583 lines
30 KiB
Plaintext
583 lines
30 KiB
Plaintext
![]() |
|
||
|
|
||
|
****************************************************************************
|
||
|
>C O M P U T E R U N D E R G R O U N D<
|
||
|
>D I G E S T<
|
||
|
*** Volume 1, Issue #1.19 (June 26, 1990) **
|
||
|
** SPECIAL ISSUE: MALICE IN WONDERLAND: THE E911 CHARGES **
|
||
|
****************************************************************************
|
||
|
|
||
|
MODERATORS: Jim Thomas (Sole moderator: Gordon Meyer on vacation)
|
||
|
REPLY TO: TK0JUT2@NIU.bitnet
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views.
|
||
|
--------------------------------------------------------------------
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
|
views of the moderators. Contributors assume all responsibility
|
||
|
for assuring that articles submitted do not violate copyright
|
||
|
protections.
|
||
|
--------------------------------------------------------------------
|
||
|
|
||
|
This issue is the concept outline of one section of a paper to be submitted
|
||
|
to the Midwest Sociological Society's annual meetings in 1991 and will
|
||
|
ultimately be submitted for publication. The intent of the paper is to
|
||
|
develop a discourse analysis of how "social facts" are given "legal
|
||
|
meanings." The saliency of the current crackdown on alleged "computer
|
||
|
crime" seems an excellent way of tapping the clash between new meanings and
|
||
|
old definitions, and how courts become the battlefield for over these
|
||
|
meanings.
|
||
|
This draft is not copy-protected and may be used as appropriate.
|
||
|
The prose and ideas here remain tentative and incomplete, and will be refined.
|
||
|
It is circulated for conceptual, theoretical, and bibliographic
|
||
|
comments.
|
||
|
|
||
|
********************************************************************
|
||
|
|
||
|
|
||
|
|
||
|
THE SECRET SERVICE, E911, AND LEGAL RHETORIC:
|
||
|
MALICE IN WONDERLAND?
|
||
|
|
||
|
|
||
|
Jim Thomas
|
||
|
Department of Sociology
|
||
|
Northern Illinois University
|
||
|
DeKalb, IL 60115
|
||
|
(28 June, 1990)
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
________
|
||
|
Concept outline for larger paper to be submitted at the Midwest
|
||
|
Sociological Society annual meetings, 1991.
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
THE SECRET SERVICE, E911, AND LEGAL RHETORIC:
|
||
|
MALICE IN WONDERLAND?
|
||
|
|
||
|
"When I use a word," Humpty Dumpty said, in rather a scornful
|
||
|
tone, "it means just what I choose it to mean--neither more nor
|
||
|
less."
|
||
|
|
||
|
"The question is," said Alice, "whether you can make words mean
|
||
|
so many different things."
|
||
|
|
||
|
"The question is," said Humpty Dumpty, "which is to be
|
||
|
master--that's all" (Carroll, 1981: 169).
|
||
|
|
||
|
|
||
|
Law is more than simply assuring public order. It is also, as White (1984)
|
||
|
argues, "action with words." The rhetoric of law is played out in the
|
||
|
drama of the courtroom, and the denouement of the play is scripted by the
|
||
|
language of statutory and case law, indictments, and the talk of the
|
||
|
courtroom performers (Nichols, 1990; Thomas, 1983, 1989).
|
||
|
|
||
|
- 1 -
|
||
|
|
||
|
|
||
|
Part of this language game involves a battle over competing definitions,
|
||
|
meanings, and nuances that may be unrelated to "facts," and instead
|
||
|
replaces facts with rhetoric, or a style of persuasion. The language of
|
||
|
indictments and how evidence is presented provides one window through which
|
||
|
to observe this rhetorical battle. Indictments are the means by which a
|
||
|
"bad act" is transformed into a formally sanctionable one by creatively
|
||
|
linking the act to the law that it ostensibly violates. A recent federal
|
||
|
indictment of an alleged computer hacker provides on example (U.S. v. Rigs
|
||
|
and Neidorf, 90-CR-0070, Northern District of Illinois, Eastern Division).
|
||
|
(For a background on the issues involved, see especially Barlow, (1990),
|
||
|
Denning, (1990), Goldstein, (1990), Markoff, (1990), and Schwartz (1990).
|
||
|
|
||
|
This outline is divided into two parts. Section one first presents formal
|
||
|
"indictment talk" and that to which it speaks. The second section, not
|
||
|
included here, will provide a semiotic/deconstructionist analysis.
|
||
|
|
||
|
The indictment begins with a degradation game, one in which the credibility
|
||
|
and character of the defendant is attacked because of a presumed deviant
|
||
|
behavior and association with deviant groups. The goal is to stigmatize
|
||
|
hackers such that prejudicial meanings are imposed. It is a clever
|
||
|
linguistic trick that creates a tautology that defines the guilt of the
|
||
|
defendant by recursing back to the allegation in a manner that produces
|
||
|
linguistic "evidence of guilt." This would be analogous to calling an
|
||
|
alleged murder a "murderer" in court, rather than requiring that the label
|
||
|
must first be demonstrated to be true. In short, the "thing" becomes the
|
||
|
"name:"
|
||
|
- 2 -
|
||
|
|
||
|
|
||
|
|
||
|
5. _Computer Hackers_ - As used here, computer hackers are
|
||
|
individuals involved with the unauthorized access of computer
|
||
|
systems by various means. Computer hackers commonly identify
|
||
|
themselves by aliases or "hacker handles" when communicating with
|
||
|
other hackers.
|
||
|
|
||
|
The rhetoric first attempts to transform the conventional and broader image
|
||
|
of "hacker" into one that is malignant in a way that will allow anyone
|
||
|
associated with the label to be, by definition, stigmatized as a criminal.
|
||
|
Yet, there is considerable evidence that the term does not, in itself,
|
||
|
refer to an illegal activity, and that many who consider themselves
|
||
|
"computer hackers" do not engage in computer trespass, whether unauthorized
|
||
|
or not.
|
||
|
|
||
|
The assumption that all computer hackers are intent on committing criminal
|
||
|
trespass or fraud distorts the nature of the activity. Only the most
|
||
|
extreme examples come to the attention of law enforcement officials and the
|
||
|
public, and this obscures the complexity both of hacking and of the CU. In
|
||
|
its broadest sense, hacking is the dual process of obtaining and using
|
||
|
sufficient mastery of computers and programs to allow resolution of a
|
||
|
computer problem for which no previous knowledge or guidance exists. The
|
||
|
Hacker's Dictionary, a text file widely circulated on BBSs, provides this
|
||
|
definition:
|
||
|
|
||
|
|
||
|
- 3 -
|
||
|
|
||
|
|
||
|
HACKER %originally, someone who makes furniture with an axe% n.
|
||
|
1. A person who enjoys learning the details of programming
|
||
|
systems and how to stretch their capabilities, as opposed to most
|
||
|
users who prefer to learn only the minimum necessary. 2. One who
|
||
|
programs enthusiastically, or who enjoys programming rather than
|
||
|
just theorizing about programming. 3. A person capable of
|
||
|
appreciating hack value (q.v.). 4. A person who is good at
|
||
|
programming quickly. Not everything a hacker produces is a hack.
|
||
|
5. An expert at a particular program, or one who frequently does
|
||
|
work using it or on it; example: "A SAIL hacker". (Definitions 1
|
||
|
to 5 are correlated, and people who fit them congregate.) 6. A
|
||
|
malicious or inquisitive meddler who tries to discover
|
||
|
information by poking around. Hence "password hacker", "network
|
||
|
hacker".
|
||
|
|
||
|
A computer programmer's attempt to help a colleague enter a system when a
|
||
|
password has been lost or forgotten, de-bugging a copyright software
|
||
|
program, or testing a system's security are examples for which a benign
|
||
|
form of hacking is both required and considered acceptable. Nonetheless,
|
||
|
this deceptive definition was successful, for it convinced Judge Nicholas
|
||
|
Bua that the prosecutor's definition was the most common, would be unlikely
|
||
|
to confuse a jury, and was not prejudicial (See Memorandum Order in CuD
|
||
|
1.16).
|
||
|
|
||
|
Another rhetorical ploy in this same passage is the attempt to connect the
|
||
|
use of aliases with deviant activity. Pseudonyms are widely used on BBSs,
|
||
|
and their use reflects a cultural practice including, but hardly limited
|
||
|
to, members of the computer underground. Yet, clever rhetorical twists
|
||
|
distort the cultural meaning and impute to it one totally at odds with
|
||
|
reality by playing on the myth that pseudonyms reflect attempts to hide
|
||
|
"bad acts."
|
||
|
|
||
|
- 4 -
|
||
|
|
||
|
|
||
|
A third rhetorical ploy in this section of the indictment associates the
|
||
|
defendant with a loosely connected group known as "Legion of Doom," which
|
||
|
was a small collection of people who shared technical knowledge between
|
||
|
themselves and others. Without presenting any evidence whatsoever, and
|
||
|
without citing an indictment, on-going case, or justifying the claims, the
|
||
|
indictment asserts that the group was "closely knit" and involved in
|
||
|
disrupting telecommunications, bank fraud and other serious felonious
|
||
|
behavior. Because of its amorphous nature and ambiguous boundaries
|
||
|
defining "affiliation," the indictment's language offers little means to
|
||
|
resist the imposition of its "legal meaning:"
|
||
|
|
||
|
6. _Legion of Doom_ - As used here the Legion of Doom
|
||
|
(LOD) was a closely knit group of computer hackers involved in:
|
||
|
a. Disrupting telecommunications by entering
|
||
|
computerized telephone switches and changing
|
||
|
the routing on the circuits of the computerized
|
||
|
switches.
|
||
|
b. Stealing proprietary computerized information
|
||
|
from companies and individuals.
|
||
|
c. Stealing and modifying credit information on
|
||
|
individuals maintained in credit bureau
|
||
|
computers.
|
||
|
d. Fraudulently obtaining money and property from
|
||
|
companies by altering the computerized
|
||
|
information used by the companies.
|
||
|
e. Sharing information with respect to their
|
||
|
methods of attacking computers with other
|
||
|
computer hackers in an effort to avoid law
|
||
|
enforcement agencies and telecommunication
|
||
|
experts from focusing on them, alone.
|
||
|
|
||
|
|
||
|
- 5 -
|
||
|
|
||
|
|
||
|
The indictment itself focuses on the alleged "theft" and dissemination of
|
||
|
an E911 document from Bell South. Although those close to the case indicate
|
||
|
that only a small portion of a training document was at issue, the language
|
||
|
of the indictment attempts to link this document and its possession and
|
||
|
dissemination to severe threats to the commonweal:
|
||
|
|
||
|
22. It was further part of the scheme that on or about
|
||
|
February 24, 1989 defendant NEIDORF disseminated the disguised E911
|
||
|
text file in issue 24 of "PHRACK" newsletter.
|
||
|
|
||
|
23. It was further part of the scheme that the
|
||
|
defendant NEIDORF would disseminate and disclose this information to
|
||
|
others for their own use, including to other computer hackers who
|
||
|
could use it to illegally manipulate the emergency 911 computer
|
||
|
systems in the United States and thereby disrupt or halt 911 service
|
||
|
in portions of the United States.
|
||
|
|
||
|
Such rhetoric raises the spectre of people dying, and one news story
|
||
|
actually wrote that there was no evidence of any deaths as the result of
|
||
|
the behavior, thus re-inforcing the apparent danger to the public. The
|
||
|
rhetoric sounds serious. But, what in fact is the evidence? The PHRACK
|
||
|
file reprinted here is as it appeared in the original issue. The
|
||
|
indictment indictates it *IS NOT* the same as the one that has allegedly
|
||
|
been stolen, because it has been "edited," "retyped," and "disguised."
|
||
|
|
||
|
- 6 -
|
||
|
|
||
|
|
||
|
--------------------------------------------------------------------
|
||
|
|
||
|
==Phrack Inc.==
|
||
|
|
||
|
Volume Two, Issue 24, File 6 of 13
|
||
|
|
||
|
|
||
|
E911 - Enhanced 911: Features available include selective routing,
|
||
|
selective transfer, fixed transfer, alternate routing, default
|
||
|
routing, Automatic Number Display, Automatic Location
|
||
|
Identification, night service, default routing, call detail
|
||
|
record.
|
||
|
|
||
|
End Office - Telephone central office which provides dial tone to the
|
||
|
subscriber calling 911. The "end office" provides ANI
|
||
|
(Automatic Number Identification) to the tandem office.
|
||
|
|
||
|
Tandem Office - Telephone central office which serves as a tandem (or
|
||
|
hub) for all 911 calls. Must be a 1AESS type of
|
||
|
central office. The tandem office translations
|
||
|
contain the TN/ESN relationships which route the 911
|
||
|
call to the proper SAP. The tandem office looks up
|
||
|
the ANI (TN) that it receives from the end office and
|
||
|
finds the ESN (routing information) which corresponds
|
||
|
to a seven digit number ringing in at a PSAP.
|
||
|
|
||
|
PSAP - Public Safety Answering Point, usually the police, fire and/or
|
||
|
rescue groups as determined by the local municipalities. A
|
||
|
"ringing" will not have ANI or ALI capabilities, but just
|
||
|
receives calls or transferred calls from another PSAP.
|
||
|
|
||
|
ESN - Emergency Service Number (XXX) that is assigned to the
|
||
|
subscriber's telephone number in the tandem office translations
|
||
|
The ESN represents a seven digit number by which the tandem
|
||
|
office routes the call to the proper PSAP. PSAPs with ALI
|
||
|
capabilities also receive a display of the ESN information which
|
||
|
shows which police, fire and rescue agency serves the telephone
|
||
|
number calling 911. An ESN is a unique combination of police,
|
||
|
fire, and rescue service for purposes of routing the E911 call.
|
||
|
|
||
|
ANI - Automatic Number Identification corresponds to the subscriber's
|
||
|
seven digit telephone number. The ANI displays at the PSAP on
|
||
|
the digital ANI display console.
|
||
|
|
||
|
ALI - Automatic Location Identification provides for an address
|
||
|
display of the subscriber calling 911. With ALI, the PSAP
|
||
|
receives the ANI display and an ALI display on a screen. The
|
||
|
ALI display includes the subscriber's address, community, state,
|
||
|
type of service and if a business, the name o the business. The
|
||
|
PSAP will also get a display of the associated ESN information
|
||
|
(police, fire, rescue).
|
||
|
|
||
|
Selective Routing - The capability to route a call to the particular
|
||
|
PSAP serving the address associated with the TN
|
||
|
making the 911 call. Selective routing is
|
||
|
achieved by building TN/ESN translations in the
|
||
|
tandem central office. These translations are
|
||
|
driven by the E911 data base which assign the ESN
|
||
|
to each telephone number based on the customer's
|
||
|
address. Service order activity keeps the E911
|
||
|
data base updated. The E911 data base, in turn,
|
||
|
generates recent change to the tandem office
|
||
|
(through the SCC or RCMAC) to update the TN/ESN
|
||
|
translations in the tandem data base.
|
||
|
|
||
|
Selective Transfer - Provides the PSAP with the ability to transfer
|
||
|
the incoming 911 call to a fire or rescue service
|
||
|
for the particular number calling 911 by pushing
|
||
|
one button for fire or rescue. For example, if
|
||
|
an incoming 911 call was reporting a fire, the
|
||
|
PSAP operator would push the fire button on the
|
||
|
ANI console; the call would go back to the tandem
|
||
|
office, do a lookup for the seven digit number
|
||
|
associated with fire department, for the ESN
|
||
|
assigned to the calling TN, and automatically
|
||
|
route the call to that fire department. This
|
||
|
differs from "fixed" transfer which routes every
|
||
|
call to the same fire or rescue number whenever
|
||
|
the fire or rescue button is pushed. The PSAP
|
||
|
equipment is optioned to provide either fixed or
|
||
|
selective transfer capabilities.
|
||
|
|
||
|
Alternate Routing - Alternate routing provides for a predetermined
|
||
|
routing for 911 calls when the tandem office is
|
||
|
unable to route the calls over the 911 trunks for
|
||
|
a particular PSAP due to troubles or all trunks
|
||
|
busy.
|
||
|
|
||
|
Default Routing - Provides for routing of 911 calls when there is an
|
||
|
ANI failure. The call will be routed to the
|
||
|
"default" ESN associated with the he NNX the caller
|
||
|
is calling from. Default ESNs are preassigned in
|
||
|
translations and are usually the predominant ESN for
|
||
|
a given wire center.
|
||
|
|
||
|
Night Service - Night service works the same as alternate routing in
|
||
|
that the calls coming into a given PSAP will
|
||
|
automatically be routed to another preset PSAP when
|
||
|
all trunks are made busy due to the PSAP closing down
|
||
|
for the night.
|
||
|
|
||
|
Call Detail Record - When the 911 call is terminated by the PSAP
|
||
|
operator, the ANI will automatically print-out on
|
||
|
the teletypewriter located at the PSAP. The
|
||
|
printout will contain the time the call came into
|
||
|
the PSAP, the time it was picked up by an
|
||
|
operator, the operator number, the time the call
|
||
|
was transferred, if applicable, the time the call
|
||
|
was terminated and the trunk group number
|
||
|
associated with the call. Printouts of the ALI
|
||
|
display are now also available, if the PSAP has
|
||
|
purchased the required equipment.
|
||
|
|
||
|
ANI Failure - Failure of the end office to identify the call and
|
||
|
provide the ANI (telephone number) to the tandem office;
|
||
|
or, an ANI failure between the tandem office and the
|
||
|
PSAP.
|
||
|
|
||
|
Misroute - Any condition that results in the 911 call going to the
|
||
|
wrong PSAP. A call can be misrouted if the ESN and
|
||
|
associated routing information are incorrect in the E911
|
||
|
data base and/or tandem data base. A call can also be
|
||
|
misrouted if the call is an ANI failure, which
|
||
|
automatically default routes.
|
||
|
|
||
|
Anonymous Call - If a subscriber misdials and dials the seven digit
|
||
|
number associated with the PSAP position, they will
|
||
|
come in direct and ANI display as 911-0000 which will
|
||
|
ALI as an anonymous call. The seven digit numbers
|
||
|
associated with the PSAP positions are not published
|
||
|
even to the PSAPs.
|
||
|
|
||
|
Spurious 911 Call - Occasionally, the PSAP will get a call that is not
|
||
|
associated with a subscriber dialing 911 for an
|
||
|
emergency. It could be a subscriber who has not
|
||
|
dialed 911, but is dialing another number, or has
|
||
|
just picked up their phone and was connected with
|
||
|
the PSAP. These problems are equipment related,
|
||
|
particularly when the calls originate from
|
||
|
electromechanical or step by step offices, and are
|
||
|
reported by the E911 Center to Network Operations
|
||
|
upon receipt of the PSAP inquiry reporting the
|
||
|
trouble. The PSAP may get a call and no one is
|
||
|
there; if they call the number back, the number
|
||
|
may be disconnected or no one home Again these are
|
||
|
network troubles and must be investigated.
|
||
|
Cordless telephones can also generate "spurious"
|
||
|
calls in to the PSAPs. Generally, the PSAP will
|
||
|
hear conversation on the line, but the subscribers
|
||
|
are not calling 911. The PSAP may report spurious
|
||
|
calls to to repair if they become bothersome, for
|
||
|
example, the same number ringing in continually.
|
||
|
|
||
|
No Displays - A condition where the PSAP ALI display screen is blank.
|
||
|
This type of trouble should be reported immediately to
|
||
|
the SSC/MAC. If all screens at the PSAP are blank, it
|
||
|
is an indication that the problem is in the circuits
|
||
|
from the PSAP to the E911 computer. If more than one
|
||
|
PSAP is experiencing no display, it may be a problem
|
||
|
with the Node computer or the E911 computer. The
|
||
|
SSC/MAC should contact the MMOC to determine the health
|
||
|
of the HOST computer.
|
||
|
|
||
|
Record Not Found - If the host computer is unable to do a look up on a
|
||
|
given ANI request from the PSAP, it will forward a
|
||
|
Record Not Found message to the PSA ALI screen.
|
||
|
This is caused by service order activity for a
|
||
|
given subscriber not being processed into the E911
|
||
|
data base, or HOST computer system problems whereby
|
||
|
the record cannot be accessed at that point in time.
|
||
|
|
||
|
No ANI - This condition means the PSAP received a call, but no
|
||
|
telephone number displayed on the ANI console. The PSAP
|
||
|
should report this condition immediately to the SSC/MAC.
|
||
|
|
||
|
PSAP Not Receiving Calls - If a PSAP cannot receive calls or request
|
||
|
retrieval from the E911 host computer,
|
||
|
i.e., cable cut, the calls into that PSAP
|
||
|
must be rerouted to another PSAP. The
|
||
|
Switching Control Center must be notified
|
||
|
to reroute the calls in the tandem office
|
||
|
E911 translations.
|
||
|
|
||
|
MSAG - Master Street Address Guide. The MSAG ledgers are controlled
|
||
|
by the municipality which has purchased the E911 ALI service,
|
||
|
in that they assign which police, fire or rescue agency will
|
||
|
serve a given street an number range. They do this by
|
||
|
assigning an ESN to each street range, odd, even, community
|
||
|
that is populated in the county or municipality served. These
|
||
|
MSAGs are then used as a filter for service order activity into
|
||
|
the E911 computer data base to assign ESNs to individual TN
|
||
|
records. This insures that each customer will be routed to the
|
||
|
correct agency for their particular address. In a non-ALI
|
||
|
County, TAR codes are used by the Telephone company to assign
|
||
|
ESNs to service conductivity and the County does not control
|
||
|
the ESN assignment. TAR codes represent the taxing authority
|
||
|
for the given subscriber which should correspond to their
|
||
|
police, fire and rescue agencies. The MG method, of course, is
|
||
|
more accurate because it is using the actual service address of
|
||
|
the customer to route the call and provides the county with
|
||
|
more flexibility in assigning fire and rescue district, etc The
|
||
|
Customer Services E911 Group maintains the E911 computer data
|
||
|
base and interfaces with the County (customer) on all MSAG or
|
||
|
data base activity.
|
||
|
___________________________________________________________________________
|
||
|
|
||
|
What in fact is this document? It is simply a partial glossary available
|
||
|
from other sources, and hardly of any technical value. It presents 22
|
||
|
terms, six of which are found in at least one public book (e.g., Ambrosch,
|
||
|
Maher and Sasscer, 1989), and the rest found either in the text of that
|
||
|
work (see esp. Chapter 9) or readily found elsewhere. Further, if this
|
||
|
document can be deciphered as potentially dangerous, then what is one to
|
||
|
make of the Amborsch, Maher and Sasscer volume itself, which not only
|
||
|
provides several hundred definitions, but also includes detailed technical
|
||
|
information and diagrams about the operation, administration, and
|
||
|
functioning of Bell systems? There is nothing in the PHRACK document, or in
|
||
|
any of the so-called "phreak/hacker" magazines that is not available in
|
||
|
more detail from any work found in the classroom or library.
|
||
|
|
||
|
A cursory reading of Ambrosch, Maher, and Sasscer (1989) provides
|
||
|
references to many of these definitions, and we have seen others in the
|
||
|
"chat" section of public BBSs. Below we provide a sample of terms readily
|
||
|
available to the public. Those without a reference are either common terms
|
||
|
or are readily deducible from the referenced items:
|
||
|
|
||
|
Alternate Routing
|
||
|
Anonymous Call
|
||
|
- 14 -
|
||
|
|
||
|
|
||
|
ALI (Glossary, 285; pp 173-175; throughout)
|
||
|
ANI (Glossary, p. 285 and throughout)
|
||
|
ANI Failure
|
||
|
Call Detail Record
|
||
|
Default Routing (referenced on p. 166)
|
||
|
End Office (Standard communications term)
|
||
|
ESN
|
||
|
E911 (Standard definition, ubiquitous)
|
||
|
Misroute
|
||
|
MSAG (Definition found on BBSs)
|
||
|
Night Service
|
||
|
No ANI
|
||
|
No Displays
|
||
|
PSAP (Glossary, p. 287)
|
||
|
PSAP Not Receiving Calls
|
||
|
Record Not Found
|
||
|
Selective Routing (reference on p. 166)
|
||
|
Selective Transfer
|
||
|
Spurious 911
|
||
|
Tandem Office
|
||
|
|
||
|
Despite the banality of these terms, the indictment's discourse was
|
||
|
sufficiently clever to convince Judge Bua that the information was indeed
|
||
|
"valuable," and "confidential," and despite its public availability, is
|
||
|
"property" that deprives Bell South of "something of value." However, the
|
||
|
judge seems taken in by the chicanery of the prosecutor's linguistic
|
||
|
|
||
|
- 15 -
|
||
|
|
||
|
|
||
|
distortion that manipulates the symbols of PHRACK's style to create an
|
||
|
alternative reality that is, at best, questionable. Consider, for example,
|
||
|
the following passage. First assume it appears in a scholarly article
|
||
|
explaining the basic service of E911:
|
||
|
|
||
|
With the non-IN Emergency Response Service (ERS), the caller
|
||
|
dials a special emergency number (very short, usually three
|
||
|
digits) which is uniform within a country, (for example, 911 in
|
||
|
the USA, and in West Germany 110/0110 for police and 112/0112 for
|
||
|
fire or ambulance) (Ambrosch, Maher and Sasscer, 1989: 162).
|
||
|
|
||
|
Now, re-frame the same passage, but preface it with a sentence like: "At
|
||
|
the last hackers' convention, Holly Hackwood described the E911 basic
|
||
|
service like this: (and now re-read the passage)." Is the E911 document
|
||
|
illegal when published in PHRACK (for that is what the indictment charges),
|
||
|
but legal when published in a library book or a research paper? The point
|
||
|
is that it is not only possession of public information that is being
|
||
|
prosecuted, but the manner in which the symbols are packaged.
|
||
|
|
||
|
In CuD 1.17, we cited a California law that makes it a felony to merely
|
||
|
POSSESS certain types of information, whether that information is used or
|
||
|
communicated to others or not. The "crime" of the "hacker" seems to be not
|
||
|
only possession of information freely available to the public, but also of
|
||
|
presenting relatively innocuous information in the discourse of an
|
||
|
anti-establishment ethos. More simply, the "crime" is that of speaking a
|
||
|
different language than law enforcement officials who seem willing to
|
||
|
distort that language with rhetorical ploys of their own.
|
||
|
- 16 -
|
||
|
|
||
|
|
||
|
|
||
|
White (1984) suggests that, in legal discourse, "words lose their meaning"
|
||
|
and that law is as much a language game as it is the application of
|
||
|
statutes and cases to behavior. The resulting danger is that language
|
||
|
becomes a weapon to subvert freedom of speech. In an era when most people
|
||
|
are not "culturally literate" in the nuances of techno-speak, the ease of
|
||
|
distortion puts defendants at risk in bench or jury trials where a common
|
||
|
framework of meaning is intentionally obscured in the battle over symbolic
|
||
|
terrain. In the next section the language of law as reflected in the
|
||
|
indictment will be "deconstructed," and the logic and imagery made more
|
||
|
apparent.
|
||
|
(End this section)
|
||
|
|
||
|
BIBLIOGRAPHY
|
||
|
|
||
|
Ambrosch, W.D., A. Maher and B. Sasscer (Eds.). 1989. The Intelligent
|
||
|
Network: A Joint Study by Bell Atlantic, IBM and Siemens. Berlin:
|
||
|
Springer-Verlag.
|
||
|
|
||
|
Barlow, John Perry. 1990 (forthcoming). "Crime and Puzzlement." The
|
||
|
Whole Earth Review.
|
||
|
|
||
|
Denning, Dorothy. 1990. "Concerning Hackers Who Break into Computer
|
||
|
Systems." Paper presented at the 13th National Computer Security
|
||
|
Conference, Washington, D.C., Oct. 1-4.
|
||
|
- 17 -
|
||
|
|
||
|
|
||
|
|
||
|
Goldstein, Emmanuel. 1990. Editorial Commentary on "Operation Sun Devil."
|
||
|
2600 Magazine, /Spring.
|
||
|
|
||
|
Markoff, John. 1990. "Drive to Counter Computer Crime Aims at Invaders."
|
||
|
The New York Times, /June 3: 1, 21.
|
||
|
|
||
|
Nichols, Lawrence T. 1990 (forthcoming). "Discovering Hutton: Expression
|
||
|
Gaming and Congressional Definitions of Deviance." Pp. *-* in N. Denzin
|
||
|
(ed.), Studies in Symbolic Interaction, Vol. 11. Greenwich (Conn.): JAI
|
||
|
Press.
|
||
|
|
||
|
Thomas, Jim. 1989. Prisoner Litigation: The Paradox of the Jailhouse
|
||
|
Lawyer. Totowa (N.J.), Aldine.
|
||
|
|
||
|
_____. 1983. "Justice as Interaction:: Loose Coupling and Mediations in
|
||
|
the Adversary Process." Symbolic Interaction, 6(Fall): 243-260.
|
||
|
|
||
|
White, James Boyd. 1984. When Words Lose their Meaning: Constitutions and
|
||
|
Reconstructions of Language, Character, and Community. Chicago: University
|
||
|
of Chicago Press.
|
||
|
|
||
|
|
||
|
|
||
|
!
|