____ ><(((o)))> |__| //||\\ pew pew SHOOTING SHARK: LATE 80S HACKER ICON ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~Introduction~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Shooting Shark, a notable hacker from the late 1980s, gained recognition through his contributions to the hacking community, particularly in Unix systems and telecommunication exploits. His story, detailed in the Phrack Inc. Volume Three, Issue Thirty-Three, offers insight into the early days of computer hacking and the personalities that shaped the underground tech culture. This profile explores the life, hacking career, and legacy of Shooting Shark. ~~~~~~~~~~~~~~~~Early Life and Introduction to Computers~~~~~~~~~~~~~~~~~~~~~~ Born on November 25, 1966, in the San Francisco Bay Area, Shooting Shark's journey into the world of computers began in high school. Enrolled in an Advanced Placement Computer Science course, he learned Pascal programming on the Apple //e, though he found greater enjoyment in software piracy and gaming. His early interest in technology was heavily influenced by the 1983 film Wargames(one of my personal favorite movies now), sparking his fascination with hacking. ~~~~~~~~~~~~~~~~~~~~~~~Entry into Hacking~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Shooting Shark's hacking career began with phone phreaking, a common entry point for many early hackers. His mentor, Elric of Imrryr, introduced him to 800 extenders—codes that allowed free long-distance calls. With the purchase of a Novation Apple Cat 300 modem, he expanded his capabilities, experimenting with blue boxing and exploring bulletin board systems (BBS) such as Sherwood Forest and OSUNY. ~~~~~~~~~~~~~~Unix Expertise and Phrack Contributions~~~~~~~~~~~~~~~~~~~~~~~~~ In college, Shooting Shark gained access to a Pyramid 90x super mini computer running BSD 4.2 Unix. His knowledge of Unix systems became his signature strength, leading to a series of technical articles published in Phrack and the Legion of Doom Technical Journals. His files, such as Unix Nasties and a brute-force password hacker, influenced a generation of hackers seeking to understand Unix vulnerabilities. ~~~~~~~~~~~~~~~~~~~Encounters with Law Enforcement~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Like many hackers of his era, Shooting Shark caught the attention of law enforcement. In 1987, the FBI contacted him regarding a break-in in San Diego. Although he chose to cease illegal activities, the incident marked the end of his more active hacking days. ~~~~~~~~~~~~~~~~~~~~~~~~Life Beyond Hacking~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ After leaving the underground scene, Shooting Shark pursued a degree in Theater Arts, contrasting sharply with his technical background. He later worked in upper management at a video graphics card manufacturer and became involved in computer graphics and MIDI music production. His multifaceted interests showcased the complexity of individuals in the hacking community. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~Legacy~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Shooting Shark's contributions to Phrack and the wider hacking community cemented his place in the annals of hacker history. His Unix tutorials educated aspiring hackers, while his transition to a legitimate career highlighted the diverse paths taken by early computer enthusiasts. Today, his story serves as a testament to the formative years of hacking culture. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Conclusion~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Shooting Shark's journey from high school computer science student to influential hacker exemplifies the curiosity, ingenuity, and ethical dilemmas that defined the early hacking scene. His legacy endures through his writings and the community he helped shape, reminding us of the profound impact of those who explored the digital frontier.