941 lines
50 KiB
Plaintext
941 lines
50 KiB
Plaintext
![]() |
|
|||
|
-----------------------------------------------------------
|
|||
|
WAREZ WARS:
|
|||
|
For the Inner Circle, cracking software is a challenge.
|
|||
|
|
|||
|
For the wannabe underground, collecting it is an
|
|||
|
obsession. For the software industry, it's a billion-dollar
|
|||
|
nightmare.
|
|||
|
-----------------------------------------------------------
|
|||
|
|
|||
|
By David McCandless
|
|||
|
|
|||
|
Sunday morning, 7 a.m., somewhere in US Eastern Standard
|
|||
|
Time: Mad Hatter gets up, has a glass of Seagram's Ginger
|
|||
|
Ale and a cigarette, and checks his machine, which has been
|
|||
|
running automated scripts all night. He looks for errors and
|
|||
|
then reads his email. He has 30 messages from all over the
|
|||
|
world: some fan mail, a couple of flames, a few snippets of
|
|||
|
interesting information, three or four requests - some clear,
|
|||
|
some PGP-encoded. After a quick espresso and another
|
|||
|
cigarette, he surveys the contents of a few private FTP sites,
|
|||
|
filters through a bunch of new files, and then reroutes the good
|
|||
|
stuff to his newsreader. After breakfast with the family,
|
|||
|
another wave of automated scripts kicks in. The ISDN
|
|||
|
connection hums to life. A steady stream of bytes departs his
|
|||
|
machine 128 Kbps and vanishes into the ether. By the end of
|
|||
|
the day Mad Hatter, a ringleader of the software piracy group
|
|||
|
called the Inner Circle, will have poured 300 Mbytes of illegal
|
|||
|
"warez" onto the Internet.
|
|||
|
|
|||
|
Monday morning, 9 a.m., Greenwich Mean Time: Phil arrives
|
|||
|
for work in Bracknell, England, in a suit and tie, just back from
|
|||
|
a few days in Switzerland. Inside Novell UK's glossy five-story
|
|||
|
headquarters, he lets himself into his office. It looks like a
|
|||
|
mad, bad bedroom - shiny desktops and derelict ones,
|
|||
|
disemboweled minitowers and battered servers, every last
|
|||
|
expansion slot distended with DAT machines, CD-ROM
|
|||
|
burners, extra hard drives. A metal shelf unit contains a rack
|
|||
|
of monitors, some video equipment, spare keyboards.
|
|||
|
Everything is wired insanely to a single ISDN line. After a
|
|||
|
coffee, Phil boots up and skims his email. Twenty minutes
|
|||
|
later he has ceased to be Phil. For the next week, he will
|
|||
|
pretend to be a trader, a courier, a cracker, a newbie, a
|
|||
|
lamer, a lurker, a leecher. He is an undercover Internet
|
|||
|
detective, a "technical investigator." He spends his days
|
|||
|
roving the Net, finding people like Mad Hatter - and busting
|
|||
|
them.
|
|||
|
|
|||
|
This is a story about a universe with two parallel, overlapping
|
|||
|
worlds. One is the familiar, dull world of the software industry,
|
|||
|
with its development costs, marketing teams, profit, and loss.
|
|||
|
Phil's world, at least part of the day.
|
|||
|
|
|||
|
And then there is warez world, the Mad Hatter's world, a
|
|||
|
strange place of IRC channels and Usenet groups, of thrills,
|
|||
|
prestige, and fear. A world of expert crackers who strip the
|
|||
|
protection from expensive new software and upload copies
|
|||
|
onto the Net within days of its release. A world of wannabes
|
|||
|
and collectors, whose hard drives are stuffed like stamp
|
|||
|
albums, with programs they'll never use. And a world of profit
|
|||
|
pirates, who do exactly what the software makers say: rip off
|
|||
|
other people's stuff and sell it for their own benefit.
|
|||
|
|
|||
|
In Phil's world, software is a valuable tool that commands high
|
|||
|
prices - programs like QuarkXPress, Windows NT, and
|
|||
|
AutoCAD, costing thousands of dollars a shot. But in Mad
|
|||
|
Hatter's world, those sticker prices means nothing - except
|
|||
|
inasmuch as more expensive programs are harder to crack,
|
|||
|
and that makes them the most desirable, spectacular trophies
|
|||
|
of all.
|
|||
|
|
|||
|
In Phil's world, warez are a menace. In warez world, Phil is.
|
|||
|
|
|||
|
------------
|
|||
|
Filthy lucre
|
|||
|
------------
|
|||
|
|
|||
|
Phil's world is full of nasty numbers. Antipiracy organizations
|
|||
|
like the Software Publishers Association and Business
|
|||
|
Software Alliance estimate that more than US$5 million worth
|
|||
|
of software is cracked and uploaded daily to the Net, where
|
|||
|
anyone can download it free of charge. A running scoreboard
|
|||
|
on the BSA Web site charts the industry's losses to piracy:
|
|||
|
$482 a second, $28,900 a minute, $1.7 million an hour, $41.6
|
|||
|
million a day, $291.5 million a week. A lot of that is
|
|||
|
garden-variety unlicensed copying and Far East-style
|
|||
|
counterfeiting. But an estimated one-third leaks out through
|
|||
|
warez world, which can be anywhere there's a computer, a
|
|||
|
phone, and a modem.
|
|||
|
|
|||
|
This is bad news for the business. Think of the lost revenue!
|
|||
|
The lost customers! "It's a frightening scenario out there,"
|
|||
|
says Martin Smith, Novell's product-licensing manager for
|
|||
|
Europe, the Middle East, and Africa. "We are seeing a very,
|
|||
|
very rapid development of crime on the Internet."
|
|||
|
|
|||
|
He's not being paranoid: look at the thousands of messages
|
|||
|
that pour through alt.binaries.warez.ibm-pc and the other
|
|||
|
Usenet sites that are the warez world's pulsing heart. In a
|
|||
|
typical week, you'll see Microsoft Office Pro and Visual C++,
|
|||
|
Autodesk 3D Studio MAX, SoftImage 3D, SoundForge,
|
|||
|
Cakewalk Pro Audio, WordPerfect, Adobe Photoshop 4.0 -
|
|||
|
virtually every high-end package in existence. All this plus
|
|||
|
impossibly early betas and alphas. Add a smattering of
|
|||
|
mundane Web tools, Net apps, registered shareware,
|
|||
|
games, and utilities, and you have everything for the
|
|||
|
forward-looking computer user.
|
|||
|
|
|||
|
Warez world's volumes are impressive, too - a good 65
|
|||
|
Mbytes a day of freshly cracked, quality new releases,
|
|||
|
chopped into disk-sized portions (to make it from one hop to
|
|||
|
the next without clogging the servers), compressed, and
|
|||
|
uploaded. Postings can vary from a few bytes (for a crack) to
|
|||
|
hundreds of megabytes. The nine main warez sites alone
|
|||
|
account for 30 to 40 percent of the traffic on Usenet, an
|
|||
|
average of more than 500 Mbytes in downloads every 24
|
|||
|
hours, according to OpNet.
|
|||
|
|
|||
|
Bad news indeed for Phil and his friends, gazing at those
|
|||
|
endless dollar signs. But warez world's leading citizens say
|
|||
|
that filthy lucre is beside the point - at least for them and the
|
|||
|
hungry collectors they supply.
|
|||
|
|
|||
|
"No money ever exchanges hands in our forum," says
|
|||
|
California Red, one of a half dozen of the Mad Hatter's Inner
|
|||
|
Circle colleagues gathered for an IRC chat.
|
|||
|
|
|||
|
"We're on the nonprofit side of the warez feeding chain,"
|
|||
|
insists another, TAG (The Analog Guy).
|
|||
|
|
|||
|
"It's a trade. You give what you have, get something you need.
|
|||
|
No money needed," adds Clickety.
|
|||
|
|
|||
|
"We're not in it for the money. I would never sell something I
|
|||
|
got from warez," California Red reiterates.
|
|||
|
|
|||
|
"Never made a dime," says Mad Hatter.
|
|||
|
|
|||
|
Even Phil admits these are not the people responsible - not
|
|||
|
directly, anyhow - for the 500-Mbyte, $50 bundled software
|
|||
|
CD-ROMs from Asia that are the industry's most prominent
|
|||
|
nightmare. Warez crackers, traders, and collectors don't
|
|||
|
pirate software to make a living: they pirate software because
|
|||
|
they can. The more the manufacturers harden a product, with
|
|||
|
tricky serial numbers and anticopy systems, the more fun it
|
|||
|
becomes to break. Theft? No: it's a game, a pissing contest;
|
|||
|
a bunch of dicks and a ruler. It's a hobby, an act of bloodless
|
|||
|
terrorism. It's "Fuck you, Microsoft." It's about having
|
|||
|
something the other guy doesn't. It's about telling him that you
|
|||
|
have something he doesn't and forcing him to trade
|
|||
|
something he has for something you don't.
|
|||
|
|
|||
|
In other words, it's an addiction. Listen to a typical dialog on
|
|||
|
an IRC warez trading channel:
|
|||
|
|
|||
|
"What you got?"
|
|||
|
|
|||
|
"Cubase three."
|
|||
|
|
|||
|
"What's that?"
|
|||
|
|
|||
|
"A music program."
|
|||
|
|
|||
|
"I got it. What else?"
|
|||
|
|
|||
|
"No, but it's Cubase three-oh-three - the latest bugfix."
|
|||
|
|
|||
|
"Shit. Gimme."
|
|||
|
|
|||
|
"It's not a patch. It's another seven meg download."
|
|||
|
|
|||
|
"Don't care. I want it."
|
|||
|
|
|||
|
Warez traders scour the newsgroups every night, planting
|
|||
|
requests, downloading file parts they don't need. Warezheads
|
|||
|
feel unfulfilled unless they've swelled their coffers by at least
|
|||
|
one application a day. They don't need this Java
|
|||
|
Development Kit tool, or that Photoshop plug-in - the thrill is in
|
|||
|
creating the new subdirectory and placing the tightly packed
|
|||
|
and zipped file cleanly, reverently, into the collection. They
|
|||
|
may even install it. Then toy absentmindedly with its toolbars
|
|||
|
and palettes before tucking it away and never running it again.
|
|||
|
|
|||
|
Look at Michael, an 18-year-old warez junkie who's also into
|
|||
|
weight lifting. In the evenings, while his friends pursue women,
|
|||
|
he's either at the gym or home at his machine, combing the
|
|||
|
planet for the latest dot releases of 3D Studio MAX. "I bought
|
|||
|
a Zip drive so I could store it all. The SoftImage rip is 20
|
|||
|
disks. It took me three months to get the entire set." A
|
|||
|
directory called WAREZ on his D:/ drive has $50,000 worth of
|
|||
|
cracked software, more than any one person could ever use,
|
|||
|
ludicrous amounts of applications. The more high-end and
|
|||
|
toolbar-tastic the app, the better. Without technical support or
|
|||
|
manuals, he hasn't a clue how to use most of it. But it's there
|
|||
|
and will stay there. "Warez give you a weird kind of feeling,"
|
|||
|
he says. "You end up collecting programs you don't need and
|
|||
|
never use. Just so you can say, 'I've got this or I've got that.' Or
|
|||
|
'My version of Photoshop is higher than yours.'"
|
|||
|
|
|||
|
Mad Hatter knows the feeling. "It's an obsessive game. We
|
|||
|
see it every day - people begging for something to 'finish their
|
|||
|
collection.'" He's not much better himself. "When I was out of
|
|||
|
work on disability, I was totally motivated by the thrill of
|
|||
|
massive uploads, uploading at least 40 Mbytes a day for four
|
|||
|
months straight." Fellow Inner Circle member Clickety used to
|
|||
|
spend 12 hours a day online until college got "awful heavy."
|
|||
|
Another, Abraxas, spends 6 to 10 hours online on weekdays,
|
|||
|
12 to 16 on weekends. But Mad Hatter - who runs the
|
|||
|
semi-tongue-in-cheek, semi-poker-faced discussion group
|
|||
|
alt.support.warez.recovery - is making progress: he's down to
|
|||
|
30 Mbytes a day. "My computer is online 24 hours a day," he
|
|||
|
says. "A warez pirate is always online."
|
|||
|
|
|||
|
-------
|
|||
|
As gods
|
|||
|
-------
|
|||
|
|
|||
|
For Joe Warez Addict at the end of the cracked software food
|
|||
|
chain, membership in a group like the Inner Circle is the
|
|||
|
ultimate collectible. A way to legitimize their addiction, work
|
|||
|
for the common good, and, of course, get a nice fresh supply
|
|||
|
of warez. The drug addict becomes dealer. A sizable chunk of
|
|||
|
Mad Hatter's daily mail is begging letters.
|
|||
|
"I hope that if I ask this question, you will not be offended in
|
|||
|
any way. But can I join the Inner Circle? I mean, I respect the
|
|||
|
Inner Circle ... but never got a chance to join it. I was just
|
|||
|
wondering, can I? Please mail me back ASAP."
|
|||
|
|
|||
|
Needless to say, this lone obsessive didn't get his chance.
|
|||
|
Joining the Inner Circle is nigh on impossible. Reaching its
|
|||
|
members, though, is easy enough. They keep a high profile,
|
|||
|
both in posting files on Usenet and flaming lamers. When I
|
|||
|
first tried to contact them I thought that they weren't so good at
|
|||
|
answering email, but it turned out their provider had just been
|
|||
|
taken offline for illegal spamming. They relocated en masse,
|
|||
|
and my mail had been lost in transit. So I posted a message
|
|||
|
to one of their newsgroups, made sure it was correctly
|
|||
|
labeled, politely worded, and not crossposted (a cardinal sin
|
|||
|
anywhere on Usenet). A reply arrived within eight hours. Mad
|
|||
|
Hatter was more than happy to talk, but not on the phone, not
|
|||
|
in person, and not on conventional IRC. "It has a bit of a habit
|
|||
|
of advertising my IP address," he said. He and six other Inner
|
|||
|
Circle members set up their own IRC server, configured a
|
|||
|
secret channel, and arranged a mutually convenient time for a
|
|||
|
live interview. We met and talked for nine hours, in the bizarre
|
|||
|
overlapping conversational style of IRC. They were frank and
|
|||
|
open, friendly and articulate - and, like any new start-up,
|
|||
|
flattered by the attention.
|
|||
|
|
|||
|
A 17-strong force, the Inner Circle has its own iconography
|
|||
|
and its own ideals. Its members are warez gods. They
|
|||
|
preach, police, advise, flame. Their commandments? Good
|
|||
|
manners, good use of bandwidth, and good warez. Give unto
|
|||
|
others as you would have them give unto you. When the Inner
|
|||
|
Circle is not sourcing warez from secret sites, its members
|
|||
|
are hunting and gathering from more conventional sources.
|
|||
|
Clickety borrows fresh stuff from his clients. A few have
|
|||
|
attended Microsoft Solution seminars. "Some of us are actual
|
|||
|
beta testers, too," says Mad Hatter. "That's got to be scary for
|
|||
|
the developers." One way or another, they help maintain the
|
|||
|
steady flow of warez onto Usenet. From there, various
|
|||
|
wannabes, lamers, and aspirants copy their work to countless
|
|||
|
BBSes, FTP sites, and Web pages.
|
|||
|
|
|||
|
These are not pimply teenagers devoid of social life and
|
|||
|
graces, little ferrets who talk in bIFF text and make napalm out
|
|||
|
of soap and lightbulbs; they're not downloading porn or being
|
|||
|
careful not to wake their parents or spelling "cool" as "kewl."
|
|||
|
According to the interviews I conducted, not one member is
|
|||
|
younger than 20; Clickety-Clack is the youngest at 23. Most
|
|||
|
are 30-plus. Champion uploader Digital has been happily
|
|||
|
married for 22 of his 46 years. Most are well-adjusted white
|
|||
|
males with day jobs and thoroughly nuclear families. Founding
|
|||
|
member Abraxas has three kids, one over 18. Mad Hatter
|
|||
|
runs a small business from home. Technical guru TAG is a
|
|||
|
computer animator. Irrelevant maintains commercial real
|
|||
|
estate. They're spread all over the United States. A few are
|
|||
|
concentrated around Orlando, Florida. Two or three others
|
|||
|
are California-based. For obvious reasons, that's as precise
|
|||
|
as they like to get.
|
|||
|
|
|||
|
The Inner Circle was born of a sense of outrage that their
|
|||
|
beloved pirate-wares newsgroups were going to pot. Warez
|
|||
|
had been around for more than a decade, but the growth of
|
|||
|
the Internet was bringing clueless newbies onto the boards.
|
|||
|
Warez needed a code of ethics and a group of leaders to set
|
|||
|
some examples. The leaders would be the best crackers -
|
|||
|
some of whom became the Inner Circle.
|
|||
|
|
|||
|
"We took over alt.binaries.pictures.leek in early '96," explains
|
|||
|
Abraxas, "and then leaked the first Nashville [Windows 97]
|
|||
|
beta. The groups were being overrun by clueless people.
|
|||
|
They needed help. They were wasting Internet resources.
|
|||
|
Perhaps if we could encourage responsible use of the
|
|||
|
available bandwidth, the whole Usenet warez 'scene' might
|
|||
|
last a while longer. Warez was around before we were, and
|
|||
|
will be after, but we wanted to help people and preserve
|
|||
|
resources using common sense."
|
|||
|
|
|||
|
As enforcers of the warez code, the Inner Circle can be swift
|
|||
|
and sure. In April 1996, a pirate gang called Nomad,
|
|||
|
convinced that posts to warez groups were being
|
|||
|
suppressed, decided to get themselves some unsupervised
|
|||
|
elbow room. They selected an antiwork newsgroup -
|
|||
|
alt.binaries.slack, relatively empty and off the beaten track -
|
|||
|
where software could be slipped past news providers who
|
|||
|
had firewalled the usual warez forums. Within 24 hours, the
|
|||
|
forum was flooded with the latest releases. The slackers
|
|||
|
bestirred themselves from their apathy and fought back,
|
|||
|
posting files that told the pirates politely to push off. The warez
|
|||
|
kept coming. Then the Inner Circle waded in on the slackers'
|
|||
|
side and castigated the invaders for their poor manners. The
|
|||
|
pirates left meekly - though as a parting gift, one of them
|
|||
|
posted Microsoft NT, Beta 3, all 48 Mbytes of it, in 5,734
|
|||
|
parts. The slackers' newsfeed was clogged for days.
|
|||
|
|
|||
|
A slightly disturbing revelation came out of the slacker
|
|||
|
invasion. "After the first attempted takeover, we discovered
|
|||
|
just how scary search engines like Deja News and AltaVista
|
|||
|
were," explains TAG. "You could dig up real email addresses
|
|||
|
pretty easy on about 75 percent of people posting warez." A
|
|||
|
worried TAG hacked into the code of Forte Agent, an industry
|
|||
|
standard newsreader already cracked to bypass the
|
|||
|
shareware cripples, and stripped away the X-newsreader
|
|||
|
header, giving posters far greater anonymity. As a side effect,
|
|||
|
the patch also reduced email spams by two-thirds. "The hack
|
|||
|
went over so well with even nonwarez people that Forte
|
|||
|
eventually incorporated it into Agent as a feature," TAG says
|
|||
|
proudly, "although I don't think they'll be giving us credit."
|
|||
|
|
|||
|
By mid-'96, Mad Hatter decided that police work was getting
|
|||
|
to be too much of a chore. The newsfeed was being clogged
|
|||
|
by lamers, requesters, and partials posters with
|
|||
|
"room-temperature IQs." Those genuinely into warez were
|
|||
|
seeing less and less complete software uploaded; in its place
|
|||
|
were hundreds of stray disks and clammy begging posts. In a
|
|||
|
rare fit of pique, Mad Hatter took his revenge.
|
|||
|
|
|||
|
"If I continue to see the 'here's what I have' threads," he wrote,
|
|||
|
"I will stop uploading here. I will not help and will laugh my ass
|
|||
|
off that everyone is suffering. If for some reason you doubt that
|
|||
|
I make a difference, it's your loss, as I personally have
|
|||
|
uploaded 85 percent of all the shit that's getting posted now
|
|||
|
when it was zero day or still fresh. Keep fighting over stale shit
|
|||
|
- I like to watch; keep posting partials, and I'll stop upping my
|
|||
|
100 to 300 Mbytes a week. In fact, I think I'll stop now."
|
|||
|
|
|||
|
And stop the Inner Circle did. "We became burnt out on
|
|||
|
educating the masses," Mad Hatter says. Instead, a range of
|
|||
|
guaranteed lamer-free encrypted newsgroups was created
|
|||
|
for posting PGP-encoded warez, for Inner Circle-approved
|
|||
|
members only. Those on the select interested-parties list are
|
|||
|
given the codes to unlock the software, and anyone can apply
|
|||
|
to join. Requirement: a reasonable knowledge of PGP.
|
|||
|
"Hopefully this is a sign you won't be totally incompetent if you
|
|||
|
choose to post," says TAG. At the last count, the IPL had 500
|
|||
|
subscribers, happily trading warez under the protection of the
|
|||
|
latest in antilamer technology.
|
|||
|
|
|||
|
-----------
|
|||
|
New economy
|
|||
|
-----------
|
|||
|
|
|||
|
Warez on Usenet are basically gifts - testimony to the power
|
|||
|
and stature of the giver. Files are posted for all to download,
|
|||
|
free. Just fire up your newsreader, point it at an appropriate
|
|||
|
forum, and a list like a home-shopping catalog of the latest
|
|||
|
software spills down your screen. There is no pressure, but if
|
|||
|
you download and you like the vibe, you are expected to join
|
|||
|
the community and contribute uploads whenever possible.
|
|||
|
|
|||
|
On the freewheeling IRC chat forums, warez are no longer
|
|||
|
gifts - they're trade goods. The rewards are greater, but
|
|||
|
you've got to work for them. The IRC channels are 24-hour
|
|||
|
stock exchanges cum street markets: FreeWarez, Warez96,
|
|||
|
Warez4Free, WarezSitez, WarezAppz, and WarezGamez.
|
|||
|
There are private channels, hidden areas, and invite-only
|
|||
|
piracy parties. And there are no free lunches - every piece of
|
|||
|
software has to be paid for, in software. The more recent the
|
|||
|
application, the higher its value. The ultimate bartering tools
|
|||
|
are zero-day warez - software released by a commercial
|
|||
|
house in the last 24 hours, cracked if necessary and
|
|||
|
uploaded. The prizes for good zero-day warez vary; you may
|
|||
|
get instant download status on a particular server, logins and
|
|||
|
passwords for exclusive FTP sites, or admission to the ranks
|
|||
|
of a powerful cartel like the Inner Circle.
|
|||
|
|
|||
|
"Zero-day sites are very <20>lite stuff," explains paid-up <20>litist
|
|||
|
TAG. "People can get access only if they can move a few
|
|||
|
hundred Mbytes a day. Most are invite only. The average IRC
|
|||
|
warez trader doesn't get that kind of access unless he puts a
|
|||
|
lot of effort into it." Zero-day warez trading is a fraught
|
|||
|
business; competition between groups often leads to
|
|||
|
malpractice. "You get a lot of first releases with bad cracks,"
|
|||
|
says TAG, "just so someone can say they released first. Then
|
|||
|
two days later, you get a working crack. We get most of our
|
|||
|
freshest stuff from private FTP and courier drop sites."
|
|||
|
|
|||
|
If your software collection is more mundane, you can trade
|
|||
|
one piece directly for another. But with so many unpoliced
|
|||
|
egos in one place, this can be risky. People will often welsh
|
|||
|
on deals, allowing you to pass them a file and then
|
|||
|
disappearing into the ether. Cunning traders will barter with
|
|||
|
"trojans" - zipped-up files of gunk, realistic enough to carry out
|
|||
|
half the transaction. In extreme cases, someone may feed you
|
|||
|
a virus.
|
|||
|
|
|||
|
A step down from zero-day warez are drop sites, where fresh
|
|||
|
cracks can be found for the cost of a download. Some drop
|
|||
|
sites run on the trader's own machine; others piggyback on
|
|||
|
government or corporate mainframes, shareware mirrors, and
|
|||
|
university networks. Often they're only in existence for 24
|
|||
|
hours, or on weekends when the sysops are at home.
|
|||
|
|
|||
|
Wherever you end up, you'll be struck by the extreme
|
|||
|
politesse and measured courtesy, united by a common
|
|||
|
language. "Greets m8. Have appz, gamez and crackz on
|
|||
|
129.102.1.3. Looking for Pshop 4.0 beta. L8ter." "Have 1.5
|
|||
|
gigs of warez on anonymous T1. Upload for leech access. /
|
|||
|
me for more info. No lamers."
|
|||
|
|
|||
|
----------
|
|||
|
Real money
|
|||
|
----------
|
|||
|
|
|||
|
Back in Phil's world, they can't quite cope with the idea of this
|
|||
|
ferocious brag-driven barter economy cloaked in courtesy.
|
|||
|
The SPA and the BSA just don't believe it. "Considering the
|
|||
|
amount of time they dedicate, they must be making a return to
|
|||
|
justify it," says Phil.
|
|||
|
|
|||
|
Casual observers of the BSA's Web site may well be
|
|||
|
convinced, if only because they're stunned by the money that's
|
|||
|
involved - or seems to be. Fifteen point five billion dollars a
|
|||
|
year! But those figures are based on the assumption that if
|
|||
|
piracy were stopped, someone would be willing to pay for
|
|||
|
every pirated copy in circulation.
|
|||
|
|
|||
|
"Billions of dollars?" scoffs East London BBS operator Time
|
|||
|
Bandit. "I know guys who have thousands and thousands of
|
|||
|
pounds worth of software, but the values are meaningless.
|
|||
|
Win95 may cost, like, <20>75 in the shops, but in warez, it's
|
|||
|
worthless. It's just another file that you might swap for another
|
|||
|
program, which might cost four grand. How much it costs in
|
|||
|
real money is meaningless."
|
|||
|
|
|||
|
How do you ram home sales figures and quarterly losses to a
|
|||
|
bunch of teenagers who see warez trading as their passport
|
|||
|
to acceptance on the scurrilous side of a brave new world?
|
|||
|
How do you convince middle-aged men who see
|
|||
|
incandescently expensive software as monopoly money in a
|
|||
|
vast, global boardgame that what they're doing is "harmful"?
|
|||
|
In the software industry's latest campaign, you scare them - or
|
|||
|
try. The BSA's mandate used to be "not to capture pirates,
|
|||
|
but to eradicate piracy." Now exemplary punishment is the big
|
|||
|
thing.
|
|||
|
|
|||
|
To do that, the BSA and the SPA are willing to push the law to
|
|||
|
its limits. Prosecuting clear offenders - warez-vending BBS
|
|||
|
operators and FTP-site pirates, for instance - is one thing;
|
|||
|
suing ISPs for carrying Web pages containing pirate links and
|
|||
|
cracks is another. A typical case was against C2Net, a
|
|||
|
Buffalo, New York-based ISP that the SPA sued for doing just
|
|||
|
that. In what smacked of a token prosecution - or, in the words
|
|||
|
of C2Net's president, Sameer Parekh, "legal terrorism" - the
|
|||
|
action by Adobe, Claris, and Traveling Software, under the
|
|||
|
aegis of the SPA, held the provider responsible as
|
|||
|
"publishers" for the contents of its server, and for the activities
|
|||
|
of individual account holders. The SPA eventually backed off
|
|||
|
but threatens to revive the suit if C2Net and other ISPs don't
|
|||
|
agree to monitor their users for copyright infringement. C2Net
|
|||
|
says it will not give in to litigious "bullying."
|
|||
|
|
|||
|
And then there are straightforward busts. On January 12,
|
|||
|
1996, Microsoft and Novell jointly announced a settlement
|
|||
|
with Scott W. Morris, who was "doing business as the
|
|||
|
Assassin's Guild BBS ... billed ... as the worldwide
|
|||
|
headquarters for two large pirate groups, Pirates With
|
|||
|
Attitude (PWA) and Razor 1911." According to the statement,
|
|||
|
"marshals seized 13 computers, 11 modems, a satellite dish,
|
|||
|
9 gigabytes of online data, and over 40 gigabytes of offline
|
|||
|
data storage dating back to 1992.... Mr. Morris agrees to
|
|||
|
assist Microsoft and Novell in their continuing BBS
|
|||
|
investigations."
|
|||
|
|
|||
|
Phil, our undercover Internet detective, wasn't responsible for
|
|||
|
that particular drama, but he's been integral to others. His
|
|||
|
latest victory was in Z<>rich - "a landmark case against
|
|||
|
individuals and organizations distributing unlicensed software
|
|||
|
on the Internet," he calls it. A 27-year-old computer technician
|
|||
|
who helpfully called himself "The Pirate" was running an FTP
|
|||
|
site filled to the brim with warez, including US$60,000 worth
|
|||
|
of unlicensed Novell software. Phil, impersonating a trader,
|
|||
|
infiltrated the site (admittedly no great feat), collected
|
|||
|
evidence, then handed it over to the Swiss police. He
|
|||
|
accompanied them on the raid to ensure no evidence was
|
|||
|
damaged. "He was one of a new breed who advertise on the
|
|||
|
Internet," says Phil. "He made his files available via email
|
|||
|
requests and telnet." Swiss police also raided the home of a
|
|||
|
BBS called M-E-M-O, run by "The Shadow," a friend of The
|
|||
|
Pirate. Unfortunately, The Shadow was on holiday with his
|
|||
|
parents. The family returned two weeks later to find their front
|
|||
|
door broken down; the son was arrested. If convicted, the
|
|||
|
young pirates face up to three years in jail and possible
|
|||
|
$80,000 fines.
|
|||
|
|
|||
|
The Pirate's mistake - aside from his suicidal choice of
|
|||
|
nickname - was to plant himself geographically. Phil, a former
|
|||
|
corporate network manager, was able to trace him through
|
|||
|
his FTP site's IP address. Phil knows his networks; this
|
|||
|
makes him the perfect undercover agent - and one of Novell
|
|||
|
UK's most envied employees. "I play on the Net all day," he
|
|||
|
says, "and get paid for it."
|
|||
|
|
|||
|
There's a bit more to it than that. Phil and his counterparts in
|
|||
|
Asia and the US are deployed to infiltrate pirate groups; to
|
|||
|
study IRC; to get under the skin of the lamers, the dabblers,
|
|||
|
and the professionals; to chat, seduce, charm, and interact
|
|||
|
with the denizens of this bizarre over-underworld. Phil talks to
|
|||
|
traders in their own language, understands the tricks and
|
|||
|
traps. After busting The Pirate, he says, "we were talking and
|
|||
|
he was moaning about the sluggishness of his network. I
|
|||
|
pointed out that, aside from using LANtastic, he was using a
|
|||
|
75-ohm terminator on the back of his file server, slowing the
|
|||
|
whole thing down."
|
|||
|
|
|||
|
Now that he's back from Z<>rich, Phil will be getting some new
|
|||
|
toys: the spoils of war. In many jurisdictions, any hardware
|
|||
|
deemed to be part of an illegal setup can be taken by
|
|||
|
investigators and - if part of a civil prosecution - can be
|
|||
|
worked in as part of the settlement. Once sucked dry of
|
|||
|
evidence and incriminating data, the cannibalized machines
|
|||
|
are moved to Bracknell and hooked up to the network.
|
|||
|
|
|||
|
But despite the resources at his disposal and his status as a
|
|||
|
network ninja, Phil doesn't always get his man. "If there's a
|
|||
|
person out there who has a decent level of technological
|
|||
|
awareness of the ways he can be located, it's quite true to say
|
|||
|
he could successfully hide himself, or use a system where it
|
|||
|
would be impossible to track him. It's technically possible for
|
|||
|
them to bounce their messages all around the world and have
|
|||
|
us running around like blue-arsed flies." It's a reluctant
|
|||
|
admission, but then Phil is one person pitted against
|
|||
|
thousands.
|
|||
|
|
|||
|
Successful prosecutions aren't always that easy either. Take
|
|||
|
David LaMacchia, an MIT engineering student who turned two
|
|||
|
of the school's servers into drop sites and downloaded an
|
|||
|
estimated $1 million worth of pirated software. LaMacchia
|
|||
|
was arrested in 1995, only to have the case thrown out by a
|
|||
|
judge who ruled that no "commercial motive" was involved.
|
|||
|
Prosecutors tried charging him with wire fraud, but this was
|
|||
|
ruled an unacceptable stretching of the law. LaMacchia
|
|||
|
walked free. "Bringing Internet cases through the judicial
|
|||
|
system is a nightmare," says Novell's Martin Smith. "Try
|
|||
|
talking to a judge about 'dynamically allocated IP addresses.'
|
|||
|
We don't have a chance."
|
|||
|
|
|||
|
Tell that to the former warez traders of America Online, which
|
|||
|
had a meteoric history as a pirate mecca. For years,
|
|||
|
instructions on how to crack AOL's security and obtain free
|
|||
|
accounts were a Usenet staple. Online, "freewarez" chat
|
|||
|
rooms were packed with traders, 24 hours a day. Megabytes
|
|||
|
of warez were kept in permanent circulation.
|
|||
|
|
|||
|
Then came the crackdown of 1996, a dark period in warez
|
|||
|
history. Goaded by software-industry watchdogs, AOL
|
|||
|
introduced countermeasures to disinfect its system;
|
|||
|
alt.binaries.warez was removed from the Internet newsfeed.
|
|||
|
CATwatch automated sentinels were placed on AOL's warez
|
|||
|
chat channels, logging off anyone who entered. "Free"
|
|||
|
accounts were traced and nuked. Michael, the weight-lifting
|
|||
|
trader and also an AOL veteran, says everyone thought that
|
|||
|
"the FBI had infiltrated the warez groups, and we were all
|
|||
|
going to get busted." On the cusp of the big time - a top pirate
|
|||
|
outfit named Hybrid had a position open - Michael had been
|
|||
|
hoping to prove himself by doing a CD rip of the soccer game
|
|||
|
Euro 96. "I was halfway through removing the FMV and CD
|
|||
|
audio. I reckon I could've got it down from 58 disks to 9. But
|
|||
|
then everything went haywire."
|
|||
|
|
|||
|
Profit-driven crackers are actually the easiest to catch: they
|
|||
|
have links to the real world, starting with the money trail from
|
|||
|
credit cards. And the easiest prey of all are BBSes, with their
|
|||
|
telltale telephone connections. In January, FBI agents led by
|
|||
|
the bureau's San Francisco-based International Computer
|
|||
|
Crime Squad raided homes and businesses in California and
|
|||
|
half a dozen other states. They seized computers, hard
|
|||
|
drives, and modems, though no arrests were made. Along
|
|||
|
with Adobe, Autodesk, and other BSA stalwarts, the list of
|
|||
|
software companies involved included Sega and Sony - a hint
|
|||
|
that the targets included gold-disk dupers who counterfeit
|
|||
|
mass-market videogames.
|
|||
|
|
|||
|
Mad Hatter was not impressed. "Wow, I'm in hiding," he
|
|||
|
cracked the day after the raids. But "Cyber Strike" was, as
|
|||
|
BSA vice president Bob Kruger said later in a statement,
|
|||
|
"the most ambitious law enforcement action to date against
|
|||
|
Internet piracy" - specifically, the first US case in which the
|
|||
|
FBI, rather than local police, took the lead. And that can't help
|
|||
|
but augment the BSA's number-one antipiracy tactic for 1997:
|
|||
|
creating the "perception of threat." And even warez gods
|
|||
|
don't necessarily want the FBI on their case.
|
|||
|
|
|||
|
But bluster aside, people like Mad Hatter are intrinsically -
|
|||
|
and deliberately - much harder to catch. The most prestigious
|
|||
|
pirate groups - Razor 1911, DOD, Pirates With Attitude, the
|
|||
|
Inner Circle - are tightly knit clubs whose members have
|
|||
|
known each other for years and call each other "good friends"
|
|||
|
- though they rarely, if ever, meet. Joining is no easy task.
|
|||
|
Positions become vacant only when members quit or are
|
|||
|
busted, or a vote is taken to expand operations. Kudos and
|
|||
|
reputation are everything. Unofficial homepages can be found
|
|||
|
here and there, constructed by acolytes who celebrate the
|
|||
|
groups' best releases and victories. These are often padded
|
|||
|
out with cryptic biographies and obituaries for those busted
|
|||
|
by the cops ("We feel for ya!"). Despite the boasting, and the
|
|||
|
draping of their releases with corporate motifs - logos, front
|
|||
|
ends, graphics, even signature tunes and Java applets -
|
|||
|
crackers' true identities typically remain secret, even to one
|
|||
|
another.
|
|||
|
|
|||
|
The anonymity, however, works both ways. Cloaked in his
|
|||
|
own secret identity, Phil says he has managed to get deep
|
|||
|
within several major groups in the past 18 months and is
|
|||
|
skimming the surface of several others. He can convincingly
|
|||
|
portray himself as a caring, sharing warez god. "You make
|
|||
|
some good friends," he says with a smile. And, it seems, you
|
|||
|
can end up pretty impressed. "Some of these people are
|
|||
|
incredibly talented. The logic and programming behind their
|
|||
|
setups are just amazing." Or maybe he's just bluffing?
|
|||
|
|
|||
|
------------------
|
|||
|
Warez and whyfores
|
|||
|
------------------
|
|||
|
|
|||
|
In Phil's world, warez dealers are thieves. In warez world, the
|
|||
|
software companies are the criminals.
|
|||
|
|
|||
|
"Most products you buy from a store can be returned if you
|
|||
|
are unsatisfied," reads the beautifully crafted Warez FAQ, on
|
|||
|
the Inner Circle's Web site. "Software cannot." The Inner
|
|||
|
Circle thus can claim to have a practical motivation -
|
|||
|
providing "a place to find something you might want to
|
|||
|
evaluate before purchasing." All right. "I personally have
|
|||
|
bought progs that I demo'd first from warez," declares
|
|||
|
Clickety. "I have more warez than I could ever hope to install
|
|||
|
on my poor drives. Tested a lot of crap also that I was glad I
|
|||
|
didn't pay for - deleted it right off the bat. I have recommended
|
|||
|
software to clients based upon using a pirate version at
|
|||
|
home."
|
|||
|
|
|||
|
"Software developers have families, and should be able to
|
|||
|
support them," reads the Warez FAQ. "We do advocate
|
|||
|
buying your own software if you really like it and use it
|
|||
|
heavily," adds Mad Hatter.
|
|||
|
|
|||
|
As Phil and his friends are well aware, the line between piracy
|
|||
|
and ownership is very blurred. For example, it's
|
|||
|
commonplace for 3-D animators and modelers to use
|
|||
|
pirated, cracked, or at least unlicensed copies of their office
|
|||
|
software at home, for overtime or experimentation. In some
|
|||
|
minds, it's even a "necessary evil," a slightly arcane
|
|||
|
marketing strategy, a rather reckless approach to branding -
|
|||
|
look at Netscape. Indeed, many software executives privately
|
|||
|
acknowledge that piracy - especially the attention it brings to
|
|||
|
new releases - can be a valuable way to develop markets.
|
|||
|
|
|||
|
Novell's Martin Smith might disagree. He spends "99.9
|
|||
|
percent" of his time fighting piracy, and he worries that the
|
|||
|
next generation of browsers will seamlessly marry the Web
|
|||
|
with Usenet. "The newsgroups will be a lot more accessible,"
|
|||
|
he says, with something close to resignation, "which is going
|
|||
|
to make the whole thing a lot more widespread and give
|
|||
|
these guys a much bigger market. There's not much we can
|
|||
|
do, other than encourage ISPs not to take them."
|
|||
|
|
|||
|
The difficulty is that, once it's up, a Usenet post can generally
|
|||
|
be canceled only by the author or a sysop from the post's
|
|||
|
point of origin, "server zero." Even if a cancel is issued, it
|
|||
|
takes time to ripple across the network. A warez regular
|
|||
|
would be able to grab the file before it was vaped. Some
|
|||
|
servers refuse on principle to honor cancels. "Even the most
|
|||
|
diehard warez hater in news.admin.hierarchy would defend
|
|||
|
your right to be safe from cancels," claims TAG. Many
|
|||
|
commercial ISPs have taken the industry's encouragement
|
|||
|
and dropped the warez groups, but lots of free servers are
|
|||
|
carrying on. And things aren't helped by the lack of a clear
|
|||
|
legal framework. Imagine the scenario: a program that
|
|||
|
belongs to a UScompany is uploaded via a router in
|
|||
|
Canada to a server in South Africa, where it is downloaded
|
|||
|
by a Norwegian operating out of Germany using a US-based
|
|||
|
anonymous remailer, then burnt onto a CD in the UK and sold
|
|||
|
in Bulgaria. "How would you prosecute that mess?" asks
|
|||
|
Smith. "It's a jurisdictional nightmare."
|
|||
|
|
|||
|
And the profit pirates are getting more creative. Smith cites
|
|||
|
the Web page of one warez guru, offering a premium-line
|
|||
|
phone number: for $3 a minute, you can listen to details about
|
|||
|
the best warez FTP sites, their addresses, and their login
|
|||
|
passwords. "Updated every three days for your convenience,"
|
|||
|
it declares. It also makes provisions for those dialing from
|
|||
|
outside the US. The selling of information that leads to illegal
|
|||
|
use of information - a difficult case to prosecute.
|
|||
|
|
|||
|
"Our strategy is to bring a critical mass of prosecutions," says
|
|||
|
Smith. "We'll take out some people who're downloading this
|
|||
|
material - the gnats - and then we'll take out some of the
|
|||
|
larger, more organized guys. The people who are packaging
|
|||
|
it up and zipping it onto CD-ROMs." Which might work in a
|
|||
|
world where software was always bought on CD-ROM. But in
|
|||
|
pushing ever deeper into electronic commerce, where more
|
|||
|
and more real commercial software (browsers, little applets)
|
|||
|
is being given out for free, where the Internet is the ultimate
|
|||
|
distribution network, this looks a little ropey. Friction-free
|
|||
|
markets and friction-free piracy run in tandem. The Inner
|
|||
|
Circle already has its PGP-encoded giveaway mall in place.
|
|||
|
|
|||
|
Smith knows all this. There's just not much he can do about it.
|
|||
|
"All it needs is one server in one country where there are no
|
|||
|
laws to counter copyright theft, and there are plenty who will -
|
|||
|
the likes of Libya, Bulgaria, and Iran. One country with a
|
|||
|
decent enough telephone infrastructure is enough to undo a
|
|||
|
hundred busts in the West." Even if laws are constitutional or
|
|||
|
enforced, larger biases come into play. "Try asking a Saudi
|
|||
|
policeman to arrest a Saudi software pirate on behalf of an
|
|||
|
American company. Forget it."
|
|||
|
|
|||
|
----------------
|
|||
|
Dingle my dongle
|
|||
|
----------------
|
|||
|
|
|||
|
The alternative to policing is burglar-proofing: making things
|
|||
|
harder to crack. In principle, you might think that the
|
|||
|
gazillion-dollar software industry would be able to produce
|
|||
|
uncrackable software. In practice, it can't, although it certainly
|
|||
|
keeps trying.
|
|||
|
|
|||
|
Take the dongle, for example. It is the summit of copy
|
|||
|
protection, an explicit melding of software and hardware.
|
|||
|
Without the right hardware key - the dongle - plugged into the
|
|||
|
machine's parallel port, the software won't run. And without the
|
|||
|
right software, the dongle is a mindless doorstop. Calls to the
|
|||
|
dongle are woven into the code at the lowest level. "The
|
|||
|
program may call the dongle every 150 mouseclicks, or every
|
|||
|
time you print, or every time you select flesh tones as your
|
|||
|
desktop color scheme," says one dongle expert. If the
|
|||
|
response to the call is false or not forthcoming, the program
|
|||
|
shuts down. All communications between the two are
|
|||
|
encrypted by uncrackable algorithms. Internal security fuses
|
|||
|
ensure that any attempt to hack the dongle mechanically will
|
|||
|
cause it to self-destruct. "Nothing short of an electron
|
|||
|
microscope," says the expert, "could extract the algorithm
|
|||
|
from that mess."
|
|||
|
|
|||
|
The biggest player in the dongle market is Rainbow
|
|||
|
Technologies, whose Sentinel hardware keys are used by 55
|
|||
|
percent of all protected software. There are 8 million Sentinel
|
|||
|
keys attached to 8 million printer ports the world over. The
|
|||
|
company calls it "the world's most effective way to stop
|
|||
|
piracy" - a clarion call to crackers if ever there was.
|
|||
|
|
|||
|
The logical approach to cracking a hardware key is to create
|
|||
|
a "pseudodongle" - a chunk of code that sits in memory,
|
|||
|
giving the correct answers to any query. To do this, a cracker
|
|||
|
would have to monitor and trap traffic to-ing and fro-ing
|
|||
|
across the parallel port, then use this information to build an
|
|||
|
infallible query/ table. Unfortunately, if the query is, say, six
|
|||
|
characters long, it can have more than 280 trillion responses
|
|||
|
(281,474,976,710,700 to be exact). With the speed of
|
|||
|
modern machines, this would take approximately 44,627
|
|||
|
years to collate. With the SentinelSuperPro dongle ("the most
|
|||
|
secure and flexible protection available") the query length can
|
|||
|
be 56 characters - requiring a mere 10 125 years (in theory)
|
|||
|
for a complete table. However, the dongle in
|
|||
|
SentinelSuperPro for Autodesk 3D Studio MAX was cracked
|
|||
|
in just under seven days of its retail release - substantially less
|
|||
|
than the 44 millennia emblazoned on the sales brochures.
|
|||
|
Other expensive high-end applications that use Sentinel -
|
|||
|
including NewTek's LightWave 5 and Microsoft's SoftImage -
|
|||
|
have ended up the same way: cracked, repackaged, and
|
|||
|
redistributed to every corner of the Internet within weeks of
|
|||
|
their release. How? Instead of attempting to simulate the
|
|||
|
dongle, expert crackers simply remove its tendrils from the
|
|||
|
program code, unraveling the relationship skein by skein,
|
|||
|
function by function, call by call, until the application ceases to
|
|||
|
need the dongle to function. Then it's ready for anyone and
|
|||
|
everyone to use - or, more likely, gawk at.
|
|||
|
|
|||
|
Nobody says this is easy. There may be only three or four
|
|||
|
crackers in the world who could manage such an opus. But
|
|||
|
with the Internet to transmit the result, only one needs to
|
|||
|
succeed.
|
|||
|
|
|||
|
With the latest wave of dongles, warez world looked to Russia
|
|||
|
to get the job done - and a shadowy group called DOD "won"
|
|||
|
the contract. The self-styled "Warez Bearz of Russia and
|
|||
|
Beyond," DOD appears to have arms throughout Europe,
|
|||
|
Asia, and the US. It undid Microsoft SoftImage's dongle
|
|||
|
protection in two weeks, which wasn't easy. The crew
|
|||
|
riotously celebrated in their "NFO" file: "Totally awesome
|
|||
|
work of glorious DOD cracker - Replicator after five other
|
|||
|
crackers gave up! We decided not a do a crack patch 'coz it
|
|||
|
will take too much time to code it ... you ask why? 'Coz there
|
|||
|
are only 72 (!!!) EXEs patched. All options now work 100%!"
|
|||
|
|
|||
|
NFO files do more than brag or supply installation
|
|||
|
instructions; they testify that the ware is a bona fide release,
|
|||
|
guaranteed to work. And this is more than just posturing; a
|
|||
|
group's reputation is paramount. Each release is
|
|||
|
painstakingly beta-tested. These are their products now, their
|
|||
|
labors of love. Nobody wants to find a "bad crack" in his
|
|||
|
hands after a seven-hour download. Nobody wants to be
|
|||
|
accused of being "unprofessional." Nobody wants the
|
|||
|
ignominy of anything like the bad crack for Autodesk's 3D
|
|||
|
Studio that made the rounds in 1992. For all intents and
|
|||
|
purposes it ran correctly, all features seemed 100 percent
|
|||
|
functional. Except that the dedongled program slowly and
|
|||
|
subtly corrupted any 3-D model built with it. After a few hours
|
|||
|
of use, a mesh would become a crumpled mass of broken
|
|||
|
triangles, irrevocably damaged. Cleverly, Autodesk had used
|
|||
|
the dongle to create a dynamic vector table within the
|
|||
|
program. Without the table, the program struggled to create
|
|||
|
mathematically accurate geometry - and eventually failed.
|
|||
|
Many a dodgy CAD house saw its cost-cutting measures end
|
|||
|
in ruin. Autodesk support forums and newsgroups were
|
|||
|
flooded with strangely unregistered users moaning about the
|
|||
|
"bug in their version of 3D Studio." A rectified "100 percent
|
|||
|
cracked" version appeared soon after, but the damage was
|
|||
|
done. The Myth of the Bad Crack was born, and the pirate
|
|||
|
groups' reputations tarnished.
|
|||
|
|
|||
|
But the pirates bounced back. They always do. And there's no
|
|||
|
reason to think that there's any way to stop them. Software
|
|||
|
security people are at an intrinsic disadvantage. Compare
|
|||
|
their job to that of securing something in the real world that's
|
|||
|
valuable and under threat - a bank, say. Typically, only one set
|
|||
|
of armed robbers will hold up a bank at a time, and they'll get
|
|||
|
only one crack at it. Imagine an army of robbers, all in different
|
|||
|
parts of the world, all attacking the same bank at the same
|
|||
|
time. And in the comfort of their own homes. Not just once, but
|
|||
|
over and over again. Imagine that each set of robbers is
|
|||
|
competing against every other, racing to be first in. Imagine,
|
|||
|
too, that some of the robbers are so technically adept that
|
|||
|
they could have built the alarms, the safe, and even the jewels
|
|||
|
themselves. And that they have cracked more than 30 banks
|
|||
|
with the same protection system. And that they're learning
|
|||
|
from all their failures, because they're never caught. No
|
|||
|
security could realistically resist such an onslaught. It may be
|
|||
|
that the only way to avoid having your software cracked is to
|
|||
|
put no protection whatsoever on it. No challenge, no crack.
|
|||
|
|
|||
|
Popularity only feeds the frenzy. Doom is a good example. In
|
|||
|
1993, id Software distributed the original shareware version
|
|||
|
of its nasty-guns-in-nasty-dungeons masterpiece on bulletin
|
|||
|
boards, CompuServe, and a then-little-known system called
|
|||
|
the Internet. Downloaded by more than 6 million people
|
|||
|
worldwide, Doom was a trailblazer in the world of modem
|
|||
|
marketing. The shareware gave you a third of the game: if you
|
|||
|
liked it, you had to buy the rest on disks. Millions did.
|
|||
|
|
|||
|
Doom and its makers became a dream target. Weeks before
|
|||
|
Doom II's release, the sequel was available on the Internet -
|
|||
|
not as shareware, but warez. And not just as a teaser, but the
|
|||
|
whole damn thing. "Yeah, that was leaked," says Mike Wilson,
|
|||
|
id's then-vice president of marketing, now CEO at Ion Storm.
|
|||
|
"Can't tell you how much that hurt." The leaked copy was
|
|||
|
rapidly traced - rumors abounded that the version was a
|
|||
|
review copy fingerprinted to a British PC games magazine -
|
|||
|
but too late. It was already on Usenet, doing the rounds on
|
|||
|
IRC, filling up FTP sites. The pirates were in ecstasy and id
|
|||
|
was left with recoding the final retail release, to ensure future
|
|||
|
patches and upgrades would not work on the pirated version.
|
|||
|
Then they shut the stable door. No more external beta testing;
|
|||
|
no more prelaunch reviews. "We assured ourselves it would
|
|||
|
never happen again," says Wilson. "No copy of our games
|
|||
|
would leave the building."
|
|||
|
|
|||
|
Nice try. Quake, Doom's much-anticipated follow-up, turned
|
|||
|
up on an FTP server in Finland three days before the
|
|||
|
shareware come-on was due to be released. The pirate
|
|||
|
version was a final beta of the full game - complete with eerily
|
|||
|
empty unfinished levels and bare, unartworked walls. Within
|
|||
|
hours, it had been funneled to sites all over the globe. IRC
|
|||
|
was swamped with traders and couriers desperate to
|
|||
|
download.
|
|||
|
|
|||
|
"Somebody actually broke into our then poorly secured
|
|||
|
network and started to download it right before our eyes,"
|
|||
|
Wilson recalls. "We managed to stop the transfer before he
|
|||
|
got all of it. We traced the call, got his name and address. He
|
|||
|
was pretty scared, but, of course, it was some kid. We didn't
|
|||
|
pursue that one. It hurt, but not enough to put some little kid in
|
|||
|
jail."
|
|||
|
|
|||
|
When the legitimate Quake hit the stores last year, it was
|
|||
|
initially in the form of an encrypted CD, which let you play a
|
|||
|
shareware version for free but would only unlock the rest on
|
|||
|
receipt of a password, available for purchase by phone. The
|
|||
|
encryption scheme, an industry standard called TestDrive,
|
|||
|
was eventually cracked by a lone European pirate called
|
|||
|
Agony. And id's crown jewel was now available, courtesy a
|
|||
|
29K program. "In order to unlock the full version, you are
|
|||
|
supposed to call 1-800-IDGAMES," Agony gloated in a
|
|||
|
posting. "Hahahahahah."
|
|||
|
|
|||
|
"We knew it was going to be hacked," says Wilson. "We of all
|
|||
|
people knew. But we thought it was safe enough, certainly
|
|||
|
safer than Doom II." And, truth to tell, it didn't matter too much.
|
|||
|
The gap between the game's release and the warez version
|
|||
|
becoming widespread was enough for id to sell the copies
|
|||
|
they expected. "Copy-protection schemes are just speed
|
|||
|
bumps," laments Wilson.
|
|||
|
|
|||
|
Nobody really knows how much actual damage cracking does
|
|||
|
to the software companies. But as the industry rolls
|
|||
|
apprehensively toward the uncertain future of an ever-more
|
|||
|
frictionless electronic marketplace, almost everyone thinks
|
|||
|
piracy will increase. "The level of activity out there is
|
|||
|
overwhelming. We know that we have to take action to take
|
|||
|
control of it. We will continue to bring a critical mass of
|
|||
|
prosecutions," says Novell UK's Smith. He doesn't sound all
|
|||
|
that convinced.
|
|||
|
|
|||
|
Somewhere back on the US East Coast, Mad Hatter has a
|
|||
|
final swig of ginger ale and settles down to bed with his wife,
|
|||
|
White Rabbit. She thinks his obsession is a wasted resource,
|
|||
|
but didn't complain when he installed the latest version of
|
|||
|
Quicken on her computer - a cracked copy, of course. "We
|
|||
|
are all family men, married with children, day jobs, dedicated
|
|||
|
accounts, and multiple phone lines," Mad Hatter says. "Our
|
|||
|
kids have been looking over our shoulders for years. They will
|
|||
|
be the next couriers, the next warez gods."
|
|||
|
|
|||
|
__________________
|
|||
|
|
|||
|
David McCandless (dmacca@cix.compulink.co.uk), a
|
|||
|
London-based writer, musician, and film editor, is still bitter
|
|||
|
about being dethroned as UK Doom champion.
|
|||
|
|