Date: Wed, 15 Jul 1992 12:34:08 -0500
From: anonymous <[email protected]>
Subject: File 8--The Ethics of Data Communications

                 The Ethics of Data Communications
                       By Norris Parker Smith

 A report issued jointly by the U.S. Education and Justice
departments urges that instruction in computer ethics be made a part
of school curricula.

 The aim is to convince young people that unauthorized copying of, say, a
new game program is plain theft, like stealing a bicycle; turning
loose a destructive worm on the Internet is criminal, a form of
high-tech arson, like setting a fire at one end of a row of condos.

 This is a laudable goal, although in the real world it must be
recognized that more and more responsibilities are being heaped upon
the schools while less and less money is available to pay for basic
quality teaching.

 A broader point is more important: Where does ethics in computation
begin and end?

 For example, data communication today is being transformed by a
worldwide trend. High-bandwidth digital networks based on optical
fiber are supplanting low-capacity analog channels over metal wires.

 The benefits to computing and to the overall economy are obvious. On
the face of it, attempts to impede this broad, positive trend would be
comparable to tampering with the adoption of a beneficial new drug.

 At the same time -- in response to the same phenomena that upset the
officials at Justice and Education -- users of data communication
facilities are adopting new methods to provide simple, reliable
security for their files and messages. This also would seem a good
thing, well within the rights of people wishing to protect their
property and their ideas.

Open Lines of Communication

 On the international scene, the United States and other Western
democracies have recognized that they have a real and immediate
interest in encouraging democracy in the former Soviet states to
emerge from its present fumbling, anxious childhood and mature into
solid stability.

 The Russians and their former fellow victims of Communist paranoia
and incompetence say that in order to attempt this difficult
evolution, they urgently need to upgrade communications. This would be
an improvement to their national infrastructures, one of the few areas
in which outside help can readily make a difference. International
consortia, including U.S. participants, stand ready to string up the
fiber and install the switches.

 It would seem reasonable -- even ethical -- for the West to support
improvements in Russia's internal communications, or, at the least,
not stand in the way.

 What is the record on these two simple propositions?  In Congress,
 the FBI presented testimony calling for modifications in new
 communications technology to make eavesdropping easier. This is
 based upon the supposition that massive streams of digitalized
 photons are more difficult to bug than slender flows of obedient
 analog electrons.

 The direct costs of this proposed degrading of the communications
system is estimated in the high hundreds of millions of dollars. The
indirect costs of less-than-optimum systems could be much higher.

 The National Security Agency also raised questions about improved
measures for data security. Security is fine, it said, but it should
not be too fine, because the wicked as well as the benign might make
use of it. And when the wicked get into the act, the NSA will have to
invest in more computer time to discern what's happening.

 If the Russians go modern, reasoned the NSA, it would be more
difficult for NSA satellites and other means to listen in. And who
knows what evil might lurk, even now, in the minds of the Russians?

 Thus, exports of advanced communications technology to the former
Soviet Union were blocked within the federal establishment, largely by
the NSA.  Approval took place only when the Germans and other
Europeans applied determined pressure.

 The government has legitimate concerns about national security in an
era that looks increasingly unsanitary. Yet it is difficult to project
that any of the nasty little wars that have flamed among the embers of
communism would become genuine threats to basic U.S. interests. Other
means toward nuclear safety in Eurasia offer better prospects than a
Luddite policy on internal communication.

 Crime-fighting (which sounds much more acceptable than snooping)
also has its place. It seems only fair, however, for the FBI, like
everyone else, to adapt to new technology as it comes along -- rather
than abusing its authority and prestige by lobbying for a favorable
fix at the public expense.

 One of the most fundamental maxims of ethics reads this way: "At a
minimum, avoid doing unnecessary harm and get out of the way of events
that clearly bring good."

 The feds should grade their own schoolwork by this ethical criterion
before they draw up computational dos and don'ts for schoolchildren.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 SUPERNET INTERNATIONAL wants to know what you think about issues raised in
The Daily Word. For information on how to add your voice to the discussion,
see Your Feedback on the News under this topic.

Copyright 1992 by SUPERNET INTERNATIONAL. All rights reserved.

------------------------------

The following news summary, taking from the New York Times
News Service, appeared in the Chicago Tribune business section
on July 24 (p. 1). There was no author attributed, and the headline
was "Computer hackers put new twist on 'West Side Story'."

The article begins:

    >Late into the night, in working-class neighborhoods around New
    >York City, young men with code names like "acid Phreak" and
    >"Outlaw" sat hunched before their glowing computer screens,
    >exchanging electronic keys to complex data-processing systems.
    >
    >They called themselves the Masters of Deception. Their mission: to
    >prove their prowess in the shadowy computer underworld.
    >
    >Compulsive and competitive, they played out a cybernetic version
    >of "West Side Story," trading boasts, tapping into telephone
    >systems, even pulling up confidential credit reports to prove
    >their derring-do and taunt other hackers.
    >
    >Their frequent target was the Legion of Doom, a hacker group named
    >after a gang of comic-book villains. The rivalry seemed to take on
    >class and ethnic overtones, with the diverse New York group
    >defying the traditional image of the young suburban computer
    >whiz.

+++Commentary: The New York Times has finally resorted to the
sensationalism of other media that plays on public fears and
stereotyped images of the terrifying hacker menace. The Times even
goes a step further by laying out a Bloods-'n-Crips scenario, complete
with gang revenge and drive-by hackings. The Times, whose writers
should know better, also plays up the danger of obtaining credit
ratings. TRW credit reports are among the easiest of so-called
confidential data to get.  The implication is that it's hackers, not
the abusive practices of used car salespeople or other marketers, that
are a danger to snatching this information.

The story continues with a summary of the MOD bust as reported in the
Times, CuD, and elsewhere.  It adds some biographical information
about the MOD people indicted:

John Lee is 21, goes by the name Corrupt, and "has dreadlocks chopped
back into stubby 'twists' and live with his mother in a dilapidated
walkup in Bedford-Stuyvesant, Brooklyn." The story informs us that he
"bounced around programs for gifted students before dropping out of
school in the 11th grade." Lee works part-time as a standup comic and
is studying film production at Brooklyn University.

Paul Stira is 22 and lives in Queens and was valedictorian at Thomas
A. Edison High School. It adds that his handle was Scorpion.  He is
three credits shy of a degree in computer science at Polytechnic
University.

Julio Ferndez is 18 and was known as Outlaw and studied computers in
grade school.  The story includes a picture of Phiber Optik and
Scorpion.

The story continues with a brief history of MOD and the disputes
with Legion of Doom:

   >The Masters of Deception were born in a conflict with the Legion
   >of Doom, which had been formed by 1984 and ultimately included
   >among its ranks three Texans, one of whom, Kenyon Shulman, is the
   >son of a Houston socialite, Carolyn Farb.
   >
   >Abene had been voted into the Legion at one point. But when he
   >began to annoy others in the group with his New York braggadocio
   >and refusal to share information, he was banished, Legion members
   >said.
   >
   >Meanwhile, a hacker using a computer party line based in Texas
   >had insulted Lee, who is black, with a racial epithet.
   >
   >By 1989, both New Yorkers ((Abene and Lee)) had turned to a new
   >group, MOD, founded by Ladopoulos. They vowed to replace their
   >Legion rivals as the "new elite."
   >
   >According to a history the new group kept on the computer
   >network, they enjoyed "mischievous pranks," often aimed at their
   >Texas rivals, and the two groups began sparring. But in June 1990
   >the three Texas-based Legion members, including Shulman, Chris
   >Goggans and Scott Chasin, formed Comsec Cata Security, a business
   >intended to help companies prevent break-ins by other hackers.
   >
   >Worried that the Texans were acting as police informers, the MOD
   >members accused their rivals of defaming them on the network
   >bulletin boards. MOD's activities, according to the indictment
   >and other hackers, began to change and proliferate.
   >
   >Unlike most of the "old generation" of hackers who liked to
   >joyride through the systems, the New Yorkers began using the file
   >information to harass and intimidate others, according
   >to prosecutors.

The article concludes by suggesting that MOD was jealous of Comsec's
media attention and mention Abene's and Ladopoulos's claims in the
media that they had a right to penetrate computer systems. It adds,
drawing from John Perry Barlow's paper, his experience with Abene in
1989. Abene allegedly downloaded Barlow's credit rating and posted it.
This was detailed in the 1990 Harper's magazine article on computer
privacy and abuse.  The article was based on posts from a conference
discussion topic on a California computer system.  The article
concludes by alleging that despite the indictment, MOD may still be
bugging people:

   >But the battles are apparently not over. A couple of days after
   >the charges were handed up, one Legion member said, he received a
   >message on his computer from Abene. It was sarcastic as usual, he
   >said, and it closed, "Kissy, kissy."

The Times story does challenge the myth of a stereotypical white male
locked away alone in a suburban bedroom all night.  But linking it to
rival gang activity and West Side Story images seems bizarre. The
public, the fuzz, and the media pick up on these scripts. If it's in
the New Times, it must be true, right?  In this case, the Times has
taken a few steps backwards in its normally competent (especially when
John Markoff writes) stories.

To the Times: "Kissy, kissy!"

Downloaded From P-80 International Information Systems 304-744-2253