil liberties experts say that the crackdown on hackers is affecting computer users who are not breaking the law. These users are being intimidated and searched illegally and other violations of their civil liberties, such as the freedom of speech. It is parallel to the campaign against drugs, where minorities are always subject to questioning by police and youths assaulted by cops under the pretense the youths were arrested for drug usage. Stephen McNamee, the US Attorney for Arizona and a central figure in the government's efforts against computer crime, says "It's a whole new era. Computers are providing a new avenue for criminal activities. It is possible to transmit computer information for an illegal purpose in the blink of an eye." Fortunately, some people think the government is going too far, like a California Democrat named Don Edwards. He says "Every time there is a percieved crisis, law-enforcement agencies and legislators overreact, and usually due process and civil liberties suffer. The Fourth Amendment provides strict limits on rummaging through people's property." A tradgedy of this operation, and an example of innocent people suffering from government actions is a computer game maker. he has not been charged, yet investigators have seized his equipment and have not returned it as of yet. He is on the verge of going out of business as a result. The secret service surreptitiously eavesdropped on BBS's and telephone conversation in weeks prior to Sun Devil and have entered these networks as legitimate users to trade information. The FBI interrogated dozens of experts and hobbyists in an investigation of a theft of an important program from Apple Computer Inc. last year. (I don't recall what exactly it was, however, there was a protest of Apple's policy not permiting macintosh clones from being built, and could have been related. I also think this program was related to Macintosh's DOS or the windows or Icons it uses.> Civil libertarians and some business executives have begun to organize defenses. Mitchell D. Kapor, creator of Lotus 1-2-3, is planning a defense fund of several hundred thousand dollars for some of the accused in Operation Sun Devil. Harvey Silvergate, a Massachusetts lawyer and civil liberties expert working with mr. Kapor, said "You have innocent people who are being terrorized as well as investigations of people who have broken the law." He termed the government's actions as "typical American [and Chinease by the way] solution: throw your best and brightest in jail." Some officials of the secret service, which has been the primary federal enforcer of computer fraud laws since 1984, believe that an alarming number of bright, young computer enthusiasts are using computers illegally. "Often, a progression of criminal activity occurs which involves telecommunication fraud, unauthorized access to other computers, credit card fraud, and then moves on to other destructive activities like computer viruses." said gary M. jenkins, secret service assistant director. Mr Kapor of Lotus said he believed the danger posed by the computer joy riders had been greatly exagerated. "Now that the Communists aren't our enemies anymore, the American psyche has to end up inventing new ones," he said. He and other experts are also alarmed by new investigative techniques that employ computers. The power of advanced machines multiplies the risk of search and seizure violations, these experts say, because they can perform so many simultaneous tasks and absorb and analyze so much information. Added to this problem is that legal precedents are not clear on how the 1st amendment protects speech and the 4th amendment protects against searches and seizures in the electronic world. My question is, is saying how to hack out a system, or codes for examples illegal? Is my freedom of speech protected when I talk about how to hack out codez, or distribute them? Having a 10 digit number suddenly becomes illegal, and similar confusion exists. I thought using a code was illegal. Computer Email could be swept up in a raid that is totally unrelated to anything illegal, or at least to that investigation. Updates on Sun Devil will come in future issues. If anyone has any information about "The Hacker's Conference" which meets somewhere on the west coast, please send correspondence to myself, Iys Kyewb on one of the Chaos BBS's. ------------------------------------------------------------------------- Anarchy!! Article 4 of 10 by Iys Kyewb The Truth to Caller ID (or Automatic Number Identification, ANI) ------------------------------------------------------------------------- Is it big brother when you call someone and they know your phone number before you can even say "hello"? I'm upset over the phone company's total apathy over my right to privacy. What if I hadan unlisted number? What is the purpose of unlisting your number when its readily avaiable to people you call or businesses? It's hard to convince the phone company when you call BBS's and don't necessarily want the sysop to know your phone number, if you're poor like me and have only 1 line. I can imagine any or all of you saying either "if you can't trust the sysop, don't call their system" or "I hate getting out of the shower to find out its a sales pitch" or whatever lame excuses. Just because I can't trust a sysop doesn't mean the sysop runs a terrible BBS. Also, you need to get out of your shower or wake up or get away from relaxing just to see what the phone number is of the person calling you . And suppose its a call from your spouce or sibling or child and its from a public phone? Are you not going to pick it up because the phone number could be that of an organization? If you don't want to be bothered with the ringing of the phone, turn off the ringer or unplug the phone. Your right to privacy is not violated when someone calls your phone number. If you truly feel it is, then talk to the phone company about getting a line that cannot recieve calls, only make them. You could save some money and your misconception of privacy is not violated. Of course, no one could get through to you. Its like having a pager. Is getting a page a violation of your rights? if you don't want to be bothered, turn it off, ignore it or stop subscribing. Now, there is the question of prank phone calls. ANI is a deterrent to it, but so is a less costly and more private alternative. Call Blocking and Call trace are 2 features that New Jersey Bell offers. Call blocking prevents someone from making a call to your phone number from a specific number. Example: joe from 555-1234 calls jane at 555-2345 to harass her. With call blocking, she dials a code and the number she wants to block <555-1234 in this case> and when joe calls, he gets a recording "This number is no longer accepting phone calls." Joe would then assume her phone is disconnected and obviously cannot prank her anymore. Of course he could always try from another phone and she can only block 6 phone numbers. But that is effective in reducing prank calls. Call trace is the kicker. Rather than waiting for months for the phone company to put a tracer on your line, dialing a simple code will initiate a trace of the last phone call made to that number. Example: joe calls jane from 555-1234 100 times. jill calls jane from 555-1122 and tells her about call trace. joe calls back at, say 8 am. jane leaves, goes to work and comes home around 5pm. she has NOT recieved any phone calls. she presses a few digits on the phone and call trace is initiated. It is assumed this service will be used immediately after joe pranks her but that is not necessary. Lala Land bell then traces the call to 555-2345 and will do whatever they think is necessary to stop the calls, usually give the # to the local police or something of that sort. With call trace costing $1 per trace and call block $6/month, its alot cheaper than ANI, costing at $60 for the lousy unit and $6/month. It would take 60 traces initiated to make up for the money lost in ANI which explains whi the companies hype ANI instead of call block or call trace. My recommendation would be to stop wasting money and take your phone # off the unlisted status because once a company finds your number and address they sell your addresses to other companies as a mailing list and you will still recieve those annoying calls with a sales pitch. I personally have never recieved one but I don't do much mail ordering myself. ------------------------------------------------------------------------- Anarchy!! Article 5 of 10 by Iys Kyewb Begining Lock Picking ------------------------------------------------------------------------- Ever get locked out of your room/house and wished you could get in because your keys were sitting on your desk? Or wanted to enter someone else's room to surprise them but you didn't have a key? Or just merely wanted to know how to pick locks? Well, this is a begining guide to lockpicking. I will make some recommendations. They are: Do Not even try to pick Medeco locks unless you have ALOT of experience with lock picking. These locks are extremely hard to pick because of the way the lock is designed. Notice locksmiths charge more to duplicate them than other, normal keys? Well, take a look at one. If you look at the top of the notches, you will notice they are not all arranged in a straight line. They are curved. With the pick I will show how to build, I even doubt it is possible to pick this kind of lock. If it is possible, you'd have to spend hours trying to pick it, and that defeats the whole purpose of lockpicking. The Pick I will show you does not work with Tubular locks, "skeleton key" locks or other types like the fitchet kind. It is for basic, 1 slot keys. Padlocks are good locks to try to pick with this. First, you need to find a thin and somewhat long piece of metal that is somewhat stiff but pliable enough to shape. How long? Judgement tells you what length but if its really long, you can make 2 or even 3 tools. it should be at least 13 inches so you can make 2 such tools, a pick and torque bar. Now where do you find such a metal? Well, Oil Dipsticks, and Automatic Transmission dipsticks are usually good, but try to find one thinner and not so flexable. The best kind are from the brushes of the street sweepers. Ever see them clean the streets? The brushes are made of hundreds of metal strips that sweep debris from the gutter and supposedly into the machine I guess. These metal pieces break off and are very much suitable for this task. I think it is the easiest type of metal to use. Where do you find them? Well, a friend told me to check out the gutters where the machines sweep the streets. I checked out my neighborhood in the Bronx and looked on 1 block and found nothing so I figured I'd have to look elsewhere. However, when I was in Bayside, Queens recently, I decides to look and I found over 20!!! pieces of these brushes, some metal pieces were long enough to make 2 tools. I recommend looking nearby sanitation depots. You could also approach the sweeper and pry off some pieces but I don't know how hard that is. Next, find a stone grinder. You can attach one to a drill but it works best if you have one mounted on a desk or something. Its alot like the ones used to sharpen axes or other such equipment. If you don't have one, check out the machine shops in your school, or in colleges. Ask other students where any machine shops exist and you should be able to find a grind stone. I don't recommend asking everyone, just some students who are into such things. Now, after fou have found a metal piece or two and a grinder, you're ready to build a lock pick or torque bar, or Ideally both. The torque bar is easy. Take a pair of pliars or similar instrument, grip the metal strip and bend it until its bent into a 90 degree angle. It should look like an L when looked at from the side. Do not twist it, unless you have alot of metal strips, or many torque bars, since that can do different things and make it easier or harder to pick some locks. For a basic set, i don't recommend that. The torque bar should be about 7 inches in length and the little "stub" of the L part should be no more than 1/2 an inch. Now you need a pick. You need the grinder to shape the metal strip into something like this shape: ----------------------------- /\ <---A---> / | / \--------------------/ | c------------------------------------------------------| for you commodore users, \ is a diagonal opposite of / and | is a straight, verticle line The front should be rounded and the part labeled "A" should be somewhat long but no longer than 1/3 the size of the whole stick. The edges should be somewhat smooth but not necessarily perfectly round. Also, make the narrower part narrow, but not too narrow, as that makes the pick brittle, and your pick will break inside of the lock, which will fuck shit up. For locks that have longer keys, the part labeled <---A---> should be longer but for regular locks, that isn't necessary. Torque bars should be long enough to maximize torque but not too long since it becomes brittle. After making the above tool, you can paint it, put rustoleum on it or whatever. Since it is steel, it can rust but as long as it isn't brittle, thats ok. If you find a rusted strip, you can cand off the rust if you wish, but thats personal taste. As long as it isn't brittle, anything is ok. Just don't twist or bend it, since it needs to be very straight! Bending any of it is not a good idea for an inexperienced lock picker. So where do you start? Simple things like padlocks or the locks to your disk storage things or similar things. How is picking done? Well, the pick enters the lock and the bar is used to twist the cylinder much like when you twist your key through the lock. Fiddle with the pick enough and you'll figgure out how to open locks up. Some locks may take up to half an hour for even experienced lock pickers, but do the easy, non-trouble getting into stuff 1st. And most of all, amaze your friends by entering their lockers and stealing jackets, walkmen, etc.! Steal next weeks mid term! Break into payphones! Enter an office and steal equipment!!! heh, I'm getting abit carried away here but with these two tools, you are on the road to becoming an expert lock picker. Also, I recommend getting an L-slide or 2. An L slide is an L shaped piece of metal that enables you to open doors that are usually double doors. Some doors have "card" blocks and those blocks usually prevent these doors from being L-Slided, but I can't say for sure. Having L-slides of different sizes is a tremendous advantage since some bolts are not easily gotten to easily. Some doors are "blocked" from the front and with a long L-slide, you can slip it through anyway. Notice the way that door bolt on every door with a knob is sloped on one side, usually away from you but sloped towards you? Well you need to pull the slide onto that so the door can open. Unfortunately, many doors have a blocker that, ugh its hard to explain. I need better graphics than ASCII to show you. Maybe next time I talk about lock picking I can explain further. Disclaimer- the above was written for general purposes and was not intended for illegal purposes. Remember, picking a lock to enter a room without the room's occupant knowledge is Breaking and Entering and is a felony. The author of this text or file, members of Chaos and owner of the BBS this file is on is not responsible for any actions of anyone diretly resulting from this file, nor are we responsible for anyone's getting caught. ------------------------------------------------------------------------- Anarchy!! Article 6 of 10 by Iys Kyewb General BBS News ------------------------------------------------------------------------- Well, This is a review of news in the NYC BBS world since aproximately May 1st, 1990. There is no guarantee the information occured before or after that date, but I'm telling you what I know. I can guarantee that the information is acurrate and true. Shadoworld went Public Domain, as Sun Devil hit the nation. E> it WAS indeed risky to have anything illegal, in case a hacker that used to call SW got busted and the feds called shadoworld to see if they were involved in hacking or phreaking. Unfortunately, Shadoworld is down, because of the phone bill. Its down indefinately but I expect it to be up soon. The Shelter went down for good. No news on whether or not the technician will put it up again or put up a new system or whatever. It was the 1st multiplexing commodore BBS in New York City. Not a bad BBS in my opinion. Camelot left RAID and Mysticore's Rhadmanthus decided not to join. This wasn't a blow to RAID as they did grow to 4 canadian BBS's and several more out of state BBS's. Boot Camp BBS went Image 1.2 and added Turbo Rels, which made this once slow BBS into a superfast system. Calling it at 2400 is like calling a Cnet 128 V4.0 at 2400, or very close in speed. Harry Hazardous, hitman of RAID, has decided to go legit and stop hacking and phreaking. I don't know if he left RAID or is merely no longer Hitman for RAID. I do know he changed his handle, to something that I forgot and was told not to reveal, which I do not plan to. Nynex Ninja returned early this year but it was revealed he was actually Renegade hacker, who claimed to me in Email that he had joined BTI but then changed his mind about joining, or something as ridiculous as that. in addition, Jimmy gave him permission to do all of that, for what reason I don't know. There is a Nynex Ninja in NEC but it is unknown if it is the same one of BTI fame. And speaking of NEC, NEI has cropped up, NEI standing for North East Importers. It appears NEI will take over where NEC left since many NEI members are in NEC, and I saw a realease with NEI on it but not NEC. NASA, another graphics group, has grown somewhat in New York and nationwide. It is unknown how many BBS's are actually NASA bbs's since the number was "Inflated" E>/group1/group2/group3/group4/etc... yet does nothing about the people who use MCI in non MCI subs and uses commands like \s9 or \p4 or \w8 or any of the variable commands. and is very annoying. The variable commands print the user's handle, name, phone number, password or other things and can confuse many people.> ------------------------------------------------------------------------- Anarchy!! Article 7 of 10 by Iys Kyewb Chaos! News ------------------------------------------------------------------------- Chaos has grown considerably! We now have 17 members as of 6/6/90 and 4 BBS's. They are: Demoniac Chairman Comwood Chairman Iys Kyewb Chairman Thrasher Prezident Dr. Who Veep Highlander Grx. Dewd Ture Seven Hitman/Sysop Throgmorton Hitman! Second Site Hitman! Exploited Member Havok Member Golden Dragon Member Diabolic Member E> We visited Chris's house on 6/6/90 and 6/7/90. Details in Combat mag Former HiFi leader Ice Cube changed his handle to Iys Kyewb since there were many Ice Cube's all over. Iys Kyewb and Comwood, also of HiFi, then joined Chaos. They were named Co-Chairs because of their vast experience As a result, HiFi disbanded with Great Golem somewhere and Crusader on the Sage's hut. Crusader, if you're reading this: We did HiFi to do something but I did everything and you did nothing. My not being near a computer does not and should not prevent you from doing anything for the group such as getting us a HiFi BBS or something to that effect. Considering you are cosysop on at least 2 BBS's, thats really lame. Comwood was in the group for a shorter period of time, yet he wrote a terrormag and compiled codes for magic candle with Dr. Who. Chris has been discovered to use many handles, among them Chris, Bumrusha/er, Scope and now, Abadox. Many sysops are tired with our war with him, and I can't really blame them but they have been reacting a bit too harsh, deleting people for mentioning chris, for example. I say we leave him alone after the next combat mag. More news available in the Combat! mag. ------------------------------------------------------------------------- Anarchy!! Article 8 of 10 by Iys Kyewb BBS reviews ------------------------------------------------------------------------- Sage's Hut (212)/928-2406 3/12/2400 image 1.2 20+ megs The BBS used to be good but Johnny (Sage) deleted Demoniac. Since then, the BBS slid downhill but survived, until a galacticomm went up called "Advacomm" and Johnny called it every day. While calling it, the BBS number was busy, but noone posted, sub obs and UD-ops couldn't do their work, like validate warez, and cosysops couldn't do anything. The BBS got lame and now when you call, you see dozens of unvalidated wares and maybe 10 new posts/responses on the whole subboard area. On a 1-10 rating, used to be 8.3 but now a dismal 2.3. Only reason why I call is because I have unlimited credits. Defcon 3 (718)/984-2273 3/1200 Chaos!! HQ#4 DMBBS I haven't really called this BBS much, its gotten lukewarm reviews. The posts appear to be okay. The speed is good for a DMBBS but kingsx should go Cbase instead. On a 1-10 rating it gets a 4.6 but only because I made 1 call to it and wasn't terribly impressed by what I saw. However, since it IS a chaos BBS, it can't be that bad. If I like what I see, I will raise the rating in the next issue of Anarchy! Mysticore (718)/837-4710 3/12/2400 Cnet 4.0 20+megs The sysop is getting annoying. Once a good bbs, its gotten bogged down by some wierd rules. He wants us all to be a "family" yet bans group names in user's sigs. Dr. Who said he thought Black Magic was bullshit and was told not to post anymore on Mysticore, to shut up and a few other things. I assume Demoniac will go into this in more depth in the Combat mag. Once a 8.6, now its a 5.4 and rapidly declining. Boot Camp (718)/464-8189 3/12/2400 Image 1.2 with TurboRels!!!! 105 megs!!!!!!!!!!!!!!!!!!!! Chaos HQ#2!!!!!!!!!!!!!!!!!! Once a dreadfully slow BBS, now with the turbo RELS and the CMD drive hooked up in an unknown way, this Image is almost as fast as a Cnet 4.0 in 2400. The subs have improved. The UD's get an INC since I didn't see them but there is alot of space to upload and I guess the UDs are good. With an Empire contest the BBS is eternally busy! Very hard to get through! One a 5.3, now a 9.1 rating Terrordome (718)/984-2273 3/12/2400 Image 1.2 Chaos HQ#3 20+ Megs Was named Elm street and used 1.0 Image, dreadfully slow then. Now its quicker but could use those neat turboRels to speed things up a notch. 1.2 was a significant change, as was "Terrordome" from Elm Street BBS. The subs are ok but the Chaos sub is forever getting posts! Dudes! Post in the Boot Camp when you get through! Once a dismal 3.5, now a 9.0 Thats all for now. Here are some BBS's to try out. I'll review them next issue: Gear Jammer's ][ (215)/487-0463 Lahnkmar's (609)/858-2033 or 2003, i have to correct this Just Say Yes (415(/922-2008 ------------------------------------------------------------------------- Anarchy!! Article 9 of 10 by Iys Kyewb Networking ------------------------------------------------------------------------- Networking is the hottest thing around but this isn't so much about the aspects of networking but merely a request for: docs of networking on Cnets and Images a listing of the networking BBS's and names of networks, especially how to join the networks. Please send correspondence to Iys Kyewb on either: Lahnkmar BBS GearJammers ][ Boot Camp Terrordome Thank you. ------------------------------------------------------------------------- Anarchy!! Article 10 of 10 by The Mentor, dated 1/8/86 The Consience of a Hacker Entered by Iys Kyewb ------------------------------------------------------------------------- I found this in Phrack inc. volume one, issue 7. Phile 3 of 10. Its cool, I should mail it to Dear Abby/Ann, heheh. The following was written shortly after my arrest. I am currently groupless, having resigned from the Racketeers, so ignore the signoff... The Consience of a Hacker... by The Mentor 1/8/86 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. they're all alike. I'm a junior in High School. I've listened to teachers explain for the 15th time how to reduce a fraction. I understand it. "No Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or thinks I'm a smart ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike. And then it happened... A door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... A board is found. "This is it... This is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know them all... Damn kid. Tying up the phone line again. They're all alike... You bet you're ass we're all alike... We've been spoon-fed baby food when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to use and try to make us believe it's for our own good,