963 lines
50 KiB
Plaintext
963 lines
50 KiB
Plaintext
|
Computer underground Digest Sun Mar 27, 1994 Volume 6 : Issue 27
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe (He's Baaaack)
|
||
|
Acting Archivist: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Koppa Ediqor: Phirho Shrdlu
|
||
|
|
||
|
CONTENTS, #6.27 (Mar 27, 1994)
|
||
|
File 1--A JT Apology for CFP No-Show and Deleted CuD Mail
|
||
|
File 2--Some thoughts on piracy, hacking and phreaking.
|
||
|
File 3--Lopez's reply to "Rape in Cyberspace"
|
||
|
File 4--Re: Village Voice & Phlogiston
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
|
||
|
FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
nic.funet.fi
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
----------------------------------------------------------------------
|
||
|
|
||
|
Date: Sun 27 Mar 1994 15:32:54 CST
|
||
|
From: Jim Thomas <jthomas@well.sf.ca.us>
|
||
|
Subject: File 1--A JT Apology for CFP No-Show and Deleted CuD Mail
|
||
|
|
||
|
Notes are filtering in from folks who are wondering why I was a
|
||
|
no-show at CFP '94 this past week. I apologize for the absence, but it
|
||
|
seemed necesssary. I spent the week at my father's side and was with
|
||
|
him when he died friday noon.
|
||
|
|
||
|
Thanks to Netta Gilboa who gave a precis of my paper at the conference
|
||
|
and who, from incoming reports, did a better job of making sense of it
|
||
|
than it probably deserved. Thanks also to Bruce Umbaugh who filled in
|
||
|
as session chair at the last minute.
|
||
|
|
||
|
I probably shouldn't have tried to wade through the backlog of CuD
|
||
|
mail late Friday night when I returned, but a sense of returning to a
|
||
|
normal routine seemed necessary. Unfortunately, the mail wasn't
|
||
|
managed normally---I accidentally deleted many posts---I'm not sure
|
||
|
how many, but it was a substantial number. So, if you subbed, sent
|
||
|
articles or comments, or whatever, and if you haven't received a
|
||
|
response, please resend. Sorry 'bout that.
|
||
|
|
||
|
Jim Thomas
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 9 Mar 1994 14:13:30 -0500
|
||
|
From: Dennis Shayne Weyker <weyker@WAM.UMD.EDU>
|
||
|
Subject: File 2--Some thoughts on piracy, hacking and phreaking.
|
||
|
|
||
|
The following is a long response I've had laying around to Emmanuel
|
||
|
Goldstein's testimony to congress last summer. I think the issues
|
||
|
mentioned are still relevant, so I've decided to finish the thing and
|
||
|
send it in.
|
||
|
|
||
|
I come across sounding a bit like a phone-company advocate, but I
|
||
|
don't really think I am. My real reason for writing was to counter
|
||
|
what I thought were some poorly thought-out anarchist and
|
||
|
libertarian-flavored arguments that hackers and phreaks use to justify
|
||
|
behaviors that don't seem justifiable to me.
|
||
|
|
||
|
Comments are welcome.
|
||
|
|
||
|
Shayne Weyker
|
||
|
weyker@wam.umd.edu
|
||
|
|
||
|
+>Date: Thu, 10 Jun 1993 16:53:48 -0700
|
||
|
+>From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
|
||
|
> It is easy to see this when we are talking about crimes that we
|
||
|
>understand as crimes. But then there are the more nebulous crimes; the
|
||
|
>ones where we have to ask ourselves: "Is this really a crime?" Copying
|
||
|
>software is one example. We all know that copying a computer program
|
||
|
>and then selling it is a crime. . . . organizations like
|
||
|
>the Software Publishers Association have gone on record as saying that
|
||
|
>it is illegal to use the same computer program on more than one
|
||
|
>computer in your house. They claim that you must purchase it again or
|
||
|
>face the threat of federal marshals kicking in your door. That is a
|
||
|
>leap of logic.
|
||
|
|
||
|
I don't like or agree with the SPA's position, but I also think that
|
||
|
users who copy copyrighted non-shareware software and get significant
|
||
|
productive use or entertainment out of the software should buy it, and
|
||
|
be liable for fines and forced purchase if they don't buy it.
|
||
|
|
||
|
The problem with enforcing this is that you can't determine usefulness
|
||
|
or entertainment value to the user by auditing their hard drive. And
|
||
|
fining them for possessing copyrighted software they don't use is
|
||
|
unfair, (in cases where businesses are the target of the software
|
||
|
audit the company may not even know it has the software). This doesn't
|
||
|
bother the SPA, but if it bothers readers out there in net.land they
|
||
|
should get working on ideas for metering the use of software that
|
||
|
might be included in every program and that could be reset only the
|
||
|
first time its installed on a new storage device (hmm. that might have
|
||
|
some of the same hassles as old copy protection schemes).
|
||
|
|
||
|
> It is a leap of logic to assume that because a word processor
|
||
|
>costs $500, a college student will not try to make a free copy in
|
||
|
>order to write and become a little more computer literate.
|
||
|
|
||
|
Students don't pirate WordPerfect to become computer literate, they
|
||
|
pirate it to write papers. In using the program they may become more
|
||
|
computer literate.
|
||
|
|
||
|
>Do we punish this student for breaking a rule? Do we charge him with
|
||
|
>stealing $500?
|
||
|
|
||
|
Certainly not $500, because WP isn't out the cost of manuals, disks,
|
||
|
distribution, or free tech support. They are losing a chunk of income
|
||
|
of the cost of developing the software, but this loss is compensated
|
||
|
for at least partly by the fact that WordPerfect Corp.'s future market
|
||
|
share goes up because pirated WP is so widely available and thus
|
||
|
becomes the only word processor many people ever bother to learn to
|
||
|
use. I would hope they would stick to trying to nail businesses and
|
||
|
leave individuals (other than those who resell pirated software) alone
|
||
|
as not worth the trouble. WP (like Microsoft) is a very rich and
|
||
|
successful software company whom the status quo has served quite well
|
||
|
and massive anti-piracy campaigns seem motivated by profit-motive
|
||
|
rather than economic self-defense.
|
||
|
|
||
|
But the problem remains that those who buy WP are paying for the
|
||
|
development of the program while those who pirate are not. The pirates
|
||
|
are freeloading by using a good (use of a program that cost millions
|
||
|
to develop) and not helping to reimburse the company for the costs of
|
||
|
development. This seems not so much like theft as being delinquent on
|
||
|
club dues, homeowners association fees, etc. Maybe assigning deadbeats
|
||
|
to bill collectors would be a good model for punish piracy. In a
|
||
|
perfect world, everything would be shareware, and there would the use
|
||
|
verification schemes so that everybody who used would pay up. To the
|
||
|
extent that those who pirate WP now get just as much productive use
|
||
|
out of it as paid users, pirates are transferring wealth from the paid
|
||
|
users to themselves (they both get use of the program, and the
|
||
|
legitimate user has to pay for them both). Pirates may also be
|
||
|
transferring wealth from WP's employees and stockholders too.
|
||
|
|
||
|
Two questions arise: 1) "What gives the pirate the moral right to
|
||
|
freeload on the development cost of the software and transfer wealth
|
||
|
too themselves from others?" And 2) "We are all (except in dire cases
|
||
|
like Nazi Germany) morally bound to obey the law, except where one
|
||
|
*publicly* protests the law by deed and is willing to make oneself a
|
||
|
test-case to get the law changed (ala Doc Kervorkian). So where do
|
||
|
pirates get off claiming all by themselves that laws protecting the
|
||
|
intellectual property rights of software companies are void and that
|
||
|
they can go around violating the law covertly at little risk to
|
||
|
themselves just because they don't like it?"
|
||
|
|
||
|
Now if society decides it is willing to allow these unfair transfers
|
||
|
of wealth in return for a more computer literate and productive
|
||
|
workforce then okay. We allow what some think are unfair disparities
|
||
|
of wealth in order to help assure a productive workforce already.
|
||
|
|
||
|
But those in favor of punishing piracy could just as easily make
|
||
|
libertarian arguments that transfers of wealth that aren't explicitly
|
||
|
consented to by the person losing wealth is unjust, and that justice
|
||
|
is a higher goal than a somewhat more computer-literate and productive
|
||
|
society.
|
||
|
|
||
|
>Of course, this represents a fundamental change in our society's
|
||
|
>outlook. Technology as a way of life, not just another way to make
|
||
|
>money.
|
||
|
|
||
|
Does this mean that because its your way of life you shouldn't have to
|
||
|
pay for it? (see comments below about phreaking) That because
|
||
|
technology is your way of life, other people who make their living
|
||
|
producing technology shouldn't be able to make money off of you? Why
|
||
|
is technology different than all other categories of commodity to be
|
||
|
traded in the marketplace? Don't get me wrong, I have my beefs with
|
||
|
capitalism and I like Bruce Sterling's concept of money moving in to
|
||
|
control everything in "Green Days in Brunei". But I get the feeling
|
||
|
that, deep down, you deny others' right to make money off of you and
|
||
|
those like you (making you pay for all long distance, cable TV, fancy
|
||
|
telephone services, and all the software that you use regularly)
|
||
|
because you couldn't afford it and you wouldn't be able to make as
|
||
|
much use of technology (consume as many technological goods) as you
|
||
|
would like.
|
||
|
|
||
|
I doubt that using your technical skill to cheat the marketplace is a
|
||
|
morally acceptable form of protesting the restraints a capitalist
|
||
|
system places on you.
|
||
|
|
||
|
>After all, we encourage people to read books even if they can't
|
||
|
>pay for them because to our society literacy is a very important goal.
|
||
|
|
||
|
True, but libraries pay for their copies of books and it is neither
|
||
|
encouraged nor legal to photocopy entire books. It's gonna be
|
||
|
interesting to see what happens when libraries turn into big full-text
|
||
|
on-line databases and as many people can download a particular text as
|
||
|
can call in. Like a guy said in Wired 1.1, if the libraries don't
|
||
|
charge for this, it might put book publishers out of business. If that
|
||
|
happens, who's going to pay authors to write books?
|
||
|
|
||
|
>If we succeed in convincing people
|
||
|
>that copying a file is the same as physically stealing something, we
|
||
|
>can hardly be surprised when the broad-based definition results in
|
||
|
>more overall crime. Blurring the distinction between a virtual
|
||
|
>infraction and a real-life crime is a mistake.
|
||
|
|
||
|
There is a kind of prohibition-era effect that current law (as SPA
|
||
|
interprets it) makes petty criminals out of a lot of people. But, the
|
||
|
SPA members may feel the opposite way, that if people are made to feel
|
||
|
criminal/guilty/fearful for copying software (regardless of whether
|
||
|
they get productive use or entertainment out of it) they will copy a
|
||
|
lot less and buy a little more. You certainly wouldn't respond this
|
||
|
way, but John Q. User might be a different story.
|
||
|
|
||
|
A big reduction in the distribution of pirated software is bad for the
|
||
|
user (less ability to evaluate before buying, less chance to use new
|
||
|
software or software of tangential to one's business) but good for the
|
||
|
software companies (more profits for the software industry and
|
||
|
possibly more wealth trickling down to those who work for it). SPA is
|
||
|
intentionally shortsighted as to the benefits of piracy for users as a
|
||
|
whole. Pirates are shortsighted about the justifiably expected
|
||
|
economic return for those who invested their money or labor so that
|
||
|
MondoBase+ 2.0 has lots of cool features, runs fast and bug free, and
|
||
|
comes out before 1996.
|
||
|
|
||
|
>LEGISLATION FOR COMPUTER AGE CRIME
|
||
|
>Is mere unauthorized access to a computer worthy of
|
||
|
>federal indictments, lengthy court battles, confiscation of equipment,
|
||
|
>huge fines, and years of prison time?
|
||
|
|
||
|
It depends on who's computer you mess with, generally no. Whether they
|
||
|
look at restricted information or not the state might have a
|
||
|
legitimate interest in making an example of someone who was playing
|
||
|
around in 911 computers or computers with honest-to-goodness sensitive
|
||
|
911-related information, the National Crime Information Center,
|
||
|
Department of Defense, IRS, Department of State, Nuke power plants,
|
||
|
hospitals, city electrical grid controls, etc. I want people to stay
|
||
|
the hell out of critical systems like that. But this hasn't been the
|
||
|
kind of hacking most folks have been busted for... I agree the
|
||
|
government has been clumsy and techno-illiterate in its response and
|
||
|
has stomped on more than a few people's rights.
|
||
|
|
||
|
>Or is it closer to a case of trespassing, which in the real world is usually
|
||
|
>punished by a simple warning? "Of course not," some will say, "since accessing
|
||
|
>a computer is far more sensitive than walking into an unlocked office
|
||
|
>building." If that is the case, why is it still so easy to do?
|
||
|
|
||
|
However, I think the analogy to an unlocked office building is a bad
|
||
|
one. It more like entering the office building through city sewers or
|
||
|
steam tunnels or looking for a forgotten unlocked window to crawl
|
||
|
through. Hackers don't just wander into a system, it takes effort and
|
||
|
some applied skill. If somebody had a really wimpy lock on their front
|
||
|
door you could open with a credit card, I think it would still be
|
||
|
breaking and entering to do so. And I wouldn't expect any thanks for
|
||
|
demonstrating how bad their security is.
|
||
|
|
||
|
>If it's possible for somebody to easily gain unauthorized access to a computer
|
||
|
>that has information about me, I would like to know about it.
|
||
|
|
||
|
Are you saying that you would only hack into a system that you knew or
|
||
|
expected held information about you personally? I'm guessing that you
|
||
|
would extend this argument that held information about other people,
|
||
|
any people, and that you would be doing them a service by showing them
|
||
|
if their system is insecure. If your reason for penetrating computers
|
||
|
reduces to nothing more than to show it can be done, thereby
|
||
|
marginally improving someone's (not necessarily your) privacy, then
|
||
|
issues of protecting people's privacy as a motive for your hacking
|
||
|
recede into the background.
|
||
|
|
||
|
I firmly believe that hackers hack because they like the challenge,
|
||
|
the ego boost, the subversive feel of it, the feeling of power, etc.
|
||
|
They may wind up goading sysadmins into producing more secure systems,
|
||
|
but I doubt that's their motive. If that were so, they would
|
||
|
anonymously inform sysadmins of holes as soon as they found them. If
|
||
|
the admin doesn't fix the hole then warn the admin "the hole will be
|
||
|
disseminated to others soon, get on the ball or else". I've gotten the
|
||
|
impression that hackers actually penetrate a system repeatedly the
|
||
|
same way just so they can do fun superuser kinds of things and try to
|
||
|
conceal their penetrations for as long as possible rather than inform
|
||
|
the sysadmin of the hole.
|
||
|
|
||
|
Goofing around or inviting others into the system and leaving the
|
||
|
admin to discover unauthorized highly priviledged users, degraded
|
||
|
system performance, or damage to files may get a faster closure of the
|
||
|
hole, but is unethical and unnecessary if the real goal is protecting
|
||
|
the system's users' privacy.
|
||
|
|
||
|
>But somehow I don't think the company or agency running the system would tell
|
||
|
>me that they have gaping security holes. Hackers, on the other hand, are
|
||
|
>very open about what they discover which is why large corporations
|
||
|
>hate them so much.
|
||
|
|
||
|
And they hate you for "being open" because it makes extra work for the
|
||
|
sysadmins, and broadcasts the presence of security holes to malicious
|
||
|
as well as non-malicious hackers, thereby increasing the chance that a
|
||
|
malicious hacker will get in and do some real damage before the hole
|
||
|
is fixed. The increased security of systems is a nice side-effect of
|
||
|
hacking, but as long as hackers keep publishing holes there are going
|
||
|
to be some poor schmuck sysadmins who get or act on the news a bit
|
||
|
later than some malicious hacker, and get their systems' users get
|
||
|
hurt.
|
||
|
|
||
|
>THE DANGERS OF UNINFORMED CONSUMERS
|
||
|
>In 1984 hackers were instrumental in showing the world how TRW kept credit
|
||
|
>files on millions of Americans. Most people had never even heard of a
|
||
|
>credit file until this happened. Passwords were very poorly guarded -
|
||
|
>in fact, credit reports had the password printed on the credit report
|
||
|
>itself. . . . More recently, hackers found that MCI's Friends and Family
|
||
|
>program allowed anybody to call an 800 number and find out the numbers
|
||
|
>of everyone in a customer's "calling circle". In both the TRW and MCI
|
||
|
>cases, hackers were ironically accused of being the ones to invade
|
||
|
>privacy. What they really did was help to educate the American
|
||
|
>consumer.
|
||
|
|
||
|
I believe they actually did both. They read and in some cases altered
|
||
|
people's credit records. And I'm guessing they fooled around with
|
||
|
playing see-who's-in-so-and-so's calling circle for a while until they
|
||
|
got bored. Nevertheless, these were cases were hackers' activity was
|
||
|
eventually socially useful. Phreakers' much more common activity of
|
||
|
toll fraud driving up everyone else's phone rates is not socially
|
||
|
useful. Hackers blowing into local business and university computers
|
||
|
and grabbing "trophies" to show each other and changing the system
|
||
|
passwords so the sysadmin can't get in, is not socially useful.
|
||
|
|
||
|
>the local phone companies take advantage of consumers. Here are a few
|
||
|
>examples:
|
||
|
> Charging a fee for touch tone service. This is a misnomer. It
|
||
|
>actually takes extra effort to tell the computer to ignore the tones
|
||
|
>that you produce. Everybody already has touch tone capability but we
|
||
|
>are forced to pay the phone company not to block it. While $1.50 a
|
||
|
>month may not seem like much, when added together the local companies
|
||
|
>that still engage in this practice are making millions of dollars a
|
||
|
>year for absolutely nothing. Why do they get away with it?
|
||
|
|
||
|
Because they justify it as recouping the cost of buying and installing
|
||
|
the DTMF equipment that lets them offer touch tone service. If they
|
||
|
have long since gotten back their investment in the equipment the
|
||
|
charge should be dropped. And they way to do that is get a group of
|
||
|
people or a lawyer upset about it and then to go to the appropriate
|
||
|
regulatory agency and say "look how this monopoly is gouging
|
||
|
consumers".
|
||
|
|
||
|
>Other examples abound: being charged extra not to have your name
|
||
|
>listed in the telephone directory, a monthly maintenance charge if you
|
||
|
>select your own telephone number,
|
||
|
|
||
|
Both of these require the phone company to break with normal routines,
|
||
|
thereby becoming a bit less productive and spending a bit more money.
|
||
|
In their preparation of the phone book and of assigning new numbers,
|
||
|
they use more labor to serve your wants relative to those of other
|
||
|
phone customers. (Of course, this is also true as a class of people
|
||
|
who live in the rural/low population density areas, but they're
|
||
|
subsidized by the taxpayers.)
|
||
|
|
||
|
If you're unlisted they have to insert a few extra steps into the
|
||
|
production of the phonebook before it goes to press to make positively
|
||
|
sure you're not in it. If you're not in information, they probably
|
||
|
have to 1) make a (probably trivial) change in your computer record
|
||
|
and 2) make (less trivial) allowances in the programming/design of the
|
||
|
information assistance software for people desiring un-assistable
|
||
|
numbers. If you have a custom phone number they have to check that 1)
|
||
|
its not being used (trivial) and 2) make allowances in their
|
||
|
planning/programming of the number assigning system for numbers
|
||
|
(re)entering service sooner than would have been expected if numbers
|
||
|
had been moved in and out of use according to plan rather than by
|
||
|
customer whims. Some people will pick custom numbers which they could
|
||
|
have gotten by normal assignment, which eliminates the second reason,
|
||
|
but for efficiency in billing and fair/equal treatment of those who
|
||
|
want custom numbers, all should be charged the same.
|
||
|
|
||
|
The main point here is that somebody had to make the design changes in
|
||
|
how the phonebook is produced and in the computer systems that manage
|
||
|
information assistance and number allocation to accommodate these
|
||
|
requests for additional privacy/customization, and those changes cost
|
||
|
money to design and implement and cost a (tiny) bit more in operating
|
||
|
costs/maintenance/upgrades each year than one which didn't have to
|
||
|
make allowances for privacy and custom phone numbers.
|
||
|
|
||
|
Of course, that doesn't answer the question of why individuals who
|
||
|
want privacy should have to bear the costs rather than the entire
|
||
|
phone-using community . . . but again (like with the issue of earning
|
||
|
back the cost of installing touch-tone equipment) this is something to
|
||
|
take up with the agency who regulates the telco or an interested
|
||
|
legislator.
|
||
|
|
||
|
>the fact that calling information to get a number now costs more than calling
|
||
|
>the number itself.
|
||
|
|
||
|
Directory assistance requires the use of human operators and the
|
||
|
creation and maintenance of a particular subset of the phone company's
|
||
|
computer database system for public access. Placing a normal
|
||
|
direct-dial call requires neither. Lazy people who create more demand
|
||
|
for this service by not looking up numbers in the phone book should
|
||
|
pay more (remember assistance at payphones, where you may not have a
|
||
|
book, is free). Ideally getting information for numbers that have been
|
||
|
added since the book came out should be free as well, but the added
|
||
|
administrative cost of doing that is probably prohibitive.
|
||
|
|
||
|
>More recently, we have become acquainted with a new standard
|
||
|
>called Signalling System Seven or SS7. Through this system it is
|
||
|
>possible for telephones to have all kinds of new features: Caller ID,
|
||
|
>Return Call, Repeat Calling to get through a busy signal, and more.
|
||
|
>But again, we are having the wool pulled over our eyes. For instance,
|
||
|
>if you take advantage of Call Return in New York (which will call the
|
||
|
>last person who dialed your number), you are charged 75 cents on top
|
||
|
>of the cost of the call itself.
|
||
|
**>Obviously, there is a cost involved when new technologies are introduced.
|
||
|
>But there is no additional
|
||
|
>equipment, manpower, or time consumed when you dial *69 to return a
|
||
|
>call. It's a permanent part of the system. As a comparison, we could
|
||
|
>say that it also costs money to install a hold button. Imagine how we
|
||
|
>would feel if we were charged a fee every time we used it.
|
||
|
|
||
|
The cost of a hold button is paid for all at once in the price of your
|
||
|
phone, and it costs the phone company nothing to maintain. There was
|
||
|
probably a time when hold buttons were a hot new feature and phones
|
||
|
with them cost significantly more.
|
||
|
|
||
|
The tens of millions (I'm guessing) of dollars in electronics and
|
||
|
human labor that went into making SS7 go from an IDEA in some Bellcore
|
||
|
engineer's mind to DESIGN then to PROTOTYPE then to PRODUCTION then to
|
||
|
INSTALLED EQUIPMENT came from somewhere, and those people want their
|
||
|
money back, with interest. So the phone company recoups their cost.
|
||
|
And they do it from those who actually use the SS7 services, which
|
||
|
seems fair. Again, they phone company should not be allowed to make
|
||
|
undue profits off of SS7 services, but merely charging for them is
|
||
|
okay.
|
||
|
|
||
|
There is an issue of information-technology haves and have-nots here
|
||
|
though. If all these cool SS7 options are expensive then only rich
|
||
|
people will be able to afford them easily and middle-class people on
|
||
|
down will have to make decisions about what they'll give up each month
|
||
|
in order to afford the SS7 services. You may not like it, I may not
|
||
|
like it, but that's how capitalism works. Including the cost of SS7 in
|
||
|
basic rates would be unfair to the poor since I suspect they as a
|
||
|
group would be significantly less likely to use the services than the
|
||
|
rich and middle class but would then be paying for the SS7 services
|
||
|
they don't use as well.
|
||
|
|
||
|
>The local companies are not the only offenders but it is
|
||
|
>particularly bad in their case because, for the vast majority of
|
||
|
>Americans, there is no competition on this level.
|
||
|
|
||
|
If they're a monopoly, someone outside their company has to approve
|
||
|
their rate schedule. Mobilize a group, find that someone who regulates
|
||
|
rates, and complain, or write your congressman. If there were
|
||
|
competition, all providers might still charge for SS7 services the
|
||
|
same way since customers choosing a local phone company would probably
|
||
|
be most price sensitive about the basic monthly rate rather than the
|
||
|
bells and whistles. Telcomm-power-users are not a big enough group to
|
||
|
be the bread and butter of you local telco.
|
||
|
|
||
|
It might be that the phone company is getting lots of profits off of
|
||
|
SS7 and using that to subsidize the basic rate for everyone,
|
||
|
effectively shifting some costs from all users to "power-users" of the
|
||
|
phone system. This may or may not be fair, but it is not the same
|
||
|
thing as the phone company ripping you off. Cross-subsidy is a way of
|
||
|
life.
|
||
|
|
||
|
It might also be that since its a new technology, there is a
|
||
|
relatively limited supply of SS7 equipment out there to be bought by
|
||
|
telco's and the installed base of SS7 equipment in your area can only
|
||
|
handle so much usage. Microeconomics 101 Solution: Charge a mint for
|
||
|
the SS7 services and demand will stay manageable despite the wonderful
|
||
|
convenience it offers. Once again, capitalism at work.
|
||
|
|
||
|
>AT&T, MCI, and Sprint all encourage the use of calling cards.
|
||
|
>Yet each imposes a formidable surcharge each and every time they're used.
|
||
|
>there is no extra work necessary to complete a calling card call - at least >
|
||
|
>not on the phone company's part. . . . But billing is accomplished merely by
|
||
|
>computers sending data to each other. . . . Everything is
|
||
|
>accomplished quickly, efficiently, and cheaply by computer. Therefore,
|
||
|
>these extra charges are outdated.
|
||
|
|
||
|
I bet a bunch of phone co. programmers and EE's had to write a lot of
|
||
|
code and design and install networks that upgraded the phone company's
|
||
|
computerized billing system to handle calling cards. See the above
|
||
|
comments on SS7 for what this means. And let's not forget calling card
|
||
|
fraud and the investments in security to control it, an unfortunate
|
||
|
side-effect of offering card-calling. Who should bear that cost? All
|
||
|
customers, or those that use the calling cards? You might say, why
|
||
|
not the employees and shareholders of the phone company for not having
|
||
|
a more secure calling card system? Sometimes they do: phreakers ran
|
||
|
Metrophone out of business if I remember right. But if phone companies
|
||
|
gave individuals pass-numbers that didn't include their phone numbers
|
||
|
and were much harder to memorize, people would either change phone
|
||
|
companies or raise holy hell with the regulatory agency to get them to
|
||
|
undo it. Computerized calling-card identification by voiceprint might
|
||
|
crush toll-fraud, but who is going to pay to design, build, install,
|
||
|
and maintain the system?
|
||
|
|
||
|
Phreakers seem to feel that their consumption of time on phone company
|
||
|
lines and equipment without paying for them is like hackers breaking
|
||
|
in and using otherwise-unused CPU time on some company's computer.
|
||
|
|
||
|
First, I'm not too sure that hackers don't degrade performance of
|
||
|
systems they invade if only by soaking up the labor of system
|
||
|
administrators who could be doing other things besides constantly
|
||
|
updating and improving system security. To which you'd say "we're not
|
||
|
making work for them, we're keeping them from being complacent and
|
||
|
becoming sitting ducks for industrial espionage and malicious
|
||
|
hackers." Maybe so, but you're also taking time away from their
|
||
|
efforts to make their systems faster, more reliable, friendlier, etc.
|
||
|
And what is the Hacker community's record with regard to malicious
|
||
|
hackers who trash companies systems? Do they actively try to find out
|
||
|
these guys and inform on them? I doubt it, although I'd be happy to
|
||
|
learn otherwise. If non-malicious hackers' real purpose is to help
|
||
|
companies to defend themselves against malicious hackers, then they
|
||
|
probably should as a rule inform on malicious hackers.
|
||
|
|
||
|
But is phreaking morally equivalent to hacking? Is it just using
|
||
|
left-over bandwidth, which can be thought of as being like unused CPU
|
||
|
cycles? I don't know. I can imagine scenarios where because of the
|
||
|
additional demand for services created by phreakers, more switching
|
||
|
equipment and programmer-hours have to be bought which might not have
|
||
|
been bought otherwise. And there is still the issue of making work for
|
||
|
phone system admins trying to catch people stealing long distance. Not
|
||
|
to mention making work for the customer service reps who have to
|
||
|
rectify some poor customer's $7000 phone bill. Fooling around with
|
||
|
satellites thousands of people depend on is definitely not ok.
|
||
|
Phreaking at off-times where there's lots of slack in the phone system
|
||
|
and doesn't create pressures for new equipment is more tolerable, but
|
||
|
still creates non-profit-making work for customer service, security,
|
||
|
and sysadmins in reacting to the threat that drives up the company's
|
||
|
operating costs, and, probably, everyone's rates.
|
||
|
|
||
|
>SOCIAL INJUSTICES OF TECHNOLOGY
|
||
|
> The way in which we have allowed public telephones to be operated
|
||
|
>is particularly unfair to those who are economically disadvantaged. A
|
||
|
>one minute call to Washington DC can cost as little as 12 cents from
|
||
|
>the comfort of your own home. However, if you don't happen to have a
|
||
|
>phone, or if you don't happen to have a home, that same one minute
|
||
|
>call will cost you $2.20. That figure is the cheapest rate there is
|
||
|
>from a Bell operated payphone. With whatever kind of logic was used to
|
||
|
>set these prices, the results are clear. We have made it harder and
|
||
|
>more expensive for the poor among us to gain access to the telephone
|
||
|
>network. Surely this is not something we can be proud of.
|
||
|
> A direct result of this inequity is the prevalence of red boxes.
|
||
|
>Red boxes are nothing more than tone generators that transmit a quick
|
||
|
>burst of five tones which convince the central office that a quarter
|
||
|
>has been deposited. It's very easy and almost totally undetectable.
|
||
|
>It's also been going on for decades. Neither the local nor long
|
||
|
>distance companies have expended much effort towards stopping red
|
||
|
>boxes, which gives the impression that the payphone profits are still
|
||
|
>lucrative, even with this abuse. But even more troubling is the
|
||
|
>message this is sending. Think of it. For a poor and homeless person
|
||
|
>to gain access to something that would cost the rest of us 12 cents,
|
||
|
>they must commit a crime and steal $2.20. This is not equal access.
|
||
|
|
||
|
In theory I think you're absolutely right, there shouldn't be this
|
||
|
massive surcharge on LD pay-phone calls. However, it may not be true
|
||
|
that redboxing truly serves to rectify this inequity for those it
|
||
|
hurts the worst. I'd guess that in practice very poor people who can't
|
||
|
afford homes and phones also can't afford hand-held cassette players
|
||
|
either, nor are they good friends with some phreak who will do it for
|
||
|
them on a regular basis, thus the poor aren't in a position to do
|
||
|
redboxing. Redboxing doesn't really do anything about the
|
||
|
price-inequity unless poor folks actually make use of it. Now if the
|
||
|
poor are out of the picture, it looks more like the phreaks are just
|
||
|
mad at the telco for price-gouging and decide to rip off said telco
|
||
|
because of it.
|
||
|
|
||
|
I wonder though: how much of high pay-phone prices are due to the
|
||
|
telco trying to recover losses from payphones due to redboxing?
|
||
|
|
||
|
Call-Sell operations using cloned cellular phones might be better able
|
||
|
to use your argument about compensating for price-inequity than
|
||
|
redboxing since it seems (based on some recent testimony I read) to be
|
||
|
pretty widely available to at least the urban poor on an as-needed
|
||
|
basis. Call-selling has at least a potential a wealth-redistributing
|
||
|
effect from relatively rich legitimate cell-phone users to poor folks
|
||
|
without phones (especially immigrants w/lots of relatives to reach out
|
||
|
and touch back home) and the Call-Sell operators. Note though, to the
|
||
|
extent that call-selling serves middle-class people who already own
|
||
|
phones and not the poor and phoneless it serves merely to redistribute
|
||
|
wealth from the users who use their cell-phones legitimately and the
|
||
|
telco, and transfer it to users who choose not to use their legitimate
|
||
|
phone and to use call-sell service instead, as well as the call-sell
|
||
|
operators. This kind of redistribution cannot rely on social justice
|
||
|
arguments and is just massive toll-fraud.
|
||
|
|
||
|
>CORPORATE RULES
|
||
|
>. . . This puts us at direct odds with many organizations, who believe
|
||
|
>that everything they do is "proprietary" and that the public has no
|
||
|
>right to know how the public networks work. In July of 1992 we were
|
||
|
>threatened with legal action by Bellcore (the research arm of the
|
||
|
>Regional Bell Operating Companies) for revealing security weaknesses
|
||
|
>inherent in Busy Line Verification (BLV) trunks. The information had
|
||
|
>been leaked to us and we did not feel compelled to join Bellcore's
|
||
|
>conspiracy of silence.
|
||
|
|
||
|
See my earlier comments about publishing security holes or sharing
|
||
|
them with hackers before letting the sysadmins have adequate warning
|
||
|
and time to fix the hole. Instant publication of holes is not socially
|
||
|
responsible.
|
||
|
|
||
|
Also, publishing one company's private data can in some cases create a
|
||
|
competitive disadvantage relative to that company's competitors with
|
||
|
real economic effects. If Phrack runs a long series of articles about
|
||
|
"how to hack the new Fujitsu switches", the communications engineer at
|
||
|
BellAtlantic deciding what brand of switch to buy may decide to buy
|
||
|
some other brand of switch besides Fujitsu. And he might be doing this
|
||
|
solely of the publication of those articles makes him think (rightly
|
||
|
or wrongly) that the Fujitsu's switch is more likely to get hacked
|
||
|
into than, say, Northern Telecom's. Phrack has just transferred wealth
|
||
|
from Fujitsu to Northern Telecom and possibly influenced the telco
|
||
|
into buying the less competitive switch (which could wind up
|
||
|
increasing telco operating costs and users' rates) out of fear of
|
||
|
getting hacked.
|
||
|
|
||
|
Moral: not all arguments about the social and commercial value of
|
||
|
keeping proprietary information secret are bogus.
|
||
|
|
||
|
>In April of this year, we were threatened with
|
||
|
>legal action by AT&T for printing proprietary information of theirs.
|
||
|
>The information in question was a partial list of the addresses of
|
||
|
>AT&T offices. It's very hard for us to imagine how such information
|
||
|
>could be considered secret. But these actions are not surprising.
|
||
|
|
||
|
I'd bet money those addresses were sensitive because they would be
|
||
|
very useful to someone trying to con, misrepresent, and
|
||
|
social-engineer their way into the telco's computers. What possible
|
||
|
use there would be to the non-hacker/phreaker member of the public for
|
||
|
obscure telco-bureaucracy addresses and phone #s the phone company
|
||
|
decides not to let out to the general public eludes me.
|
||
|
|
||
|
>This in itself is wrong; a publication must have
|
||
|
>the same First Amendment rights regardless of whether it is printed
|
||
|
>electronically or on paper. As more online journals appear, this basic
|
||
|
>tenet will become increasingly critical to our nation's future as a
|
||
|
>democracy.
|
||
|
|
||
|
I couldn't agree more.
|
||
|
|
||
|
The government promptly dropped its case against
|
||
|
>the publisher who, to this day, is still paying back $100,000 in legal
|
||
|
>fees.
|
||
|
|
||
|
This sucks. The gov't/telco should have had to eat the defense's legal fees.
|
||
|
|
||
|
>As further evidence of the inequity between individual justice
|
||
|
>and corporate justice, Bell South was never charged with fraud for its
|
||
|
>claim that a $14 document was worth nearly $80,000. Their logic, as
|
||
|
>explained in a memo to then Assistant U.S. Attorney Bill Cook, was
|
||
|
>that the full salaries of everyone who helped write the document, as
|
||
|
>well as the full cost of all hardware and software used . . .
|
||
|
|
||
|
The Phrack/E911 case is one of the worst abuses of rights to date.
|
||
|
|
||
|
However, please let my speculate for a moment, working from the assumptions
|
||
|
that
|
||
|
1) The document was not expected to diffuse into the hands of hackers.
|
||
|
The "catalog anyone could order the document from" was, I suspect,
|
||
|
used only by and intended only for vendors and employees.
|
||
|
2) That possession of the E911 document would at least marginally aid
|
||
|
in the efforts of those who were interested in hacking into 911.
|
||
|
|
||
|
Granted, if both #1 and #2 are true then it could mean that BellSouth
|
||
|
had negligent security practices and deserved what it got. It might
|
||
|
also be the case that #2 is simply not true (I just can't say one way
|
||
|
or another due to not having read the document closely and lacking the
|
||
|
knowledge needed to understand the significance of everything was said
|
||
|
in the document). If #2 is false the following argument can be
|
||
|
ignored.
|
||
|
|
||
|
It seems to me that there could be an economic cost to Bell South
|
||
|
*because of the publication of that document in the hacker community*.
|
||
|
If Bellcore has to devote additional resources to beefing up E911
|
||
|
security solely because certain features of the E911 system are now
|
||
|
much more widely known to the hacker community (and thus more likely
|
||
|
to be attacked) than before the publication of the document in Phrack,
|
||
|
then Phrack has done BellSouth economic harm (and may also have
|
||
|
indirectly contributed to the risk of a breach of security in E911
|
||
|
until their new security measures kick in). It think it the case that
|
||
|
protecting the first amendment requires us to ignore such economic
|
||
|
harm and not make it legally actionable, but I believe that the "cost"
|
||
|
to BellSouth of the publication of that document in Phrack was
|
||
|
probably much greater than a few lost sales of the document's physical
|
||
|
incarnation.
|
||
|
|
||
|
The added short-term risk of a breach in 911 security due to the
|
||
|
publication of the document might have slightly more weight against
|
||
|
first-amendment claims but would probably still be outweighed by
|
||
|
freedom of speech. I could imagine a case though, where publication
|
||
|
(especially quiet publication within the hacker community so that the
|
||
|
average telco security person and E911 sysadmin person might not hear
|
||
|
about the publication for a few weeks) of the factory-default
|
||
|
passwords and dialup numbers for E911 computers would be great enough
|
||
|
a risk to public safety as to merit strong punishments and prior
|
||
|
restraint.
|
||
|
|
||
|
I hope the above article has provided some new middle-ground between
|
||
|
anti-establishment and establishment people to stand on and discuss
|
||
|
piracy, hacking and phreaking. I hope also that some hackers and
|
||
|
phreakers will use to above to re-examine wether they are, as claimed,
|
||
|
actually doing society a favor, and if not, how they could change
|
||
|
their ways so as to be a positive force.
|
||
|
|
||
|
Shayne Weyker
|
||
|
weyker@wam.umd.edu
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 25 Mar 94 01:45:40 EST
|
||
|
From: shadow@VORTEX.ITHACA.NY.US(bruce edwards)
|
||
|
Subject: File 3--Lopez's reply to "Rape in Cyberspace"
|
||
|
|
||
|
Andy Lopez demonstrates an all too common deficit of civility in his
|
||
|
critique of Julian Dibbell's Voice article [Cu Digest, #6.21;6.26] --
|
||
|
|
||
|
AL> The December 21, 1993 Village Voice is a case in point. However,
|
||
|
AL> as old Voices aren't normally found outside of fish markets, ...
|
||
|
|
||
|
-- as well as little knowledge of libraries.
|
||
|
|
||
|
To relieve the reader of at-length quoting both of Mr. Dibbell's
|
||
|
article and Mr. Lopez's analysis, I'll try and summarize each:
|
||
|
|
||
|
Dibbell's premise was that acts committed in virtual reality (VR),
|
||
|
acts having no "real life" component themselves, are nonetheless
|
||
|
(virtually) actionable on the ground that said acts have real life
|
||
|
(RL) consequence. He went further by proposing that lessons learned
|
||
|
in VR may be ported to RL. I have seen an RL event unfold much like
|
||
|
the one Mr. Bungle reportedly perpetrated on LamdaMOO. The
|
||
|
perpetrators actions there (child abuse) were not verbal, but
|
||
|
physical. This real life Bungle, too, had reasons why the community
|
||
|
ought not "toad" him, though the toading would have been of the
|
||
|
banishing, not the annihilating sort (the legal processes were already
|
||
|
complete). The community involved agonized in much the same way the
|
||
|
members of LamdaMOO did. In the end, there was no Wizard to act, and
|
||
|
there was little resolution, but there was experience to be archived.
|
||
|
Had these people the previous experience of the players on the MOO at
|
||
|
adjudicating communal threat, I believe that they would have been able
|
||
|
to relate with greater precision to their real life dilemma. This is
|
||
|
the value of simulation, is it not?
|
||
|
|
||
|
Mr. Lopez derides the concept of role-playing VR:
|
||
|
|
||
|
AL> For the blissfully ignorant, a MUD is a Multi-User Dungeon, a
|
||
|
AL> glorified electronic role-playing program. On MUDs such as
|
||
|
AL> LambdaMOO, you can choose your name and appearance and _interact_
|
||
|
AL> <gag> in a digitized world with other characters. Personally, I
|
||
|
AL> find them identical to the old-fashioned, word-based role-playing
|
||
|
AL> games - such as the Dungeons & Dragons abomination - only more
|
||
|
AL> boring and repetitive.
|
||
|
|
||
|
Personally I have played neither, but find Lopez's comments oddly out
|
||
|
of perspective. The cyberspace experience -- email, bulletin boards,
|
||
|
the USENET -- is entirely digitized interactivity. Lopez goes on to
|
||
|
interpret Dibbell's use of netsex as an example of the involvement
|
||
|
MUDers experience in the VR world --
|
||
|
|
||
|
[Dibble:]
|
||
|
"Netsex, tiny-sex, virtual sex - however you name it, in real-life
|
||
|
reality it's nothing more than a 900-line encounter stripped of even
|
||
|
the vestigial physicality of the voice. And yet, as any but the most
|
||
|
inhibited newbie can tell you, it's possibly the headiest experience
|
||
|
the very heady world of MUDs has to offer . . . Small wonder, then,
|
||
|
that a newbie's first taste of MUD sex is often also the first time
|
||
|
she or he surrenders wholly to the slippery terms of MUDish ontology,
|
||
|
recognizing in a full-bodied way that what happens in a MUD-made world
|
||
|
is neither exactly real nor exactly make-believe, but profoundly,
|
||
|
compellingly, and emotionally meaningful."
|
||
|
|
||
|
-- in what seems to me to be an intentionally myopic manner:
|
||
|
|
||
|
AL> [Really incredible. Dibbel almost seems to be saying that the
|
||
|
AL> MUD means so much to people because it's a way to get off. I
|
||
|
AL> stand amazed.]
|
||
|
|
||
|
Of course, Dibbell implies no such thing. He plainly means to say
|
||
|
that a MUD's power is in its ability to invoke an imaginative process
|
||
|
imparting kinesthetic, emotional, and intellectual verity. A MUD may
|
||
|
establish a real -- not a "virtually" real -- web of interconnectivity
|
||
|
among its players. That there is no physical connection (required)
|
||
|
among the parties is certainly no block to genuine experience. If Mr.
|
||
|
Lopez, for example, were to be called intellectually deficient and
|
||
|
disingenuous in his post, and if he were to experience an emotional
|
||
|
reaction as a result of being labeled a dolt, would the fact that his
|
||
|
emotion was generated via cybertext make the experience itself
|
||
|
invalid? Does he say words are without power?
|
||
|
|
||
|
I really can't delve Lopez's difficulty. Is he offended by the
|
||
|
seriousness the players exhibit, by the reality they say suffuses
|
||
|
their MUD? After reading his post several times, it seems only an
|
||
|
exercise to excoriate the idea of fantasy play and belittle Dibbell's
|
||
|
concepts. Is it that the players do not detach from their experience
|
||
|
sufficiently to gain his approval? He lastly proclaims:
|
||
|
|
||
|
AL> Dibbel draws flabbergasting conclusions about the future of
|
||
|
AL> society and he writes about it in this prose:
|
||
|
|
||
|
" . . . the commands you type into a computer are a kind of speech
|
||
|
that doesn't so much communicate as _make_things_happen_, directly and
|
||
|
ineluctably, the same way pulling a trigger does. They are
|
||
|
incantations, in other words, and anyone attuned to the techno-social
|
||
|
megatrends of the moment - from the growing dependence of economies on
|
||
|
the global flow of intensely fetishized words and numbers to the
|
||
|
burgeoning ability of bioengineers to speak the spells written in the
|
||
|
four-letter text of DNA - knows that the logic of the incantation is
|
||
|
rapidly permeating the fabric of our lives."
|
||
|
|
||
|
AL> Just what is needed! Cyberspace is already filled with shysters,
|
||
|
AL> hucksters, idiots, and clowns. Now we start collecting animists.
|
||
|
|
||
|
---
|
||
|
animism (an'uh-mizuhm)
|
||
|
|
||
|
--noun
|
||
|
Belief that natural phenomena and inanimate things have souls.
|
||
|
|
||
|
[< Lat. anima, soul]
|
||
|
---
|
||
|
No reading of Dibbell can support the allegation of animism. Lopez's
|
||
|
article is weak, mean-spirited, and indicative of one of the major
|
||
|
problems (a *real* problem) in cyberspace: when insulated by the
|
||
|
abstractness of this world, people shed their civil reticence. There
|
||
|
is talk here that would not pass in the world with which I am most
|
||
|
familiar, that of the street. I doubt Mr. Lopez would be quite so
|
||
|
free with his language in that instance; but even that restraint,
|
||
|
enforced by threat of immediate physical retaliation, is a lacking
|
||
|
sort of restraint. The real need is for true respect, even in -- no,
|
||
|
particularly in -- disagreement, that of individual for individual,
|
||
|
engendered through recognition of shared humanity. Perhaps finding
|
||
|
that on a MUD, however virtual it may be, is a better start than smug
|
||
|
superiority.
|
||
|
|
||
|
--
|
||
|
bruce edwards - shadow@vortex.ithaca.ny.us
|
||
|
The Total Perspective Vortex BBS, Ithaca, NY
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sat, 26 Mar 94 10:44 WET
|
||
|
From: jwtlai@IO.ORG(GrimJim)
|
||
|
Subject: File 4--Re: Village Voice & Phlogiston
|
||
|
|
||
|
In response to CuD #6.26 ("Village Voice and Phlogiston"):
|
||
|
|
||
|
>"Village Voice Perfects Phlogiston Synthesis in Coverage of Cyberspace"
|
||
|
|
||
|
>by Mr. Badger (Andy Lopez)
|
||
|
|
||
|
>[...] The author [of an article in the Village Voice], Julian Dibbell,
|
||
|
>has been a frequent user of the LambdaMOO, a MUD run inside of Xerox's
|
||
|
>Palo Alto research computer.
|
||
|
|
||
|
>For the blissfully ignorant, a MUD is a Multi-User Dungeon, a
|
||
|
>glorified electronic role-playing program. On MUDs such as LambdaMOO,
|
||
|
>you can choose your name and appearance and _interact_ <gag> in a
|
||
|
>digitized world with other characters. [...]
|
||
|
>What followed can only be understood if you accept that the game is a
|
||
|
>reality, of sorts, for most of its users.
|
||
|
|
||
|
>You might think that the offended parties simply arranged to have the
|
||
|
>offender kicked off the system, [...]
|
||
|
>In short, those who ran the game didn't want to ruin it by taking drastic
|
||
|
>action and those who played the game wanted the user removed. [...]
|
||
|
|
||
|
Yes, it sounds like people take things rather seriously. But the sense
|
||
|
of reality these players express has an analog in the artistic world.
|
||
|
Their behavior can be easily understood in this context.
|
||
|
|
||
|
>This being cyberspace, there were conflicting views.
|
||
|
|
||
|
Replacing "cyberspace" with "a society" reveals the true nature of the
|
||
|
event.
|
||
|
|
||
|
>Why didn't the other users simply use the command that would have
|
||
|
>blotted Mr. Bungle's messages from their screens? Was it really that
|
||
|
>serious anyway?
|
||
|
|
||
|
Using a filter might remove said Bungle from your sight, but it does not
|
||
|
keep Bungle from using his (or her?) coded toy from impersonating you
|
||
|
before a third-party. To use Usenet as an analogy, Bungle performed
|
||
|
the equivalent of forging obnoxious messages in other peoples' names;
|
||
|
many people have taken forged messages quite seriously in the past. It
|
||
|
should be obvious that the main issue actually has little to do with games.
|
||
|
|
||
|
Dibbell's analysis of the situation is incorrect, but so is Badger's
|
||
|
dismissal. By acting out roles, players are investing time and effort in
|
||
|
the creation of characters. It's a cross between acting and literature;
|
||
|
in the former, roles (characters) are made visible to others by
|
||
|
performance; in the latter, the character is revealed through text.
|
||
|
One could say that Bungle disregarded the authors' right to control their
|
||
|
literary creations, their intellectual property. The "social way to
|
||
|
behave" is to be a collaborator with other authors, not to usurp them.
|
||
|
|
||
|
>Where does the body stop and the mind begin? What is the nature of
|
||
|
>reality? The arguments were going in circles during an extended
|
||
|
>meeting of up to thirty - count 'em, thirty - users. In the middle of
|
||
|
>the online babble, Mr. Bungle appeared and offered his defense: He
|
||
|
>was simply experimenting with users' reactions to extreme events.
|
||
|
|
||
|
I think there is a simple guideline to such social games: "If you can't
|
||
|
play by the rules, you can't play the game." I might add that the "I was
|
||
|
just experimenting on you (without your prior knowledge or consent)"
|
||
|
defense has also shown up on Usenet as (poor) explanation for deliberately
|
||
|
offensive posts.
|
||
|
|
||
|
>What followed was the institutionalization of a process whereby users
|
||
|
>could have more input into controlling the MUD. To cap things, Mr.
|
||
|
>Bungle reincarnated as a new, chastened character.
|
||
|
|
||
|
In other words, the rules of the game were changed to handle disruptive
|
||
|
players. A sociological analysis of how the game's society reacted and
|
||
|
adapted to the situation might have been useful, but what can one really
|
||
|
expect out of sensationalist media?
|
||
|
|
||
|
>Dibbell draws flabbergasting conclusions about the future of society [...]
|
||
|
>Cyberspace is already filled with shysters,
|
||
|
>hucksters, idiots, and clowns. Now we start collecting animists.
|
||
|
|
||
|
And cynics, judging from Badger's snide tone.
|
||
|
|
||
|
I found Dibbell's quoted and paraphrased words were often irrelevant.
|
||
|
Alas, the obsession with electronic sex and superficial philosophical
|
||
|
rambling is all too trendy. This "cyberspace" thing isn't about games
|
||
|
or virtual sex, it's about people and the societies they create. Don't
|
||
|
lose track of the message/forest for the medium/trees.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #6.27
|
||
|
************************************
|
||
|
|