Computer underground Digest    Sun  Mar 27, 1994   Volume 6 : Issue 27
                          ISSN  1004-042X

      Editors: Jim Thomas and Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe (He's Baaaack)
      Acting Archivist: Stanton McCandlish
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Koppa Ediqor:       Phirho Shrdlu

CONTENTS, #6.27 (Mar 27, 1994)
File 1--A JT Apology for CFP No-Show and Deleted CuD Mail
File 2--Some thoughts on piracy, hacking and phreaking.
File 3--Lopez's reply to "Rape in Cyberspace"
File 4--Re: Village Voice & Phlogiston

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to [email protected] or [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;
         In ITALY: Bits against the Empire BBS: +39-461-980493

FTP:   UNITED STATES:  etext.archive.umich.edu (141.211.164.18)  in /pub/CuD/
                      aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
 EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                 nic.funet.fi
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

----------------------------------------------------------------------

Date: Sun 27 Mar 1994 15:32:54 CST
From: Jim Thomas <[email protected]>
Subject: File 1--A JT Apology for CFP No-Show and Deleted CuD Mail

Notes are filtering in from folks who are wondering why I was a
no-show at CFP '94 this past week. I apologize for the absence, but it
seemed necesssary. I spent the week at my father's side and was with
him when he died friday noon.

Thanks to Netta Gilboa who gave a precis of my paper at the conference
and who, from incoming reports, did a better job of making sense of it
than it probably deserved. Thanks also to Bruce Umbaugh who filled in
as session chair at the last minute.

I probably shouldn't have tried to wade through the backlog of CuD
mail late Friday night when I returned, but a sense of returning to a
normal routine seemed necessary. Unfortunately, the mail wasn't
managed normally---I accidentally deleted many posts---I'm not sure
how many, but it was a substantial number.  So, if you subbed, sent
articles or comments, or whatever, and if you haven't received a
response, please resend. Sorry 'bout that.

Jim Thomas

------------------------------

Date: Wed, 9 Mar 1994 14:13:30 -0500
From: Dennis Shayne Weyker <[email protected]>
Subject: File 2--Some thoughts on piracy, hacking and phreaking.

The following is a long response I've had laying around to Emmanuel
Goldstein's testimony to congress last summer. I think the issues
mentioned are still relevant, so I've decided to finish the thing and
send it in.

I come across sounding a bit like a phone-company advocate, but I
don't really think I am. My real reason for writing was to counter
what I thought were some poorly thought-out anarchist and
libertarian-flavored arguments that hackers and phreaks use to justify
behaviors that don't seem justifiable to me.

Comments are welcome.

Shayne Weyker
[email protected]

+>Date:   Thu, 10 Jun 1993 16:53:48 -0700
+>From: Emmanuel Goldstein <[email protected]>
>     It is easy to see this when we are talking about crimes that we
>understand as crimes. But then there are the more nebulous crimes; the
>ones where we have to ask ourselves: "Is this really a crime?" Copying
>software is one example. We all know that copying a computer program
>and then selling it is a crime. . . .  organizations like
>the Software Publishers Association have gone on record as saying that
>it is illegal to use the same computer program on more than one
>computer in your house. They claim that you must purchase it again or
>face the threat of federal marshals kicking in your door. That is a
>leap of logic.

I don't like or agree with the SPA's position, but I also think that
users who copy copyrighted non-shareware software and get significant
productive use or entertainment out of the software should buy it, and
be liable for fines and forced purchase if they don't buy it.

The problem with enforcing this is that you can't determine usefulness
or entertainment value to the user by auditing their hard drive. And
fining them for possessing copyrighted software they don't use is
unfair, (in cases where businesses are the target of the software
audit the company may not even know it has the software). This doesn't
bother the SPA, but if it bothers readers out there in net.land they
should get working on ideas for metering the use of software that
might be included in every program and that could be reset only the
first time its installed on a new storage device (hmm. that might have
some of the same hassles as old copy protection schemes).

>     It is a leap of logic to assume that because a word processor
>costs $500, a college student will not try to make a free copy in
>order to write and become a little more computer literate.

Students don't pirate WordPerfect to become computer literate, they
pirate it to write papers. In using the program they may become more
computer literate.

>Do we punish this student for breaking a rule? Do we charge him with
>stealing $500?

Certainly not $500, because WP isn't out the cost of manuals, disks,
distribution, or free tech support. They are losing a chunk of income
of the cost of developing the software, but this loss is compensated
for at least partly by the fact that WordPerfect Corp.'s future market
share goes up because pirated WP is so widely available and thus
becomes the only word processor many people ever bother to learn to
use. I would hope they would stick to trying to nail businesses and
leave individuals (other than those who resell pirated software) alone
as not worth the trouble. WP (like Microsoft) is a very rich and
successful software company whom the status quo has served quite well
and massive anti-piracy campaigns seem motivated by profit-motive
rather than economic self-defense.

But the problem remains that those who buy WP are paying for the
development of the program while those who pirate are not. The pirates
are freeloading by using a good (use of a program that cost millions
to develop) and not helping to reimburse the company for the costs of
development. This seems not so much like theft as being delinquent on
club dues, homeowners association fees, etc. Maybe assigning deadbeats
to bill collectors would be a good model for punish piracy. In a
perfect world, everything would be shareware, and there would the use
verification schemes so that everybody who used would pay up. To the
extent that those who pirate WP now get just as much productive use
out of it as paid users, pirates are transferring wealth from the paid
users to themselves (they both get use of the program, and the
legitimate user has to pay for them both).  Pirates may also be
transferring wealth from WP's employees and stockholders too.

Two questions arise:  1) "What gives the pirate the moral right to
freeload on the development cost of the software and transfer wealth
too themselves from others?" And 2) "We are all (except in dire cases
like Nazi Germany) morally bound to obey the law, except where one
*publicly* protests the law by deed and is willing to make oneself a
test-case to get the law changed (ala Doc Kervorkian). So where do
pirates get off claiming all by themselves that laws protecting the
intellectual property rights of software companies are void and that
they can go around violating the law covertly at little risk to
themselves just because they don't like it?"

Now if society decides it is willing to allow these unfair transfers
of wealth in return for a more computer literate and productive
workforce then okay. We allow what some think are unfair disparities
of wealth in order to help assure a productive workforce already.

But those in favor of punishing piracy could just as easily make
libertarian arguments that transfers of wealth that aren't explicitly
consented to by the person losing wealth is unjust, and that justice
is a higher goal than a somewhat more computer-literate and productive
society.

>Of course, this represents a fundamental change in our society's
>outlook. Technology as a way of life, not just another way to make
>money.

Does this mean that because its your way of life you shouldn't have to
pay for it? (see comments below about phreaking) That because
technology is your way of life, other people who make their living
producing technology shouldn't be able to make money off of you? Why
is technology different than all other categories of commodity to be
traded in the marketplace? Don't get me wrong, I have my beefs with
capitalism and I like Bruce Sterling's concept of money moving in to
control everything in "Green Days in Brunei". But I get the feeling
that, deep down, you deny others' right to make money off of you and
those like you (making you pay for all long distance, cable TV, fancy
telephone services, and all the software that you use regularly)
because you couldn't afford it and you wouldn't be able to make as
much use of technology (consume as many technological goods) as you
would like.

I doubt that using your technical skill to cheat the marketplace is a
morally acceptable form of protesting the restraints a capitalist
system places on you.

>After all, we encourage people to read books even if they can't
>pay for them because to our society literacy is a very important goal.

True, but libraries pay for their copies of books and it is neither
encouraged nor legal to photocopy entire books. It's gonna be
interesting to see what happens when libraries turn into big full-text
on-line databases and as many people can download a particular text as
can call in. Like a guy said in Wired 1.1, if the libraries don't
charge for this, it might put book publishers out of business. If that
happens, who's going to pay authors to write books?

>If we succeed in convincing people
>that copying a file is the same as physically stealing something, we
>can hardly be surprised when the broad-based definition results in
>more overall crime. Blurring the distinction between a virtual
>infraction and a real-life crime is a mistake.

There is a kind of prohibition-era effect that current law (as SPA
interprets it) makes petty criminals out of a lot of people. But, the
SPA members may feel the opposite way, that if people are made to feel
criminal/guilty/fearful for copying software (regardless of whether
they get productive use or entertainment out of it) they will copy a
lot less and buy a little more. You certainly wouldn't respond this
way, but John Q. User might be a different story.

A big reduction in the distribution of pirated software is bad for the
user (less ability to evaluate before buying, less chance to use new
software or software of tangential to one's business) but good for the
software companies (more profits for the software industry and
possibly more wealth trickling down to those who work for it). SPA is
intentionally shortsighted as to the benefits of piracy for users as a
whole. Pirates are shortsighted about the justifiably expected
economic return for those who invested their money or labor so that
MondoBase+ 2.0 has lots of cool features, runs fast and bug free, and
comes out before 1996.

>LEGISLATION FOR COMPUTER AGE CRIME
>Is mere unauthorized access to a computer worthy of
>federal indictments, lengthy court battles, confiscation of equipment,
>huge fines, and years of prison time?

It depends on who's computer you mess with, generally no. Whether they
look at restricted information or not the state might have a
legitimate interest in making an example of someone who was playing
around in 911 computers or computers with honest-to-goodness sensitive
911-related information, the National Crime Information Center,
Department of Defense, IRS, Department of State, Nuke power plants,
hospitals, city electrical grid controls, etc. I want people to stay
the hell out of critical systems like that. But this hasn't been the
kind of hacking most folks have been busted for... I agree the
government has been clumsy and techno-illiterate in its response and
has stomped on more than a few people's rights.

>Or is it closer to a case of trespassing, which in the real world is usually
>punished by a simple warning? "Of course not," some will say, "since accessing
>a computer is far more sensitive than walking into an unlocked office
>building." If that is the case, why is it still so easy to do?

However, I think the analogy to an unlocked office building is a bad
one. It more like entering the office building through city sewers or
steam tunnels or looking for a forgotten unlocked window to crawl
through. Hackers don't just wander into a system, it takes effort and
some applied skill. If somebody had a really wimpy lock on their front
door you could open with a credit card, I think it would still be
breaking and entering to do so. And I wouldn't expect any thanks for
demonstrating how bad their security is.

>If it's possible for somebody to easily gain unauthorized access to a computer
>that has information about me, I would like to know about it.

Are you saying that you would only hack into a system that you knew or
expected held information about you personally? I'm guessing that you
would extend this argument that held information about other people,
any people, and that you would be doing them a service by showing them
if their system is insecure. If your reason for penetrating computers
reduces to nothing more than to show it can be done, thereby
marginally improving someone's (not necessarily your) privacy, then
issues of protecting people's privacy as a motive for your hacking
recede into the background.

I firmly believe that hackers hack because they like the challenge,
the ego boost, the subversive feel of it, the feeling of power, etc.
They may wind up goading sysadmins into producing more secure systems,
but I doubt that's their motive. If that were so, they would
anonymously inform sysadmins of holes as soon as they found them. If
the admin doesn't fix the hole then warn the admin "the hole will be
disseminated to others soon, get on the ball or else". I've gotten the
impression that hackers actually penetrate a system repeatedly the
same way just so they can do fun superuser kinds of things and try to
conceal their penetrations for as long as possible rather than inform
the sysadmin of the hole.

Goofing around or inviting others into the system and leaving the
admin to discover unauthorized highly priviledged users, degraded
system performance, or damage to files may get a faster closure of the
hole, but is unethical and unnecessary if the real goal is protecting
the system's users' privacy.

>But somehow I don't think the company or agency running the system would tell
>me that they have gaping security holes. Hackers, on the other hand, are
>very open about what they discover which is why large corporations
>hate them so much.

And they hate you for "being open" because it makes extra work for the
sysadmins, and broadcasts the presence of security holes to malicious
as well as non-malicious hackers, thereby increasing the chance that a
malicious hacker will get in and do some real damage before the hole
is fixed. The increased security of systems is a nice side-effect of
hacking, but as long as hackers keep publishing holes there are going
to be some poor schmuck sysadmins who get or act on the news a bit
later than some malicious hacker, and get their systems' users get
hurt.

>THE DANGERS OF UNINFORMED CONSUMERS
>In 1984 hackers were instrumental in showing the world how TRW kept credit
>files on millions of Americans. Most people had never even heard of a
>credit file until this happened.  Passwords were very poorly guarded -
>in fact, credit reports had the password printed on the credit report
>itself. . . . More recently, hackers found that MCI's Friends and Family
>program allowed anybody to call an 800 number and find out the numbers
>of everyone in a customer's "calling circle".  In both the TRW and MCI
>cases, hackers were ironically accused of being the ones to invade
>privacy. What they really did was help to educate the American
>consumer.

I believe they actually did both. They read and in some cases altered
people's credit records. And I'm guessing they fooled around with
playing see-who's-in-so-and-so's calling circle for a while until they
got bored.  Nevertheless, these were cases were hackers' activity was
eventually socially useful.  Phreakers' much more common activity of
toll fraud driving up everyone else's phone rates is not socially
useful. Hackers blowing into local business and university computers
and grabbing "trophies" to show each other and changing the system
passwords so the sysadmin can't get in, is not socially useful.

>the local phone companies take advantage of consumers. Here are a few
>examples:
>     Charging a fee for touch tone service. This is a misnomer.  It
>actually takes extra effort to tell the computer to ignore the tones
>that you produce. Everybody already has touch tone capability but we
>are forced to pay the phone company not to block it. While $1.50 a
>month may not seem like much, when added together the local companies
>that still engage in this practice are making millions of dollars a
>year for absolutely nothing. Why do they get away with it?

Because they justify it as recouping the cost of buying and installing
the DTMF equipment that lets them offer touch tone service. If they
have long since gotten back their investment in the equipment the
charge should be dropped. And they way to do that is get a group of
people or a lawyer upset about it and then to go to the appropriate
regulatory agency and say "look how this monopoly is gouging
consumers".

>Other examples abound: being charged extra not to have your name
>listed in the telephone directory, a monthly maintenance charge if you
>select your own telephone number,

Both of these require the phone company to break with normal routines,
thereby becoming a bit less productive and spending a bit more money.
In their preparation of the phone book and of assigning new numbers,
they use more labor to serve your wants relative to those of other
phone customers. (Of course, this is also true as a class of people
who live in the rural/low population density areas, but they're
subsidized by the taxpayers.)

If you're unlisted they have to insert a few extra steps into the
production of the phonebook before it goes to press to make positively
sure you're not in it.  If you're not in information, they probably
have to 1) make a (probably trivial) change in your computer record
and 2) make (less trivial) allowances in the programming/design of the
information assistance software for people desiring un-assistable
numbers. If you have a custom phone number they have to check that 1)
its not being used (trivial) and 2) make allowances in their
planning/programming of the number assigning system for numbers
(re)entering service sooner than would have been expected if numbers
had been moved in and out of use according to plan rather than by
customer whims. Some people will pick custom numbers which they could
have gotten by normal assignment, which eliminates the second reason,
but for efficiency in billing and fair/equal treatment of those who
want custom numbers, all should be charged the same.

The main point here is that somebody had to make the design changes in
how the phonebook is produced and in the computer systems that manage
information assistance and number allocation to accommodate these
requests for additional privacy/customization, and those changes cost
money to design and implement and cost a (tiny) bit more in operating
costs/maintenance/upgrades each year than one which didn't have to
make allowances for privacy and custom phone numbers.

Of course, that doesn't answer the question of why individuals who
want privacy should have to bear the costs rather than the entire
phone-using community . .  . but again (like with the issue of earning
back the cost of installing touch-tone equipment) this is something to
take up with the agency who regulates the telco or an interested
legislator.

>the fact that calling information to get a number now costs more than calling
>the number itself.

Directory assistance requires the use of human operators and the
creation and maintenance of a particular subset of the phone company's
computer database system for public access. Placing a normal
direct-dial call requires neither.  Lazy people who create more demand
for this service by not looking up numbers in the phone book should
pay more (remember assistance at payphones, where you may not have a
book, is free). Ideally getting information for numbers that have been
added since the book came out should be free as well, but the added
administrative cost of doing that is probably prohibitive.

>More recently, we have become acquainted with a new standard
>called Signalling System Seven or SS7. Through this system it is
>possible for telephones to have all kinds of new features: Caller ID,
>Return Call, Repeat Calling to get through a busy signal, and more.
>But again, we are having the wool pulled over our eyes. For instance,
>if you take advantage of Call Return in New York (which will call the
>last person who dialed your number), you are charged 75 cents on top
>of the cost of the call itself.
**>Obviously, there is a cost involved when new technologies are introduced.
>But there is no additional
>equipment, manpower, or time consumed when you dial *69 to return a
>call. It's a permanent part of the system. As a comparison, we could
>say that it also costs money to install a hold button. Imagine how we
>would feel if we were charged a fee every time we used it.

The cost of a hold button is paid for all at once in the price of your
phone, and it costs the phone company nothing to maintain. There was
probably a time when hold buttons were a hot new feature and phones
with them cost significantly more.

The tens of millions (I'm guessing) of dollars in electronics and
human labor that went into making SS7 go from an IDEA in some Bellcore
engineer's mind to DESIGN then to PROTOTYPE then to PRODUCTION then to
INSTALLED EQUIPMENT came from somewhere, and those people want their
money back, with interest. So the phone company recoups their cost.
And they do it from those who actually use the SS7 services, which
seems fair. Again, they phone company should not be allowed to make
undue profits off of SS7 services, but merely charging for them is
okay.

There is an issue of information-technology haves and have-nots here
though. If all these cool SS7 options are expensive then only rich
people will be able to afford them easily and middle-class people on
down will have to make decisions about what they'll give up each month
in order to afford the SS7 services. You may not like it, I may not
like it, but that's how capitalism works. Including the cost of SS7 in
basic rates would be unfair to the poor since I suspect they as a
group would be significantly less likely to use the services than the
rich and middle class but would then be paying for the SS7 services
they don't use as well.

>The local companies are not the only offenders but it is
>particularly bad in their case because, for the vast majority of
>Americans, there is no competition on this level.

If they're a monopoly, someone outside their company has to approve
their rate schedule. Mobilize a group, find that someone who regulates
rates, and complain, or write your congressman. If there were
competition, all providers might still charge for SS7 services the
same way since customers choosing a local phone company would probably
be most price sensitive about the basic monthly rate rather than the
bells and whistles. Telcomm-power-users are not a big enough group to
be the bread and butter of you local telco.

It might be that the phone company is getting lots of profits off of
SS7 and using that to subsidize the basic rate for everyone,
effectively shifting some costs from all users to "power-users" of the
phone system. This may or may not be fair, but it is not the same
thing as the phone company ripping you off.  Cross-subsidy is a way of
life.

It might also be that since its a new technology, there is a
relatively limited supply of SS7 equipment out there to be bought by
telco's and the installed base of SS7 equipment in your area can only
handle so much usage.  Microeconomics 101 Solution: Charge a mint for
the SS7 services and demand will stay manageable despite the wonderful
convenience it offers. Once again, capitalism at work.

>AT&T, MCI, and Sprint all encourage the use of calling cards.
>Yet each imposes a formidable surcharge each and every time they're used.
>there is no extra work necessary to complete a calling card call - at least >
>not on the phone company's part. . . .  But billing is accomplished merely by
>computers sending data to each other.  . . . Everything is
>accomplished quickly, efficiently, and cheaply by computer. Therefore,
>these extra charges are outdated.

I bet a bunch of phone co. programmers and EE's had to write a lot of
code and design and install networks that upgraded the phone company's
computerized billing system to handle calling cards. See the above
comments on SS7 for what this means. And let's not forget calling card
fraud and the investments in security to control it, an unfortunate
side-effect of offering card-calling.  Who should bear that cost? All
customers, or those that use the calling cards?  You might say, why
not the employees and shareholders of the phone company for not having
a more secure calling card system? Sometimes they do: phreakers ran
Metrophone out of business if I remember right. But if phone companies
gave individuals pass-numbers that didn't include their phone numbers
and were much harder to memorize, people would either change phone
companies or raise holy hell with the regulatory agency to get them to
undo it. Computerized calling-card identification by voiceprint might
crush toll-fraud, but who is going to pay to design, build, install,
and maintain the system?

Phreakers seem to feel that their consumption of time on phone company
lines and equipment without paying for them is like hackers breaking
in and using otherwise-unused CPU time on some company's computer.

First, I'm not too sure that hackers don't degrade performance of
systems they invade if only by soaking up the labor of system
administrators who could be doing other things besides constantly
updating and improving system security.  To which you'd say "we're not
making work for them, we're keeping them from being complacent and
becoming sitting ducks for industrial espionage and malicious
hackers." Maybe so, but you're also taking time away from their
efforts to make their systems faster, more reliable, friendlier, etc.
And what is the Hacker community's record with regard to malicious
hackers who trash companies systems? Do they actively try to find out
these guys and inform on them? I doubt it, although I'd be happy to
learn otherwise. If non-malicious hackers' real purpose is to help
companies to defend themselves against malicious hackers, then they
probably should as a rule inform on malicious hackers.

But is phreaking morally equivalent to hacking? Is it just using
left-over bandwidth, which can be thought of as being like unused CPU
cycles? I don't know. I can imagine scenarios where because of the
additional demand for services created by phreakers, more switching
equipment and programmer-hours have to be bought which might not have
been bought otherwise. And there is still the issue of making work for
phone system admins trying to catch people stealing long distance. Not
to mention making work for the customer service reps who have to
rectify some poor customer's $7000 phone bill. Fooling around with
satellites thousands of people depend on is definitely not ok.
Phreaking at off-times where there's lots of slack in the phone system
and doesn't create pressures for new equipment is more tolerable, but
still creates non-profit-making work for customer service, security,
and sysadmins in reacting to the threat that drives up the company's
operating costs, and, probably, everyone's rates.

>SOCIAL INJUSTICES OF TECHNOLOGY
>     The way in which we have allowed public telephones to be operated
>is particularly unfair to those who are economically disadvantaged. A
>one minute call to Washington DC can cost as little as 12 cents from
>the comfort of your own home. However, if you don't happen to have a
>phone, or if you don't happen to have a home, that same one minute
>call will cost you $2.20. That figure is the cheapest rate there is
>from a Bell operated payphone. With whatever kind of logic was used to
>set these prices, the results are clear. We have made it harder and
>more expensive for the poor among us to gain access to the telephone
>network. Surely this is not something we can be proud of.
>     A direct result of this inequity is the prevalence of red boxes.
>Red boxes are nothing more than tone generators that transmit a quick
>burst of five tones which convince the central office that a quarter
>has been deposited. It's very easy and almost totally undetectable.
>It's also been going on for decades.  Neither the local nor long
>distance companies have expended much effort towards stopping red
>boxes, which gives the impression that the payphone profits are still
>lucrative, even with this abuse. But even more troubling is the
>message this is sending.  Think of it. For a poor and homeless person
>to gain access to something that would cost the rest of us 12 cents,
>they must commit a crime and steal $2.20. This is not equal access.

In theory I think you're absolutely right, there shouldn't be this
massive surcharge on LD pay-phone calls. However, it may not be true
that redboxing truly serves to rectify this inequity for those it
hurts the worst. I'd guess that in practice very poor people who can't
afford homes and phones also can't afford hand-held cassette players
either, nor are they good friends with some phreak who will do it for
them on a regular basis, thus the poor aren't in a position to do
redboxing. Redboxing doesn't really do anything about the
price-inequity unless poor folks actually make use of it. Now if the
poor are out of the picture, it looks more like the phreaks are just
mad at the telco for price-gouging and decide to rip off said telco
because of it.

I wonder though: how much of high pay-phone prices are due to the
telco trying to recover losses from payphones due to redboxing?

Call-Sell operations using cloned cellular phones might be better able
to use your argument about compensating for price-inequity than
redboxing since it seems (based on some recent testimony I read) to be
pretty widely available to at least the urban poor on an as-needed
basis. Call-selling has at least a potential a wealth-redistributing
effect from relatively rich legitimate cell-phone users to poor folks
without phones (especially immigrants w/lots of relatives to reach out
and touch back home) and the Call-Sell operators. Note though, to the
extent that call-selling serves middle-class people who already own
phones and not the poor and phoneless it serves merely to redistribute
wealth from the users who use their cell-phones legitimately and the
telco, and transfer it to users who choose not to use their legitimate
phone and to use call-sell service instead, as well as the call-sell
operators. This kind of redistribution cannot rely on social justice
arguments and is just massive toll-fraud.

>CORPORATE RULES
>. . . This puts us at direct odds with many organizations, who believe
>that everything they do is "proprietary" and that the public has no
>right to know how the public networks work. In July of 1992 we were
>threatened with legal action by Bellcore (the research arm of the
>Regional Bell Operating Companies) for revealing security weaknesses
>inherent in Busy Line Verification (BLV) trunks. The information had
>been leaked to us and we did not feel compelled to join Bellcore's
>conspiracy of silence.

See my earlier comments about publishing security holes or sharing
them with hackers before letting the sysadmins have adequate warning
and time to fix the hole. Instant publication of holes is not socially
responsible.

Also, publishing one company's private data can in some cases create a
competitive disadvantage relative to that company's competitors with
real economic effects. If Phrack runs a long series of articles about
"how to hack the new Fujitsu switches", the communications engineer at
BellAtlantic deciding what brand of switch to buy may decide to buy
some other brand of switch besides Fujitsu. And he might be doing this
solely of the publication of those articles makes him think (rightly
or wrongly) that the Fujitsu's switch is more likely to get hacked
into than, say, Northern Telecom's. Phrack has just transferred wealth
from Fujitsu to Northern Telecom and possibly influenced the telco
into buying the less competitive switch (which could wind up
increasing telco operating costs and users' rates) out of fear of
getting hacked.

Moral: not all arguments about the social and commercial value of
keeping proprietary information secret are bogus.

>In April of this year, we were threatened with
>legal action by AT&T for printing proprietary information of theirs.
>The information in question was a partial list of the addresses of
>AT&T offices.  It's very hard for us to imagine how such information
>could be considered secret. But these actions are not surprising.

I'd bet money those addresses were sensitive because they would be
very useful to someone trying to con, misrepresent, and
social-engineer their way into the telco's computers. What possible
use there would be to the non-hacker/phreaker member of the public for
obscure telco-bureaucracy addresses and phone #s the phone company
decides not to let out to the general public eludes me.

>This in itself is wrong; a publication must have
>the same First Amendment rights regardless of whether it is printed
>electronically or on paper. As more online journals appear, this basic
>tenet will become increasingly critical to our nation's future as a
>democracy.

I couldn't agree more.

The government promptly dropped its case against
>the publisher who, to this day, is still paying back $100,000 in legal
>fees.

This sucks. The gov't/telco should have had to eat the defense's legal fees.

>As further evidence of the inequity between individual justice
>and corporate justice, Bell South was never charged with fraud for its
>claim that a $14 document was worth nearly $80,000. Their logic, as
>explained in a memo to then Assistant U.S. Attorney Bill Cook, was
>that the full salaries of everyone who helped write the document, as
>well as the full cost of all hardware and software used . . .

The Phrack/E911 case is one of the worst abuses of rights to date.

However, please let my speculate for a moment, working from the assumptions
that
1) The document was not expected to diffuse into the hands of hackers.
The "catalog anyone could order the document from" was, I suspect,
used only by and intended only for vendors and employees.
2) That possession of the E911 document would at least marginally aid
in the efforts of those who were interested in hacking into 911.

Granted, if both #1 and #2 are true then it could mean that BellSouth
had negligent security practices and deserved what it got. It might
also be the case that #2 is simply not true (I just can't say one way
or another due to not having read the document closely and lacking the
knowledge needed to understand the significance of everything was said
in the document). If #2 is false the following argument can be
ignored.

It seems to me that there could be an economic cost to Bell South
*because of the publication of that document in the hacker community*.
If Bellcore has to devote additional resources to beefing up E911
security solely because certain features of the E911 system are now
much more widely known to the hacker community (and thus more likely
to be attacked) than before the publication of the document in Phrack,
then Phrack has done BellSouth economic harm (and may also have
indirectly contributed to the risk of a breach of security in E911
until their new security measures kick in). It think it the case that
protecting the first amendment requires us to ignore such economic
harm and not make it legally actionable, but I believe that the "cost"
to BellSouth of the publication of that document in Phrack was
probably much greater than a few lost sales of the document's physical
incarnation.

The added short-term risk of a breach in 911 security due to the
publication of the document might have slightly more weight against
first-amendment claims but would probably still be outweighed by
freedom of speech. I could imagine a case though, where publication
(especially quiet publication within the hacker community so that the
average telco security person and E911 sysadmin person might not hear
about the publication for a few weeks) of the factory-default
passwords and dialup numbers for E911 computers would be great enough
a risk to public safety as to merit strong punishments and prior
restraint.

I hope the above article has provided some new middle-ground between
anti-establishment and establishment people to stand on and discuss
piracy, hacking and phreaking. I hope also that some hackers and
phreakers will use to above to re-examine wether they are, as claimed,
actually doing society a favor, and if not, how they could change
their ways so as to be a positive force.

Shayne Weyker
[email protected]

------------------------------

Date: Fri, 25 Mar 94 01:45:40 EST
From: [email protected](bruce edwards)
Subject: File 3--Lopez's reply to "Rape in Cyberspace"

Andy Lopez demonstrates an all too common deficit of civility in his
critique of Julian Dibbell's Voice article [Cu Digest, #6.21;6.26] --

AL> The December 21, 1993 Village Voice is a case in point.  However,
AL> as old Voices aren't normally found outside of fish markets, ...

-- as well as little knowledge of libraries.

To relieve the reader of at-length quoting both of Mr. Dibbell's
article and Mr. Lopez's analysis, I'll try and summarize each:

Dibbell's premise was that acts committed in virtual reality (VR),
acts having no "real life" component themselves, are nonetheless
(virtually) actionable on the ground that said acts have real life
(RL) consequence.  He went further by proposing that lessons learned
in VR may be ported to RL.  I have seen an RL event unfold much like
the one Mr. Bungle reportedly perpetrated on LamdaMOO.  The
perpetrators actions there (child abuse) were not verbal, but
physical.  This real life Bungle, too, had reasons why the community
ought not "toad" him, though the toading would have been of the
banishing, not the annihilating sort (the legal processes were already
complete).  The community involved agonized in much the same way the
members of LamdaMOO did.  In the end, there was no Wizard to act, and
there was little resolution, but there was experience to be archived.
Had these people the previous experience of the players on the MOO at
adjudicating communal threat, I believe that they would have been able
to relate with greater precision to their real life dilemma.  This is
the value of simulation, is it not?

Mr. Lopez derides the concept of role-playing VR:

AL> For the blissfully ignorant, a MUD is a Multi-User Dungeon, a
AL> glorified electronic role-playing program.  On MUDs such as
AL> LambdaMOO, you can choose your name and appearance and _interact_
AL> <gag> in a digitized world with other characters.  Personally, I
AL> find them identical to the old-fashioned, word-based role-playing
AL> games - such as the Dungeons & Dragons abomination - only more
AL> boring and repetitive.

Personally I have played neither, but find Lopez's comments oddly out
of perspective.  The cyberspace experience -- email, bulletin boards,
the USENET -- is entirely digitized interactivity.  Lopez goes on to
interpret Dibbell's use of netsex as an example of the involvement
MUDers experience in the VR world --

[Dibble:]
"Netsex, tiny-sex, virtual sex - however you name it, in real-life
reality it's nothing more than a 900-line encounter stripped of even
the vestigial physicality of the voice.  And yet, as any but the most
inhibited newbie can tell you, it's possibly the headiest experience
the very heady world of MUDs has to offer . . . Small wonder, then,
that a newbie's first taste of MUD sex is often also the first time
she or he surrenders wholly to the slippery terms of MUDish ontology,
recognizing in a full-bodied way that what happens in a MUD-made world
is neither exactly real nor exactly make-believe, but profoundly,
compellingly, and emotionally meaningful."

-- in what seems to me to be an intentionally myopic manner:

AL> [Really incredible.  Dibbel almost seems to be saying that the
AL> MUD means so much to people because it's a way to get off.  I
AL> stand amazed.]

 Of course, Dibbell implies no such thing.  He plainly means to say
that a MUD's power is in its ability to invoke an imaginative process
imparting kinesthetic, emotional, and intellectual verity.  A MUD may
establish a real -- not a "virtually" real -- web of interconnectivity
among its players.  That there is no physical connection (required)
among the parties is certainly no block to genuine experience.  If Mr.
Lopez, for example, were to be called intellectually deficient and
disingenuous in his post, and if he were to experience an emotional
reaction as a result of being labeled a dolt, would the fact that his
emotion was generated via cybertext make the experience itself
invalid?  Does he say words are without power?

I really can't delve Lopez's difficulty.  Is he offended by the
seriousness the players exhibit, by the reality they say suffuses
their MUD?  After reading his post several times, it seems only an
exercise to excoriate the idea of fantasy play and belittle Dibbell's
concepts.  Is it that the players do not detach from their experience
sufficiently to gain his approval?  He lastly proclaims:

AL> Dibbel draws flabbergasting conclusions about the future of
AL> society and he writes about it in this prose:

" . . . the commands you type into a computer are a kind of speech
that doesn't so much communicate as _make_things_happen_, directly and
ineluctably, the same way pulling a trigger does.  They are
incantations, in other words, and anyone attuned to the techno-social
megatrends of the moment - from the growing dependence of economies on
the global flow of intensely fetishized words and numbers to the
burgeoning ability of bioengineers to speak the spells written in the
four-letter text of DNA - knows that the logic of the incantation is
rapidly permeating the fabric of our lives."

AL> Just what is needed!  Cyberspace is already filled with shysters,
AL> hucksters, idiots, and clowns. Now we start collecting animists.

---
animism (an'uh-mizuhm)

--noun
Belief that natural phenomena and inanimate things have souls.

[< Lat. anima, soul]
---
No reading of Dibbell can support the allegation of animism.  Lopez's
article is weak, mean-spirited, and indicative of one of the major
problems (a *real* problem) in cyberspace:  when insulated by the
abstractness of this world, people shed their civil reticence.  There
is talk here that would not pass in the world with which I am most
familiar, that of the street.  I doubt Mr. Lopez would be quite so
free with his language in that instance;  but even that restraint,
enforced by threat of immediate physical retaliation, is a lacking
sort of restraint.  The real need is for true respect, even in -- no,
particularly in -- disagreement, that of individual for individual,
engendered through recognition of shared humanity.  Perhaps finding
that on a MUD, however virtual it may be, is a better start than smug
superiority.

--
bruce edwards - [email protected]
The Total Perspective Vortex BBS, Ithaca, NY

------------------------------

Date: Sat, 26 Mar 94 10:44 WET
From: [email protected](GrimJim)
Subject: File 4--Re: Village Voice & Phlogiston

In response to CuD #6.26 ("Village Voice and Phlogiston"):

>"Village Voice Perfects Phlogiston Synthesis in Coverage of Cyberspace"

>by  Mr. Badger (Andy Lopez)

>[...]  The author [of an article in the Village Voice], Julian Dibbell,
>has been a frequent user of the LambdaMOO, a MUD run inside of Xerox's
>Palo Alto research computer.

>For the blissfully ignorant, a MUD is a Multi-User Dungeon, a
>glorified electronic role-playing program.  On MUDs such as LambdaMOO,
>you can choose your name and appearance and _interact_ <gag> in a
>digitized world with other characters.  [...]
>What followed can only be understood if you accept that the game is a
>reality, of sorts, for most of its users.

>You might think that the offended parties simply arranged to have the
>offender kicked off the system, [...]
>In short, those who ran the game didn't want to ruin it by taking drastic
>action and those who played the game wanted the user removed.  [...]

Yes, it sounds like people take things rather seriously.  But the sense
of reality these players express has an analog in the artistic world.
Their behavior can be easily understood in this context.

>This being cyberspace, there were conflicting views.

Replacing "cyberspace" with "a society" reveals the true nature of the
event.

>Why didn't the other users simply use the command that would have
>blotted Mr. Bungle's messages from their screens?  Was it really that
>serious anyway?

Using a filter might remove said Bungle from your sight, but it does not
keep Bungle from using his (or her?) coded toy from impersonating you
before a third-party.  To use Usenet as an analogy, Bungle performed
the equivalent of forging obnoxious messages in other peoples' names;
many people have taken forged messages quite seriously in the past.  It
should be obvious that the main issue actually has little to do with games.

Dibbell's analysis of the situation is incorrect, but so is Badger's
dismissal.  By acting out roles, players are investing time and effort in
the creation of characters.  It's a cross between acting and literature;
in the former, roles (characters) are made visible to others by
performance; in the latter, the character is revealed through text.
One could say that Bungle disregarded the authors' right to control their
literary creations, their intellectual property.  The "social way to
behave" is to be a collaborator with other authors, not to usurp them.

>Where does the body stop and the mind begin?  What is the nature of
>reality?  The arguments were going in circles during an extended
>meeting of up to thirty - count 'em, thirty - users.  In the middle of
>the online babble, Mr. Bungle appeared and offered his defense:  He
>was simply experimenting with users' reactions to extreme events.

I think there is a simple guideline to such social games: "If you can't
play by the rules, you can't play the game."  I might add that the "I was
just experimenting on you (without your prior knowledge or consent)"
defense has also shown up on Usenet as (poor) explanation for deliberately
offensive posts.

>What followed was the institutionalization of a process whereby users
>could have more input into controlling the MUD.  To cap things, Mr.
>Bungle reincarnated as a new, chastened character.

In other words, the rules of the game were changed to handle disruptive
players.  A sociological analysis of how the game's society reacted and
adapted to the situation might have been useful, but what can one really
expect out of sensationalist media?

>Dibbell draws flabbergasting conclusions about the future of society [...]
>Cyberspace is already filled with shysters,
>hucksters, idiots, and clowns. Now we start collecting animists.

And cynics, judging from Badger's snide tone.

I found Dibbell's quoted and paraphrased words were often irrelevant.
Alas, the obsession with electronic sex and superficial philosophical
rambling is all too trendy.  This "cyberspace" thing isn't about games
or virtual sex, it's about people and the societies they create.  Don't
lose track of the message/forest for the medium/trees.

------------------------------

End of Computer Underground Digest #6.27
************************************