****************************************************************************
                 >C O M P U T E R   U N D E R G R O U N D<
                               >D I G E S T<
             ***  Volume 1, Issue #1.19 (June 26, 1990)   **
     **  SPECIAL ISSUE: MALICE IN WONDERLAND: THE E911 CHARGES   **
 ****************************************************************************

MODERATORS:   Jim Thomas (Sole moderator:  Gordon Meyer on vacation)
REPLY TO:     [email protected]

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
           views of the moderators. Contributors assume all responsibility
           for assuring that articles submitted do not violate copyright
           protections.
--------------------------------------------------------------------

This issue is the concept outline of one section of a paper to be submitted
to the Midwest Sociological Society's annual meetings in 1991 and will
ultimately be submitted for publication. The intent of the paper is to
develop a discourse analysis of how "social facts" are given "legal
meanings." The saliency of the current crackdown on alleged "computer
crime" seems an excellent way of tapping the clash between new meanings and
old definitions, and how courts become the battlefield for over these
meanings.
This draft is not copy-protected and may be used as appropriate.
The prose and ideas here remain tentative and incomplete,  and will be refined.
It is circulated for conceptual, theoretical, and bibliographic
comments.

********************************************************************



     THE SECRET SERVICE, E911, AND LEGAL RHETORIC:
                 MALICE IN WONDERLAND?


                      Jim Thomas
                Department of Sociology
             Northern Illinois University
                   DeKalb, IL 60115
                    (28 June, 1990)






 ________
 Concept  outline for  larger paper  to  be submitted  at the  Midwest
 Sociological Society annual meetings, 1991.




     THE SECRET SERVICE, E911, AND LEGAL RHETORIC:
                 MALICE IN WONDERLAND?

  "When I use a word," Humpty Dumpty said, in rather a scornful
  tone, "it means just what I choose it to mean--neither more nor
  less."

  "The question is," said Alice, "whether you can make words mean
  so many different things."

  "The question is," said Humpty Dumpty, "which is to be
  master--that's all" (Carroll, 1981: 169).


 Law is more than simply assuring public order.  It is also, as White (1984)
 argues,  "action with words."   The rhetoric of law is played  out in the
 drama of the courtroom,  and the denouement of the play is scripted by the
 language of statutory  and case law,  indictments,  and the  talk of the
 courtroom performers (Nichols, 1990; Thomas, 1983, 1989).

                         - 1 -


 Part of this  language game involves a battle  over competing definitions,
 meanings,  and  nuances that may be  unrelated to "facts,"  and instead
 replaces facts with rhetoric,  or a style of persuasion.   The language of
 indictments and how evidence is presented provides one window through which
 to observe this rhetorical battle.   Indictments  are the means by which a
 "bad act" is  transformed into a formally sanctionable  one by creatively
 linking the act to the law that it ostensibly violates.   A recent federal
 indictment of an alleged computer hacker provides on example (U.S. v.  Rigs
 and Neidorf, 90-CR-0070, Northern District of Illinois,  Eastern Division).
 (For a background on the issues involved,  see especially Barlow,  (1990),
 Denning, (1990), Goldstein, (1990), Markoff, (1990), and Schwartz (1990).

 This outline is divided into two parts.  Section one first presents formal
 "indictment talk" and that to which  it speaks.  The second section,  not
 included here, will provide a semiotic/deconstructionist analysis.

 The indictment begins with a degradation game, one in which the credibility
 and character of  the defendant is attacked because of  a presumed deviant
 behavior and association with deviant groups.    The goal is to stigmatize
 hackers such  that prejudicial meanings are  imposed.   It is  a clever
 linguistic trick that  creates a tautology that defines the  guilt of the
 defendant by  recursing  back to the allegation in a  manner that produces
 linguistic "evidence  of guilt."  This would  be analogous to  calling an
 alleged murder a "murderer" in court,  rather than requiring that the label
 must first be demonstrated to be true.  In short,  the "thing" becomes the
 "name:"
                         - 2 -



5.   _Computer Hackers_ - As used here, computer hackers are
 individuals involved  with the unauthorized access  of computer
 systems by various means.    Computer hackers commonly identify
 themselves by aliases or "hacker handles" when communicating with
 other hackers.

 The rhetoric first attempts to transform the conventional and broader image
 of "hacker" into  one that is malignant  in a way that  will allow anyone
 associated with the label to be, by definition,  stigmatized as a criminal.
 Yet,  there is considerable evidence that  the term does not,  in itself,
 refer to  an illegal activity,  and  that many who  consider themselves
 "computer hackers" do not engage in computer trespass, whether unauthorized
 or not.

 The assumption that all computer hackers  are intent on committing criminal
 trespass or fraud  distorts the nature of the activity.    Only the most
 extreme examples come to the attention of law enforcement officials and the
 public, and this obscures the complexity both of hacking and of the CU.  In
 its broadest sense,   hacking is the dual process of  obtaining and using
 sufficient mastery  of computers and programs  to allow resolution  of a
 computer problem for which no previous knowledge or guidance exists.   The
 Hacker's Dictionary, a text file widely circulated on BBSs,  provides this
 definition:


                         - 3 -


         HACKER %originally,  someone who makes furniture with an axe% n.
         1.  A  person who enjoys  learning the details  of programming
         systems and how to stretch their capabilities, as opposed to most
         users who prefer to learn only the minimum necessary.  2. One who
         programs enthusiastically,  or who enjoys programming rather than
         just theorizing about  programming.   3.  A person  capable of
         appreciating hack value (q.v.).   4.  A  person who is good at
         programming quickly.  Not everything a hacker produces is a hack.
         5.  An expert at a particular program, or one who frequently does
         work using it or on it; example: "A SAIL hacker".  (Definitions 1
         to 5 are correlated, and people who fit them congregate.)  6.  A
         malicious  or  inquisitive  meddler who  tries  to  discover
         information by poking around.   Hence "password hacker", "network
         hacker".

 A computer programmer's attempt to help a  colleague enter a system when a
 password has  been lost or  forgotten,  de-bugging a  copyright software
 program,  or testing a system's security  are examples for which a benign
 form of hacking is both required and considered acceptable.   Nonetheless,
 this deceptive definition was successful,  for it convinced Judge Nicholas
 Bua that the prosecutor's definition was the most common, would be unlikely
 to confuse a jury,  and was not  prejudicial (See Memorandum Order in CuD
 1.16).

 Another rhetorical ploy in this same passage  is the attempt to connect the
 use of aliases with deviant activity.   Pseudonyms are widely used on BBSs,
 and their use reflects a cultural  practice including,  but hardly limited
 to, members of the computer underground.   Yet,  clever rhetorical twists
 distort the cultural  meaning and impute to  it one totally at  odds with
 reality by playing  on the myth that pseudonyms reflect  attempts to hide
 "bad acts."

                         - 4 -


 A third rhetorical  ploy in this section of the  indictment associates the
 defendant with a loosely connected group  known as "Legion of Doom," which
 was a small  collection of people who shared  technical knowledge between
 themselves and others.   Without presenting any evidence whatsoever,  and
 without citing an indictment, on-going case, or justifying the claims,  the
 indictment asserts  that the  group was "closely  knit" and  involved in
 disrupting telecommunications,   bank fraud and other  serious felonious
 behavior.   Because  of its amorphous  nature and  ambiguous boundaries
 defining "affiliation," the  indictment's language offers little  means to
 resist the imposition of its "legal meaning:"

       6.    _Legion of  Doom_ - As used here the  Legion of Doom
       (LOD) was a closely knit group of computer hackers involved in:
         a.   Disrupting telecommunications by entering
              computerized telephone switches and changing
              the routing on the circuits of the computerized
              switches.
         b.  Stealing proprietary computerized information
             from companies and individuals.
         c.  Stealing and modifying credit information on
             individuals maintained in credit bureau
             computers.
         d.  Fraudulently obtaining money and property from
             companies by altering the computerized
             information used by the companies.
         e.  Sharing information with respect to their
             methods of attacking computers with other
             computer hackers in an effort to avoid law
             enforcement agencies and telecommunication
             experts from focusing on them, alone.


                         - 5 -


 The indictment itself focuses on the  alleged "theft" and dissemination of
 an E911 document from Bell South. Although those close to the case indicate
 that only a small portion of a training document was at issue, the language
 of the indictment  attempts to link this document and  its possession and
 dissemination to severe threats to the commonweal:

         22.         It was further part of the scheme that on or about
       February 24,  1989 defendant NEIDORF  disseminated the disguised E911
       text file in issue 24 of "PHRACK" newsletter.

         23.         It  was further  part of  the scheme  that the
       defendant NEIDORF would disseminate and  disclose this information to
       others for their  own use,  including to other  computer hackers who
       could use  it to  illegally manipulate  the emergency  911 computer
       systems in the United States and  thereby disrupt or halt 911 service
       in portions of the United States.

 Such rhetoric  raises the spectre of  people dying,  and one  news story
 actually wrote that there  was no evidence of any deaths  as the result of
 the behavior,  thus re-inforcing the apparent danger to the public.   The
 rhetoric sounds serious.  But, what in fact is the evidence?   The PHRACK
 file reprinted here is as it appeared in the original issue. The
 indictment indictates it *IS NOT* the same as the one that has allegedly
 been stolen,  because it has been "edited," "retyped," and "disguised."

                         - 6 -


 --------------------------------------------------------------------

                               ==Phrack Inc.==

                     Volume Two, Issue 24, File 6 of 13


E911 - Enhanced 911:  Features available include selective routing,
      selective transfer, fixed transfer, alternate routing, default
      routing, Automatic Number Display, Automatic Location
      Identification, night service, default routing, call detail
      record.

End Office - Telephone central office which provides dial tone to the
            subscriber calling 911.  The "end office" provides ANI
            (Automatic Number Identification) to the tandem office.

Tandem Office - Telephone central office which serves as a tandem (or
               hub) for all 911 calls.  Must be a 1AESS type of
               central office.  The tandem office translations
               contain the TN/ESN relationships which route the 911
               call to the proper SAP.  The tandem office looks up
               the ANI (TN) that it receives from the end office and
               finds the ESN (routing information) which corresponds
               to a seven digit number ringing in at a PSAP.

PSAP - Public Safety Answering Point, usually the police, fire and/or
      rescue groups as determined by the local municipalities.  A
      "ringing" will not have ANI or ALI capabilities, but just
      receives calls or transferred calls from another PSAP.

ESN - Emergency Service Number (XXX) that is assigned to the
     subscriber's telephone number in the tandem office translations
     The ESN represents a seven digit number by which the tandem
     office routes the call to the proper PSAP.  PSAPs with ALI
     capabilities also receive a display of the ESN information which
     shows which police, fire and rescue agency serves the telephone
     number calling 911.  An ESN is a unique combination of police,
     fire, and rescue service for purposes of routing the E911 call.

ANI - Automatic Number Identification corresponds to the subscriber's
     seven digit telephone number.  The ANI displays at the PSAP on
     the digital ANI display console.

ALI - Automatic Location Identification provides for an address
     display of the subscriber calling 911.  With ALI, the PSAP
     receives the ANI display and an ALI display on a screen.  The
     ALI display includes the subscriber's address, community, state,
     type of service and if a business, the name o the business.  The
     PSAP will also get a display of the associated ESN information
     (police, fire, rescue).

Selective Routing - The capability to route a call to the particular
                   PSAP serving the address associated with the TN
                   making the 911 call.  Selective routing is
                   achieved by building TN/ESN translations in the
                   tandem central office.  These translations are
                   driven by the E911 data base which assign the ESN
                   to each telephone number based on the customer's
                   address.  Service order activity keeps the E911
                   data base updated.  The E911 data base, in turn,
                   generates recent change to the tandem office
                   (through the SCC or RCMAC) to update the TN/ESN
                   translations in the tandem data base.

Selective Transfer - Provides the PSAP with the ability to transfer
                    the incoming 911 call to a fire or rescue service
                    for the particular number calling 911 by pushing
                    one button for fire or rescue.  For example, if
                    an incoming 911 call was reporting a fire, the
                    PSAP operator would push the fire button on the
                    ANI console; the call would go back to the tandem
                    office, do a lookup for the seven digit number
                    associated with fire department, for the ESN
                    assigned to the calling TN, and automatically
                    route the call to that fire department.  This
                    differs from "fixed" transfer which routes every
                    call to the same fire or rescue number whenever
                    the fire or rescue button is pushed.  The PSAP
                    equipment is optioned to provide either fixed or
                    selective transfer capabilities.

Alternate Routing - Alternate routing provides for a predetermined
                   routing for 911 calls when the tandem office is
                   unable to route the calls over the 911 trunks for
                   a particular PSAP due to troubles or all trunks
                   busy.

Default Routing - Provides for routing of 911 calls when there is an
                 ANI failure.  The call will be routed to the
                 "default" ESN associated with the he NNX the caller
                 is calling from.  Default ESNs are preassigned in
                 translations and are usually the predominant ESN for
                 a given wire center.

Night Service - Night service works the same as alternate routing in
               that the calls coming into a given PSAP will
               automatically be routed to another preset PSAP when
               all trunks are made busy due to the PSAP closing down
               for the night.

Call Detail Record - When the 911 call is terminated by the PSAP
                    operator, the ANI will automatically print-out on
                    the teletypewriter located at the PSAP.  The
                    printout will contain the time the call came into
                    the PSAP, the time it was picked up by an
                    operator, the operator number, the time the call
                    was transferred, if applicable, the time the call
                    was terminated and the trunk group number
                    associated with the call.  Printouts of the ALI
                    display are now also available, if the PSAP has
                    purchased the required equipment.

ANI Failure - Failure of the end office to identify the call and
             provide the ANI (telephone number) to the tandem office;
             or, an ANI failure between the tandem office and the
             PSAP.

Misroute - Any condition that results in the 911 call going to the
          wrong PSAP.  A call can be misrouted if the ESN and
          associated routing information are incorrect in the E911
          data base and/or tandem data base.  A call can also be
          misrouted if the call is an ANI failure, which
          automatically default routes.

Anonymous Call - If a subscriber misdials and dials the seven digit
                number associated with the PSAP position, they will
                come in direct and ANI display as 911-0000 which will
                ALI as an anonymous call.  The seven digit numbers
                associated with the PSAP positions are not published
                even to the PSAPs.

Spurious 911 Call - Occasionally, the PSAP will get a call that is not
                   associated with a subscriber dialing 911 for an
                   emergency.  It could be a subscriber who has not
                   dialed 911, but is dialing another number, or has
                   just picked up their phone and was connected with
                   the PSAP.  These problems are equipment related,
                   particularly when the calls originate from
                   electromechanical or step by step offices, and are
                   reported by the E911 Center to Network Operations
                   upon receipt of the PSAP inquiry reporting the
                   trouble.  The PSAP may get a call and no one is
                   there; if they call the number back, the number
                   may be disconnected or no one home Again these are
                   network troubles and must be investigated.
                   Cordless telephones can also generate "spurious"
                   calls in to the PSAPs.  Generally, the PSAP will
                   hear conversation on the line, but the subscribers
                   are not calling 911.  The PSAP may report spurious
                   calls to to repair if they become bothersome, for
                   example, the same number ringing in continually.

No Displays - A condition where the PSAP ALI display screen is blank.
             This type of trouble should be reported immediately to
             the SSC/MAC.  If all screens at the PSAP are blank, it
             is an indication that the problem is in the circuits
             from the PSAP to the E911 computer.  If more than one
             PSAP is experiencing no display, it may be a problem
             with the Node computer or the E911 computer.  The
             SSC/MAC should contact the MMOC to determine the health
             of the HOST computer.

Record Not Found - If the host computer is unable to do a look up on a
                  given ANI request from the PSAP, it will forward a
                  Record Not Found message to the PSA ALI screen.
                  This is caused by service order activity for a
                  given subscriber not being processed into the E911
                  data base, or HOST computer system problems whereby
                  the record cannot be accessed at that point in time.

No ANI - This condition means the PSAP received a call, but no
        telephone number displayed on the ANI console.  The PSAP
        should report this condition immediately to the SSC/MAC.

PSAP Not Receiving Calls - If a PSAP cannot receive calls or request
                          retrieval from the E911 host computer,
                          i.e., cable cut, the calls into that PSAP
                          must be rerouted to another PSAP.  The
                          Switching Control Center must be notified
                          to reroute the calls in the tandem office
                          E911 translations.

MSAG - Master Street Address Guide.  The MSAG ledgers are controlled
      by the municipality which has purchased the E911 ALI service,
      in that they assign which police, fire or rescue agency will
      serve a given street an number range.  They do this by
      assigning an ESN to each street range, odd, even, community
      that is populated in the county or municipality served.  These
      MSAGs are then used as a filter for service order activity into
      the E911 computer data base to assign ESNs to individual TN
      records.  This insures that each customer will be routed to the
      correct agency for their particular address.  In a non-ALI
      County, TAR codes are used by the Telephone company to assign
      ESNs to service conductivity and the County does not control
      the ESN assignment.  TAR codes represent the taxing authority
      for the given subscriber which should correspond to their
      police, fire and rescue agencies.  The MG method, of course, is
      more accurate because it is using the actual service address of
      the customer to route the call and provides the county with
      more flexibility in assigning fire and rescue district, etc The
      Customer Services E911 Group maintains the E911 computer data
      base and interfaces with the County (customer) on all MSAG or
      data base activity.
___________________________________________________________________________

 What in fact is this document?  It  is simply a partial glossary available
 from other sources,  and hardly of  any technical value.   It presents 22
 terms, six of which are found in at least one public book (e.g.,  Ambrosch,
 Maher and Sasscer,  1989),  and the rest found either in the text of that
 work (see esp.  Chapter 9) or readily found elsewhere.   Further, if this
 document can be deciphered as potentially  dangerous,  then what is one to
 make of the Amborsch,  Maher and  Sasscer volume itself,  which not only
 provides several hundred definitions,  but also includes detailed technical
 information and  diagrams about  the operation,   administration,  and
 functioning of Bell systems? There is nothing in the PHRACK document, or in
 any of the  so-called "phreak/hacker" magazines that is  not available in
 more detail from any work found in the classroom or library.

 A cursory reading  of Ambrosch,  Maher,  and  Sasscer (1989)  provides
 references to many of these definitions,  and  we have seen others in the
 "chat" section of public BBSs.   Below we provide a sample of terms readily
 available to the public.  Those without a reference are either common terms
 or are readily deducible from the referenced items:

Alternate Routing
Anonymous Call
                        - 14 -


ALI (Glossary, 285; pp 173-175; throughout)
ANI (Glossary, p. 285 and throughout)
ANI Failure
Call Detail Record
Default Routing (referenced on p. 166)
End Office (Standard communications term)
ESN
E911  (Standard definition, ubiquitous)
Misroute
MSAG (Definition found on BBSs)
Night Service
No ANI
No Displays
PSAP (Glossary, p. 287)
PSAP Not Receiving Calls
Record Not Found
Selective Routing (reference on p. 166)
Selective Transfer
Spurious 911
Tandem Office

 Despite the  banality of these  terms,  the indictment's  discourse was
 sufficiently clever to convince Judge Bua  that the information was indeed
 "valuable," and "confidential," and despite  its public availability,  is
 "property" that deprives Bell South of "something of value."  However,  the
 judge seems  taken in  by the chicanery  of the  prosecutor's linguistic

                        - 15 -


 distortion that  manipulates the symbols of  PHRACK's style to  create an
 alternative reality that is, at best, questionable.  Consider, for example,
 the following passage.   First assume it appears in  a scholarly article
 explaining the basic service of E911:

       With the non-IN  Emergency Response Service (ERS),   the caller
       dials a special  emergency number (very short,   usually three
       digits) which is uniform within a country, (for example,  911 in
       the USA, and in West Germany 110/0110 for police and 112/0112 for
       fire or ambulance) (Ambrosch, Maher and Sasscer, 1989: 162).

 Now, re-frame the same passage, but preface it with a sentence like:   "At
 the last hackers'  convention,  Holly Hackwood described  the E911 basic
 service like this:  (and now re-read  the passage)."  Is the E911 document
 illegal when published in PHRACK (for that is what the indictment charges),
 but legal when published in a library book or a research paper?   The point
 is that it  is not only possession  of public information that  is being
 prosecuted, but the manner in which the symbols are packaged.

 In CuD 1.17,  we cited a California law  that makes it a felony to merely
 POSSESS certain types of information,  whether that information is used or
 communicated to others or not.  The "crime" of the "hacker" seems to be not
 only possession of information freely available to the public,  but also of
 presenting  relatively innocuous  information in  the  discourse of  an
 anti-establishment ethos.   More simply, the "crime" is that of speaking a
 different language  than law enforcement  officials who seem  willing to
 distort that language with rhetorical ploys of their own.
                        - 16 -



 White (1984) suggests that, in legal discourse,  "words lose their meaning"
 and that  law is as much  a language game  as it is the  application of
 statutes and cases  to behavior.   The resulting danger  is that language
 becomes a weapon to subvert freedom of speech.  In an era when most people
 are not "culturally literate" in the nuances of techno-speak,  the ease of
 distortion puts defendants at risk in bench  or jury trials where a common
 framework of meaning is intentionally obscured  in the battle over symbolic
 terrain.   In the next  section the language of law as  reflected in the
 indictment will be  "deconstructed," and the logic and  imagery made more
 apparent.
                  (End this section)

                     BIBLIOGRAPHY

 Ambrosch, W.D., A. Maher and B. Sasscer (Eds.).   1989.   The Intelligent
 Network:  A Joint  Study by Bell Atlantic,  IBM  and Siemens.   Berlin:
 Springer-Verlag.

 Barlow,  John Perry.   1990 (forthcoming).   "Crime and Puzzlement."  The
 Whole Earth Review.

 Denning,  Dorothy.   1990.   "Concerning Hackers Who Break into Computer
 Systems."   Paper presented  at the  13th  National Computer  Security
 Conference, Washington, D.C., Oct. 1-4.
                        - 17 -



 Goldstein, Emmanuel.  1990.  Editorial Commentary on "Operation Sun Devil."
 2600 Magazine, /Spring.

 Markoff, John.  1990.   "Drive to Counter Computer Crime Aims at Invaders."
 The New York Times, /June 3: 1, 21.

 Nichols, Lawrence T.  1990 (forthcoming).   "Discovering Hutton: Expression
 Gaming and Congressional Definitions of Deviance."  Pp.  *-* in N.  Denzin
 (ed.), Studies in Symbolic Interaction, Vol.  11.   Greenwich (Conn.): JAI
 Press.

 Thomas, Jim.   1989.   Prisoner Litigation:  The Paradox of the Jailhouse
 Lawyer.  Totowa (N.J.),  Aldine.

 _____.  1983.   "Justice as Interaction:: Loose Coupling and Mediations in
 the Adversary Process."  Symbolic Interaction, 6(Fall): 243-260.

 White, James Boyd.  1984.  When Words Lose their Meaning: Constitutions and
 Reconstructions of Language, Character, and Community.  Chicago: University
 of Chicago Press.



!