The phreaker ran the cable down the street and, if possible, around the corner. He pulled it into the car and attached it to the waiting computer modem. At least one of the five was proficient enough with electronics hardware to have rigged up the computer and modem to the car battery. The Phreaker's Five could now call any computer without being traced or billed. The phone call charges would appear at the end of a local resident's phone bill. Telecom did not itemise residential telephone bills at the time. True, it was a major drama to zoom around suburban streets in the middle of the night with computers, alligator clips and battery adaptors in tow, but that didn't matter so much. In fact, the thrill of such a cloak-and-dagger operation was as good as the actual hacking itself. It was illicit. In the phreakers' own eyes, it was clever. And therefore it was fun.
Craig Bowen didn't think much of the Phreakers Five's style of phreaking. In fact, the whole growth of phreaking as a pastime depressed him a bit. He believed it just didn't require the technical skills of proper hacking. Hacking was, in his view, about the exploration of a brave new world of computers. Phreaking was, well, a bit beneath a good hacker. Somehow it demeaned the task at hand.
Still, he could see how in some cases it was necessary in order to continue hacking. Most people in the underground developed some basic skills in phreaking, though people like Bowen always viewed it more as a means to an end—just a way of getting from computer A to computer B, nothing more. Nonetheless, he allowed phreaking discussion areas in the private sections of PI.
What he refused to allow was discussion areas around credit card fraud. Carding was anathema to Bowen and he watched with alarm as some members of the underground began to shift from phreaking into carding.
Like the transition into phreaking, the move into carding was a logical progression. It occurred over a period of perhaps six months in 1988 and was as obvious as a group of giggling schoolgirls.
Many phreakers saw it simply as another type of phreaking. In fact it was a lot less hassle than manipulating some company's PABX. Instead, you just call up an operator, give him some stranger's credit card number to pay for the call, and you were on your way. Of course, the credit cards had a broader range of uses than the PABXes. The advent of carding meant you could telephone your friends in the US or UK and have a long voice conference call with all of them simultaneously—something which could be a lot tougher to arrange on a PABX. There were other benefits. You could actually charge things with that credit card. As in goods. Mail order goods.
One member of the underground who used the handle Ivan Trotsky, allegedly ordered $50000 worth of goods, including a jet ski, from the US on a stolen card, only to leave it sitting on the Australian docks. The Customs guys don't tend to take stolen credit cards for duty payments. In another instance, Trotsky was allegedly more successful. A try-hard hacker who kept pictures of Karl Marx and Lenin taped to the side of his computer terminal, Trotsky regularly spewed communist doctrine across the underground. A self-contained paradox, he spent his time attending Communist Party of Australia meetings and duck shoots. According to one hacker, Trotsky's particular contribution to the overthrow of the capitalist order was the arrangement of a shipment of expensive modems from the US using stolen credit cards. He was rumoured to have made a tidy profit by selling the modems in the computer community for about $200 each. Apparently, being part of the communist revolution gave him all sorts of ready-made rationalisations. Membership has its advantages.
To Bowen, carding was little more than theft. Hacking may have been a moral issue, but in early 1988 in Australia it was not yet much of a legal one. Carding was by contrast both a moral and a legal issue. Bowen recognised that some people viewed hacking as a type of theft—stealing someone else's computer resources—but the argument was ambiguous. What if no-one needed those resources at 2 a.m. on a given night? It might be seen more as `borrowing' an under-used asset, since the hacker had not permanently appropriated any property. Not so for carding.
What made carding even less noble was that it required the technical skill of a wind-up toy. Not only was it beneath most good hackers, it attracted the wrong sort of people into the hacking scene. People who had little or no respect for the early Australian underground's golden rules of hacking: don't damage computer systems you break into (including crashing them); don't change the information in those systems (except for altering logs to cover your tracks); and share information. For most early Australian hackers, visiting someone else's system was a bit like visiting a national park. Leave it as you find it.
While the cream seemed to rise to the top of the hacking hierarchy, it was the scum that floated at the top of the carding community. Few people in the underground typified this more completely than Blue Thunder, who had been hanging around the outskirts of the Melbourne underground since at least 1986. The senior hackers treated Blue Blunder, as they sometimes called him, with great derision.