4488 lines
149 KiB
Plaintext
4488 lines
149 KiB
Plaintext
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
NORTHERN ILLINOIS UNIVERSITY
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A THESIS SUBMITTED TO THE GRADUATE SCHOOL
|
|
|
|
IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
|
|
|
|
FOR THE DEGREE
|
|
|
|
MASTER OF ARTS
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
DEPARTMENT OF SOCIOLOGY
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
BY
|
|
|
|
GORDON R. MEYER
|
|
|
|
%CompuServe: 72307,1502%
|
|
%GEnie: GRMEYER%
|
|
|
|
|
|
DEKALB, ILLINOIS
|
|
|
|
AUGUST 1989
|
|
|
|
^
|
|
|
|
|
|
|
|
|
|
|
|
ABSTRACT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Name: Gordon R. Meyer Department: Sociology
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Title: The Social Organization of the Computer Underground
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Major: Criminology Degree: M.A.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Approved by: Date:
|
|
|
|
|
|
|
|
__________________________ ________________________
|
|
Thesis Director
|
|
|
|
|
|
|
|
|
|
|
|
NORTHERN ILLINOIS UNIVERSITY
|
|
|
|
^
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ABSTRACT
|
|
|
|
|
|
|
|
This paper examines the social organization of the
|
|
|
|
"computer underground" (CU). The CU is composed of
|
|
|
|
actors in three roles, "computer hackers," "phone
|
|
|
|
phreaks," and "software pirates." These roles have
|
|
|
|
frequently been ignored or confused in media and other
|
|
|
|
accounts of CU activity. By utilizing a data set culled
|
|
|
|
from CU channels of communication this paper provides
|
|
|
|
an ethnographic account of computer underground
|
|
|
|
organization. It is concluded that despite the
|
|
|
|
widespread social network of the computer underground,
|
|
|
|
it is organized primarily on the level of colleagues,
|
|
|
|
with only small groups approaching peer relationships.
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Certification: In accordance with departmental and
|
|
|
|
Graduate School policies, this thesis
|
|
|
|
is accepted in partial fulfillment
|
|
|
|
of degree requirements.
|
|
|
|
|
|
|
|
_____________________________________
|
|
Thesis Director
|
|
|
|
_____________________________________
|
|
Date
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ACKNOWLEDGMENTS
|
|
|
|
|
|
|
|
FOR CRITIQUE, ADVICE, AND COMMENTS:
|
|
|
|
DR. JAMES L. MASSEY
|
|
|
|
DR. JIM THOMAS
|
|
|
|
DR. DAVID F. LUCKENBILL
|
|
|
|
|
|
|
|
FOR SUPPORT AND ENCOURAGEMENT:
|
|
|
|
GALE GREINKE
|
|
|
|
|
|
|
|
SPECIAL THANKS TO:
|
|
|
|
D.C., T.M., T.K., K.L., D.P.,
|
|
|
|
M.H., AND G.Z.
|
|
|
|
|
|
|
|
THIS WORK IS DEDICATED TO:
|
|
|
|
GEORGE HAYDUKE
|
|
|
|
AND
|
|
|
|
BARRY FREED
|
|
|
|
|
|
|
|
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
TABLE OF CONTENTS
|
|
|
|
Introduction . . . . . . . . . . . . . . . . . . . 1
|
|
|
|
Methodology . . . . . . . . . . . . . . . . . . . 6
|
|
|
|
What is the Computer Underground? . . . . . . . . 11
|
|
|
|
Topography of the Computer Underground . . . . . . 20
|
|
Hacking . . . . . . . . . . . . . . . . . 20
|
|
Phreaking . . . . . . . . . . . . . . . . . . 21
|
|
Pirating . . . . . . . . . . . . . . . . . 24
|
|
|
|
Social Organization and Deviant Associations . . . 28
|
|
|
|
Mutual Association . . . . . . . . . . . . . . . . 31
|
|
|
|
The Structure of the Computer Underground . . . . 33
|
|
Bulletin Board Systems . . . . . . . . . . 33
|
|
Towards a BBS Culture . . . . . . . . . 37
|
|
Bridges, Loops, and Voice Mail Boxes . . . 53
|
|
Summary . . . . . . . . . . . . . . . . . . 57
|
|
|
|
Mutual Participation . . . . . . . . . . . . . . . 59
|
|
Pirate Groups . . . . . . . . . . . . . . . 63
|
|
Phreak/hack groups . . . . . . . . . . . . 64
|
|
Summary . . . . . . . . . . . . . . . . . . 67
|
|
|
|
Conclusion . . . . . . . . . . . . . . . . . . . . 69
|
|
|
|
REFERENCES . . . . . . . . . . . . . . . . . . . . 75
|
|
|
|
APPENDIX A. COMPUTER UNDERGROUND PSEUDONYMS . . . 76
|
|
|
|
APPENDIX B.
|
|
NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77
|
|
|
|
^
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Introduction
|
|
|
|
The proliferation of home computers has been
|
|
|
|
accompanied by a corresponding social problem involving
|
|
|
|
the activities of so-called "computer hackers."
|
|
|
|
"Hackers" are computer aficionados who "break in" to
|
|
|
|
corporate and government computer systems using their
|
|
|
|
home computer and a telephone modem. The prevalence of
|
|
|
|
the problem has been dramatized by the media and
|
|
|
|
enforcement agents, and evidenced by the rise of
|
|
|
|
specialized private security firms to confront the
|
|
|
|
"hackers." But despite this flurry of attention,
|
|
|
|
little research has examined the social world of the
|
|
|
|
"computer hacker." Our current knowledge in this regard
|
|
|
|
derives from hackers who have been caught, from
|
|
|
|
enforcement agents, and from computer security
|
|
|
|
specialists. The everyday world and activities of the
|
|
|
|
"computer hacker" remain largely unknown.
|
|
|
|
This study examines the way actors in the
|
|
|
|
"computer underground" (CU) organize to perform their
|
|
|
|
acts. The computer underground, as it is called by
|
|
|
|
those who participate in it, is composed of actors
|
|
|
|
adhering to one of three roles: "hackers," "phreakers,"
|
|
|
|
or "pirates." To further understanding this growing
|
|
|
|
"social problem," this project will isolate and clarify
|
|
^
|
|
|
|
|
|
|
|
8
|
|
|
|
these roles, and examine how each contributes to the
|
|
|
|
culture as a whole. By doing so the sociological
|
|
|
|
question of how the "underground" is organized will be
|
|
|
|
answered, rather than the technical question of how CU
|
|
|
|
participants perform their acts.
|
|
|
|
Best and Luckenbill (1982) describe three basic
|
|
|
|
approaches to the study of "deviant" groups. The first
|
|
|
|
approach is from a social psychological level, where
|
|
|
|
analysis focuses on the needs, motives, and individual
|
|
|
|
characteristics of the actors involved. Secondly,
|
|
|
|
deviant groups can be studied at a socio-structural
|
|
|
|
level. Here the emphasis is on the distribution and
|
|
|
|
consequences of deviance within the society as a whole.
|
|
|
|
The third approach, the one adopted by this work, forms
|
|
|
|
a middle ground between the former two by addressing
|
|
|
|
the social organization of deviant groups. Focusing
|
|
|
|
upon neither the individual nor societal structures
|
|
|
|
entirely, social organization refers to the network of
|
|
|
|
social relations between individuals involved in a
|
|
|
|
common activity (pp. 13-14). Assessing the degree and
|
|
|
|
manner in which the underground is organized provides
|
|
|
|
the opportunity to also examine the culture, roles, and
|
|
|
|
channels of communication used by the computer
|
|
|
|
underground. The focus here is on the day to day
|
|
|
|
experience of persons whose activities have been
|
|
^
|
|
|
|
|
|
|
|
9
|
|
|
|
criminalized over the past several years.
|
|
|
|
Hackers, and the "danger" that they present in our
|
|
|
|
computer dependent society, have often received
|
|
|
|
attention from the legal community and the media. Since
|
|
|
|
1980, every state and the federal government has
|
|
|
|
criminalized "theft by browsing" of computerized
|
|
|
|
information (Hollinger and Lanza-Kaduce, 1988, pp.101-
|
|
|
|
102). In the media, hackers have been portrayed as
|
|
|
|
maladjusted losers, forming "high-tech street gangs"
|
|
|
|
(Chicago Tribune, 1989) that are dangerous to society.
|
|
|
|
My research will show that the computer underground
|
|
|
|
consists of a more sophisticated level of social
|
|
|
|
organization than has been generally recognized. The
|
|
|
|
very fact that CU participants are to some extent
|
|
|
|
"networked" has implications for social control
|
|
|
|
policies that may have been implemented based on an in-
|
|
|
|
complete understanding of the activity. This project
|
|
|
|
not only offers sociological insight into the organ-
|
|
|
|
ization of deviant associations, but may be helpful to
|
|
|
|
policy makers as well.
|
|
|
|
I begin with a discussion of the definitional
|
|
|
|
problems that inhibit the sociological analysis of the
|
|
|
|
computer underground. The emergence of the computer
|
|
|
|
underground is a recent phenomenon, and the lack of
|
|
|
|
empirical research on the topic has created an area
|
|
^
|
|
|
|
|
|
|
|
10
|
|
|
|
where few "standard" definitions and categories exist.
|
|
|
|
This work will show that terms such as "hacker,"
|
|
|
|
"phreaker," and "pirate" have different meanings for
|
|
|
|
those who have written about the computer underground
|
|
|
|
and those who participate in it. This work bridges
|
|
|
|
these inconsistencies by providing definitions that
|
|
|
|
focus on the intentions and goals of the participants,
|
|
|
|
rather than the legality or morality of their actions.
|
|
|
|
Following the definition of CU activities is a
|
|
|
|
discussion of the structure of the underground.
|
|
|
|
Utilizing a typology for understanding the social
|
|
|
|
organization of deviant associations, developed by Best
|
|
|
|
and Luckenbill (1982), the organization of the
|
|
|
|
computer underground is examined in depth.
|
|
|
|
The analysis begins by examining the structure of
|
|
|
|
mutual association. This provides insight into how CU
|
|
|
|
activity is organized, the ways in which information is
|
|
|
|
obtained and disseminated, and explores the subcultural
|
|
|
|
facets of the computer underground. More importantly,
|
|
|
|
it clearly illustrates that the computer underground is
|
|
|
|
primarily a social network of individuals that perform
|
|
|
|
their acts separately, yet support each other by
|
|
|
|
sharing information and other resources.
|
|
|
|
After describing mutual association within the
|
|
|
|
underground community, evidence of mutual participation
|
|
^
|
|
|
|
|
|
|
|
11
|
|
|
|
is presented. Although the CU is a social network, the
|
|
|
|
ties developed at the social level encourage the
|
|
|
|
formation of small "work groups." At this level, some
|
|
|
|
members of the CU work in cooperation to perform their
|
|
|
|
acts. The organization and purposes of these groups are
|
|
|
|
examined, as well as their relationship to the CU as a
|
|
|
|
whole. However, because only limited numbers of
|
|
|
|
individuals join these short-lived associations, it is
|
|
|
|
concluded that the CU is organized as colleagues. Those
|
|
|
|
who do join "work groups" display the characteristics
|
|
|
|
of peers, but most CU activity takes place at a fairly
|
|
|
|
low level of sophistication.
|
|
^
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
|
|
|
|
|
Methodology
|
|
|
|
Adopting an ethnographic approach, data have been
|
|
|
|
gathered by participating in, monitoring, and cata-
|
|
|
|
loging channels of communication used by active members
|
|
|
|
of the computer underground. These channels, which will
|
|
|
|
be examined in detail later, include electronic
|
|
|
|
bulletin board systems (BBS), voice mail boxes,
|
|
|
|
bridges, loops, e-mail, and telephone conversations.
|
|
|
|
These sources provide a window through which to observe
|
|
|
|
interactions, language, and cultural meanings without
|
|
|
|
intruding upon the situation or violating the privacy
|
|
|
|
of the participants. Because these communication
|
|
|
|
centers are the "back stage" area of the computer
|
|
|
|
underground, they provided insight into organizational
|
|
|
|
(and other) issues that CU participants face, and the
|
|
|
|
methods they use to resolve them.
|
|
|
|
As with any ethnographic research, steps have been
|
|
|
|
taken to protect the identity of informants. The
|
|
|
|
culture of the computer underground aids the researcher
|
|
|
|
in this task since phreakers, hackers, and pirates
|
|
|
|
regularly adopt pseudonyms to mask their identity.
|
|
|
|
However to further ensure confidentiality, all of the
|
|
|
|
pseudonyms cited in this research have been changed by
|
|
|
|
the author. Additionally, any information that is
|
|
^
|
|
|
|
|
|
|
|
13
|
|
|
|
potentially incriminating has been removed or altered.
|
|
|
|
The data set used for this study consists
|
|
|
|
primarily of messages, or "logs," which are the primary
|
|
|
|
form of communication between users. These logs were
|
|
|
|
"captured" (recorded using the computer to save the
|
|
|
|
messages) from several hundred computer bulletin
|
|
|
|
boards1 located across the United States. The bulk of
|
|
|
|
the data were gathered over a seventeen month period
|
|
|
|
(12/87 to 4/89) and will reflect the characteristics of
|
|
|
|
the computer underground during that time span.
|
|
|
|
However, some data, provided to the researcher by
|
|
|
|
cooperative subjects, dates as far back as 1984.
|
|
|
|
The logged data were supplemented by referring to
|
|
|
|
several CU "publications." The members of the computer
|
|
|
|
underground produce and distribute several technical
|
|
|
|
and tutorial newsletters and "journals." Since these
|
|
|
|
"publications" are not widely available outside of CU
|
|
|
|
circles I have given a brief description of each below.
|
|
|
|
Legion of Doom/Hackers Technical Journal. This
|
|
|
|
____________________
|
|
|
|
1 Computer Bulletin Boards (BBS) are personal
|
|
computers that have been equipped with a telephone
|
|
modem and special software. Users can connect with a
|
|
BBS by dialing, with their own computer and modem, the
|
|
phone number to which the BBS is connected. After
|
|
"logging in" by supplying a valid user name and pass-
|
|
word, the user can leave messages to other users of the
|
|
system. These messages are not private and anyone
|
|
calling the BBS can freely read and respond to them.
|
|
|
|
^
|
|
|
|
|
|
|
|
14
|
|
|
|
publication is written and distributed by a group known
|
|
|
|
as "The Legion of Doom/Legion of Hackers" (LoD/H). It
|
|
|
|
is available in electronic format (a computer text
|
|
|
|
file) and contains highly technical information on
|
|
|
|
computer operating systems. As of this writing, three
|
|
|
|
issues have been published.
|
|
|
|
PHRACK Inc.: Phrack Inc is a newsletter that
|
|
|
|
contains various articles, written by different
|
|
|
|
authors, and "published" under one banner. Phrack
|
|
|
|
Inc's first issue was released in 1985, making it the
|
|
|
|
oldest of the electronically distributed underground
|
|
|
|
publications. CU participants are invited to submit
|
|
|
|
articles to the editors, who release a new issue when a
|
|
|
|
sufficient number (about nine) of acceptable pieces
|
|
|
|
have been gathered. Phrack also features a lengthy
|
|
|
|
"World News" with stories about hackers who have been
|
|
|
|
apprehended and interviews with various members of the
|
|
|
|
underground. As of this writing twenty-seven issues of
|
|
|
|
Phrack, have been published.
|
|
|
|
Phreakers/Hackers Underground Network (P/Hun):
|
|
|
|
Like Phrack, P/Hun collects articles from various
|
|
|
|
authors and releases them as one issue. Three issues
|
|
|
|
have been published to date.
|
|
|
|
Activist Times, Incorporated (ATI): Unlike the
|
|
|
|
other electronically distributed publications, ATI does
|
|
^
|
|
|
|
|
|
|
|
15
|
|
|
|
not limit itself to strictly computer/telephone news.
|
|
|
|
Articles normally include commentary on world and
|
|
|
|
government events, and other "general interest" topics.
|
|
|
|
ATI issues are generally small and consist of articles
|
|
|
|
written by a core group of four to seven people.
|
|
|
|
Unlike the publications discussed thus far, ATI is
|
|
|
|
available in printed "hard copy" form by sending
|
|
|
|
postage reimbursement to the editor. ATI is currently
|
|
|
|
on their 38th issue.
|
|
|
|
2600 Magazine: Published in a traditional
|
|
|
|
(printed) magazine format, 2600 (named for the
|
|
|
|
frequency tone used to make free long distance phone
|
|
|
|
calls) is arguably an "underground" publication as it
|
|
|
|
is available on some newsstands and at some libraries.
|
|
|
|
Begun in 1987 as a monthly magazine, it is now
|
|
|
|
published quarterly. Subscription rates are $25.00 a
|
|
|
|
year with a complete back-issue selection available.
|
|
|
|
The magazine specializes in publishing technical
|
|
|
|
information on telephone switching systems, satellite
|
|
|
|
descrambling codes, and news about the computer
|
|
|
|
underground.
|
|
|
|
TAP/YIPL: First established in 1972 as YIPL (Youth
|
|
|
|
International Party Line), this publication soon
|
|
|
|
changed its name to TAP (Technical Assistance Party).
|
|
|
|
Co-founded by Abbie Hoffman, it is generally recognized
|
|
^
|
|
|
|
|
|
|
|
16
|
|
|
|
as the grandfather of computer underground
|
|
|
|
publications. Publication of the 2-4 page newsletter
|
|
|
|
has been very sporadic over the years, and currently
|
|
|
|
two different versions of TAP, each published in
|
|
|
|
different areas of the country, are in circulation.
|
|
|
|
Utilizing a data set that consists of current
|
|
|
|
message logs, old messages logs, and various CU
|
|
|
|
publications yields a reasonably rich collection from
|
|
|
|
which to draw the analysis. Examination of the older
|
|
|
|
logs and publications shows that while the actors have
|
|
|
|
changed over the years, cultural norms and
|
|
|
|
characteristics have remained consistent over time.
|
|
^
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
|
|
|
|
|
What is the Computer Underground?
|
|
|
|
Defining the "computer underground" can be
|
|
|
|
difficult. The sociologist soon finds that there are
|
|
|
|
several competing definitions of computer underground
|
|
|
|
activity. Those who have written on the subject, the
|
|
|
|
media, criminologists, computer programmers, social
|
|
|
|
control agents, and CU participants themselves, have
|
|
|
|
adopted definitions consistent with their own social
|
|
|
|
positions and perspectives. Not surprisingly, these
|
|
|
|
definitions rarely correspond. Therefore, before
|
|
|
|
discussing the organization of the computer
|
|
|
|
underground, it is necessary to discuss and compare the
|
|
|
|
various definitions. This will illustrate the range of
|
|
|
|
beliefs about CU activity, and provide a springboard
|
|
|
|
for the discussion of types of roles and activities
|
|
|
|
found in the underground.
|
|
|
|
We begin with a discussion of the media image of
|
|
|
|
computer hackers. The media's concept of "hackers" is
|
|
|
|
important because the criminalization of the activity
|
|
|
|
has largely occurred as the result of media drama-
|
|
|
|
tization of the "problem" (Hollinger and Lanza-Kaduce,
|
|
|
|
1988). In fact, it was a collection of newspaper and
|
|
|
|
film clips that was presented to the United States
|
|
|
|
Congress during legislative debates as evidence of the
|
|
^
|
|
|
|
|
|
|
|
18
|
|
|
|
computer hacking problem (Hollinger and Lanza-Kaduce,
|
|
|
|
1988, p.107). Unfortunately, the media assessment of
|
|
|
|
the computer underground displays a naive understanding
|
|
|
|
of CU activity.
|
|
|
|
The media generally makes little distinction
|
|
|
|
between different types of CU activity. Most any
|
|
|
|
computer-related crime activity can be attributed to
|
|
|
|
"hackers." Everything from embezzlement to computer
|
|
|
|
viruses have, at one time or another, been attributed
|
|
|
|
to them. Additionally, hackers are often described as
|
|
|
|
being sociopathic or malicious, creating a media image
|
|
|
|
of the computer underground that may exaggerate their
|
|
|
|
propensity for doing damage.
|
|
|
|
The labeling of hackers as being "evil" is well
|
|
|
|
illustrated by two recent media examples. The first is
|
|
|
|
from Eddie Schwartz, a WGN-Radio talk show host. Here
|
|
|
|
Schwartz is addressing "Anna," a self-identified hacker
|
|
|
|
that has phoned into the show:
|
|
|
|
You know what Anna, you know what disturbs
|
|
me? You don't sound like a stupid person but
|
|
you represent a . . . a . . . a . . . lack of
|
|
morality that disturbs me greatly. You really
|
|
do. I think you represent a certain way of
|
|
thinking that is morally bankrupt. And I'm
|
|
not trying to offend you, but I . . . I'm
|
|
offended by you! (WGN Radio, 1988)
|
|
|
|
Just two months later, NBC-TV's "Hour Magazine"
|
|
|
|
featured a segment on "computer crime." In this
|
|
|
|
example, Jay Bloombecker, director of the National
|
|
^
|
|
|
|
|
|
|
|
19
|
|
|
|
Center for Computer Crime Data, discusses the "hacker
|
|
|
|
problem" with the host of the show, Gary Collins.
|
|
|
|
Collins: . . . are they %hackers% malicious
|
|
in intent, or are they simply out to prove,
|
|
ah, a certain machismo amongst their peers?
|
|
|
|
Bloombecker: I think so. I've talked about
|
|
"modem macho" as one explanation for what's
|
|
being done. And a lot of the cases seem to
|
|
involve %proving% %sic% that he . . . can do
|
|
something really spiffy with computers. But,
|
|
some of the cases are so evil, like causing
|
|
so many computers to break, they can't look
|
|
at that as just trying to prove that you're
|
|
better than other people.
|
|
|
|
GC: So that's just some of it, some kind of
|
|
"bet" against the computer industry, or
|
|
against the company.
|
|
|
|
JB: No, I think it's more than just
|
|
rottenness. And like someone who uses
|
|
graffiti doesn't care too much whose building
|
|
it is, they just want to be destructive.
|
|
|
|
GC: You're talking about a sociopath in
|
|
control of a computer!
|
|
|
|
JB: Ah, lots of computers, because there's
|
|
thousands, or tens of thousands %of hackers%
|
|
(NBC-TV, 1988).
|
|
|
|
|
|
The media image of computer hackers, and thus all
|
|
|
|
members of the computer underground, is burdened with
|
|
|
|
value-laden assumptions about their psychological
|
|
|
|
makeup, and focuses almost entirely upon the morality
|
|
|
|
of their actions. Additionally, since media stories
|
|
|
|
are taken from the accounts of police blotters,
|
|
|
|
security personnel, and hackers who have been caught,
|
|
|
|
each of whom have different perspectives and
|
|
^
|
|
|
|
|
|
|
|
20
|
|
|
|
definitions of their own, the media definition, if not
|
|
|
|
inherently biased, is at best inconsistent.
|
|
|
|
Criminologists, by way of contrast, have done
|
|
|
|
little to define the computer underground from a
|
|
|
|
sociological perspective. Those criminological
|
|
|
|
definitions that do exist are less judgmental than the
|
|
|
|
media image, but no more precise. Labels of
|
|
|
|
"electronic trespassers" (Parker, 1983), and
|
|
|
|
"electronic vandals" (Bequai, 1987) have both been
|
|
|
|
applied to hackers. Both terms, while acknowledging
|
|
|
|
that "hacking" is deviant, shy away from labeling it as
|
|
|
|
"criminal" or sociopathic behavior. Yet despite this
|
|
|
|
seemingly non-judgmental approach to the computer
|
|
|
|
underground, both Parker and Bequai have testified
|
|
|
|
before Congress, on behalf of the computer security in-
|
|
|
|
dustry, on the "danger" of computer hackers.
|
|
|
|
Unfortunately, their "expert" testimony was largely
|
|
|
|
based on information culled from newspaper stories, the
|
|
|
|
objectiveness of which has been seriously questioned
|
|
|
|
(Hollinger and Lanza-Kaduce 1988 p.105).
|
|
|
|
Computer security specialists, on the other hand,
|
|
|
|
are often quick to identify CU participants as part of
|
|
|
|
the criminal element. Correspondingly, some reject the
|
|
|
|
notion that there are different roles and motivations
|
|
|
|
among computer underground participants and thereby
|
|
^
|
|
|
|
|
|
|
|
21
|
|
|
|
refuse to define just what it is that a "hacker" or
|
|
|
|
"phreaker" does. John Maxfield, a "hacker expert,"
|
|
|
|
suggests that differentiating between "hackers" and
|
|
|
|
"phone phreaks" is a moot point, preferring instead
|
|
|
|
that they all just be called "criminals" (WGN-Radio.
|
|
|
|
Sept 28, 1988).
|
|
|
|
The reluctance or inability to differentiate
|
|
|
|
between roles and activities in the computer
|
|
|
|
underground, as exhibited in the media and computer
|
|
|
|
security firms, creates an ambiguous definition of
|
|
|
|
"hacker" that possesses two extremes: the modern-day
|
|
|
|
bank robber at one end, the trespassing teenager at the
|
|
|
|
other. Thus, most any criminal or mischievous act that
|
|
|
|
involves computers can be attributed to "hackers,"2
|
|
|
|
regardless of the nature of the crime.
|
|
|
|
Further compounding the inconsistent use of
|
|
|
|
"hacker" is the evolution of meaning that the word has
|
|
|
|
undergone. "Hacker" was first applied to computer
|
|
|
|
related activities when it was used by programmers in
|
|
|
|
the late 1950's. At that time it referred to the
|
|
|
|
pioneering researchers, such as those at M.I.T., who
|
|
____________________
|
|
|
|
2 During the WGN-Radio show on computer crime one
|
|
caller, who was experiencing a malfunctioning phone
|
|
that would "chirp" occasionally while hung up, believed
|
|
that "computer hackers" were responsible for the
|
|
problem. The panel assured her that it was unrelated
|
|
to CU activity.
|
|
|
|
^
|
|
|
|
|
|
|
|
22
|
|
|
|
were constantly adjusting and experimenting with the
|
|
|
|
new technology (Levy, 1984. p.7). A "hacker" in this
|
|
|
|
context refers to an unorthodox, yet talented,
|
|
|
|
professional programmer. This use of the term still
|
|
|
|
exits today, though it is largely limited to
|
|
|
|
professional computing circles.
|
|
|
|
Another definition of "hacker" refers to one who
|
|
|
|
obtains unauthorized, if not illegal, access to
|
|
|
|
computer systems and networks. This definition was
|
|
|
|
popularized by the movie War Games and, generally
|
|
|
|
speaking, is the one used by the media.3 It is also the
|
|
|
|
definition favored by the computer underground.
|
|
|
|
Both the members of the computer underground and
|
|
|
|
computer programmers claim ownership of "hacker," and
|
|
|
|
each defend the "proper" use of term. The computer
|
|
|
|
professionals maintain that using "hackers" (or
|
|
|
|
"hacking") to refer to any illegal or illicit activity
|
|
|
|
is a corruption of the "true" meaning of the word. Bob
|
|
|
|
Bickford, a professional programmer who has organized
|
|
|
|
several programmer conferences, explains:
|
|
____________________
|
|
|
|
3 This is not always true of course. The AP
|
|
Stylebook has yet to specify how "hacker" should be
|
|
used. A recent Associated Press story featured a
|
|
computer professional explaining that a "real hacker"
|
|
would never do anything illegal. Yet just a few weeks
|
|
later Associated Press distributed stories proclaiming
|
|
that West German "hackers" had broken into US Defense
|
|
Department computer systems.
|
|
|
|
^
|
|
|
|
|
|
|
|
23
|
|
|
|
At the most recent conference %called
|
|
"Hackers 4.0"% we had 200 of the most
|
|
brilliant computer professionals in the world
|
|
together for one weekend; this crowd included
|
|
several PhD's, several presidents of
|
|
companies (including large companies, such as
|
|
Pixar), and various artists, writers,
|
|
engineers, and programmers. These people all
|
|
consider themselves Hackers: all derive great
|
|
joy from their work, from finding ways around
|
|
problems and limits, from creating rather
|
|
than destroying. It would be a great
|
|
disservice to these people, and the thousands
|
|
of professionals like them, to let some
|
|
pathetic teenaged criminals destroy the one
|
|
word which captures their style of
|
|
interaction with the universe: Hackers
|
|
(Bickford, 1988).
|
|
|
|
Participants in the computer underground also
|
|
|
|
object to the "misuse" of the term. Their objection
|
|
|
|
centers around the indiscriminate use of the word to
|
|
|
|
refer to computer related crime in general and not,
|
|
|
|
specifically, the activities of the computer
|
|
|
|
underground:
|
|
|
|
Whenever the slightest little thing happens
|
|
involving computer security, or the breach
|
|
thereof, the media goes fucking bat shit and
|
|
points all their fingers at us 'nasty
|
|
hackers.' They're so damned ignorant it's
|
|
sick (EN, message log, 1988).
|
|
|
|
. . . whenever the media happens upon
|
|
anything that involves malicious computer use
|
|
it's the "HACKERS." The word is a catch
|
|
phrase it makes mom drop the dishes and watch
|
|
the TV. They use the word because not only
|
|
they don't really know the meaning but they
|
|
have lack of a word to describe the
|
|
perpetrator. That's why hacker has such a
|
|
bad name, its always associated with evil
|
|
things and such (PA, message log, 1988).
|
|
|
|
I never seen a phreaker called a phreaker
|
|
^
|
|
|
|
|
|
|
|
24
|
|
|
|
when caught and he's printed in the
|
|
newspaper. You always see them "Hacker caught
|
|
in telephone fraud." "Hacker defrauds old
|
|
man with phone calling card." What someone
|
|
should do is tell the fucken (sic) media to
|
|
get it straight (TP2, message log, 1988).
|
|
|
|
|
|
Obviously the CU and computer professional
|
|
|
|
definitions of "hacker" refer to different social
|
|
|
|
groups. As Best and Luckenbill (1982, p. 39) observe:
|
|
|
|
"Every social group modifies the basic language to fit
|
|
|
|
its own circumstance, creating new words or using
|
|
|
|
ordinary words in special ways." Which definition, if
|
|
|
|
either, will come into widespread use remains to be
|
|
|
|
seen. However, since computer break-ins are likely to
|
|
|
|
receive more media attention than clever feats of
|
|
|
|
programming, the CU definition is likely to dominate
|
|
|
|
simply by being used more often.4 But as long as the
|
|
|
|
two definitions do exist there will be confusion unless
|
|
|
|
writers and researchers adequately specify the group
|
|
|
|
under discussion. For this reason, I suggest that
|
|
|
|
sociologists, and criminologists in particular, adopt
|
|
|
|
the "underground" definition for consistency and
|
|
____________________
|
|
|
|
4 Another factor may be the adoption of a close
|
|
proximity to the underground definition being included
|
|
in the 1986 edition of Webster's New World dictionary:
|
|
hack.er n. 1. a person who hacks 2. an unskilled
|
|
golfer, tennis player, etc. 3. a talented amateur user
|
|
of computers, specif. one who attempts to gain
|
|
unauthorized access to files.
|
|
|
|
^
|
|
|
|
|
|
|
|
25
|
|
|
|
accuracy when speaking of the actions of CU
|
|
|
|
participants.
|
|
|
|
While it is recognized that computer hacking is a
|
|
|
|
relatively new phenomenon, the indiscriminant use of
|
|
|
|
the term to refer to many different forms of unorthodox
|
|
|
|
computer use has been counterproductive to
|
|
|
|
understanding the extent of the activity. To avoid this
|
|
|
|
a "computer hacker" should be defined as an individual,
|
|
|
|
associated with the computer underground, who
|
|
|
|
specializes in obtaining unauthorized access to
|
|
|
|
computer systems. A "phone phreak" in an individual,
|
|
|
|
associated with the computer underground, who
|
|
|
|
specializes in obtaining unauthorized information about
|
|
|
|
the phone system. A "software pirate" is an
|
|
|
|
individual, associated with the computer underground,
|
|
|
|
who distributes or collects copyrighted computer
|
|
|
|
software. These definitions have been derived from the
|
|
|
|
data, instead of relying upon those who defend the
|
|
|
|
"integrity" of the original meanings, or those who are
|
|
|
|
unfamiliar with the culture.
|
|
^
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
|
|
|
|
|
Topography of the Computer Underground
|
|
|
|
Having defined the three main roles in the
|
|
|
|
computer underground, it is necessary to examine each
|
|
|
|
activity separately in order to provide a general
|
|
|
|
typology of the computer underground. In doing so, the
|
|
|
|
ways in which each contributes to the culture as a
|
|
|
|
whole will be illustrated, and the divisions between
|
|
|
|
them that affect the overall organization will be
|
|
|
|
developed. Analysis of these roles and divisions is
|
|
|
|
crucial to understanding identity, access, and mobility
|
|
|
|
within the culture.
|
|
|
|
|
|
|
|
Hacking
|
|
|
|
In the vernacular of the computer underground,
|
|
|
|
"hacking" refers to gaining access and exploring
|
|
|
|
computer systems and networks. "Hacking" encompasses
|
|
|
|
both the act and the methods used to obtain valid user
|
|
|
|
accounts on computer systems.
|
|
|
|
"Hacking" also refers to the activity that
|
|
|
|
occurs once access to another computer has been
|
|
|
|
obtained. Since the system is being used without
|
|
|
|
authorization, the hacker does not, generally speaking,
|
|
|
|
have access to the usual operating manuals and other
|
|
|
|
resources that are available to legitimate users.
|
|
^
|
|
|
|
|
|
|
|
27
|
|
|
|
Therefore, the hacker must experiment with commands and
|
|
|
|
explore various files in order to understand and
|
|
|
|
effectively use the system. The goal here is to
|
|
|
|
explore and experiment with the system that has been
|
|
|
|
entered. By examining files and, perhaps, by a little
|
|
|
|
clever programming, the hacker may be able to obtain
|
|
|
|
protected information or more powerful access
|
|
|
|
privileges.5
|
|
|
|
|
|
|
|
Phreaking
|
|
|
|
Another role in the computer underground is that
|
|
|
|
of the "phone phreak." Phone phreaking, usually called
|
|
|
|
just "phreaking," was widely publicized when the
|
|
|
|
exploits of John "Cap'n Crunch" Draper, the "father of
|
|
|
|
phreaking," were publicized in a 1971 Esquire magazine
|
|
|
|
article.
|
|
|
|
The term "phreaking" encompasses several different
|
|
|
|
means of circumventing the billing mechanisms of
|
|
|
|
telephone companies. By using these methods, long-
|
|
____________________
|
|
|
|
5 Contrary to the image sometimes perpetuated by
|
|
computer security consultants, the data indicate that
|
|
hackers refrain from deliberately destroying data or
|
|
otherwise damaging the system. Doing so would conflict
|
|
with their instrumental goal of blending in with the
|
|
average user so as not to attract undue attention to
|
|
their presence and cause the account to be deleted.
|
|
After spending what may be a substantial amount of time
|
|
obtaining a high access account, the hacker places a
|
|
high priority on not being discovered using it.
|
|
|
|
^
|
|
|
|
|
|
|
|
28
|
|
|
|
distance phone calls can be placed without cost. In
|
|
|
|
many cases the methods also prevent, or at least
|
|
|
|
inhibit, the possibility of calls being traced to their
|
|
|
|
source thereby helping the phreaker to avoid being
|
|
|
|
caught.
|
|
|
|
Early phreaking methods involved electro-
|
|
|
|
mechanical devices that generated key tones, or altered
|
|
|
|
line voltages in certain ways as to trick the
|
|
|
|
mechanical switches of the phone company into
|
|
|
|
connecting calls without charging. However the advent
|
|
|
|
of computerized telephone-switching systems largely
|
|
|
|
made these devices obsolete. In order to continue
|
|
|
|
their practice the phreaks have had to learn hacking
|
|
|
|
skills:6
|
|
|
|
Phreaking and hacking have just recently
|
|
merged, because now, the telephone companies
|
|
are using computers to operate their network.
|
|
So, in order to learn more about these
|
|
computers in relation to the network, phreaks
|
|
have learned hacking skills, and can now
|
|
program, and get around inside the machines
|
|
(AF, message log, 1988).
|
|
|
|
For most members of the computer underground,
|
|
|
|
phreaking is simply a tool that allows them to call
|
|
|
|
long distance without amassing enormous phone bills.
|
|
____________________
|
|
|
|
6 Because the two activities are so closely
|
|
related, with phreakers learning hacking skills and
|
|
hackers breaking into "telco" computers, reference is
|
|
usually made to phreak/hacking or "p/hackers." This
|
|
paper follows this convention.
|
|
|
|
^
|
|
|
|
|
|
|
|
29
|
|
|
|
Those who have a deeper and more technically oriented
|
|
|
|
interest in the "telco" (telephone company) are known
|
|
|
|
as phreakers. They, like the hackers discussed earlier,
|
|
|
|
desire to master and explore a system that few
|
|
|
|
outsiders really understand:
|
|
|
|
The phone system is the most interesting,
|
|
fascinating thing that I know of. There is so
|
|
much to know. Even phreaks have their own
|
|
areas of knowledge. There is so much to know
|
|
that one phreak could know something fairly
|
|
important and the next phreak not. The next
|
|
phreak might know ten things that the first
|
|
phreak doesn't though. It all depends upon
|
|
where and how they get their info. I myself
|
|
%sic% would like to work for the telco, doing
|
|
something interesting, like programming a
|
|
switch. Something that isn't slave labor
|
|
bullshit. Something that you enjoy, but have
|
|
to take risks in order to participate unless
|
|
you are lucky enough to work for the telco.
|
|
To have access to telco things, manuals, etc
|
|
would be great (DP, message log, 1988).
|
|
|
|
Phreaking involves having the dedication to
|
|
commit yourself to learning as much about the
|
|
phone system/network as possible. Since most
|
|
of this information is not made public,
|
|
phreaks have to resort to legally
|
|
questionable means to obtain the knowledge
|
|
they want (TP2, message log, 1988).
|
|
|
|
|
|
|
|
Most members of the underground do not approach
|
|
|
|
the telephone system with such passion. Many hackers
|
|
|
|
are interested in the phone system solely to the extent
|
|
|
|
that they can exploit its weaknesses and pursue other
|
|
|
|
goals. In this case, phreaking becomes a means and not
|
|
|
|
a pursuit unto itself. Another individual, one who
|
|
^
|
|
|
|
|
|
|
|
30
|
|
|
|
identifies himself as a hacker, explains:
|
|
|
|
I know very little about phones . . . I just
|
|
hack. See, I can't exactly call these numbers
|
|
direct. A lot of people are in the same
|
|
boat. In my case, phreaking is a tool, an
|
|
often used one, but nonetheless a tool (TU,
|
|
message log, 1988).
|
|
|
|
|
|
In the world of the computer underground, the
|
|
|
|
ability to "phreak a call" is taken for granted. The
|
|
|
|
invention of the telephone credit card has opened the
|
|
|
|
door to wide-scale phreaking. With these cards, no
|
|
|
|
special knowledge or equipment is required to phreak a
|
|
|
|
call, only valid credit card numbers, known as "codez,"
|
|
|
|
are needed to call any location in the world. This
|
|
|
|
easy access to free long-distance service is
|
|
|
|
instrumental for maintaining contact with CU
|
|
|
|
participants scattered across the nation.
|
|
|
|
|
|
|
|
Pirating
|
|
|
|
The third major role in the computer underground
|
|
|
|
is that of the software pirate. Software piracy refers
|
|
|
|
to the unauthorized copying and distribution of copy-
|
|
|
|
righted software. This activity centers around
|
|
|
|
computer bulletin board systems that specialize in
|
|
|
|
"warez."7 There pirates can contribute and share
|
|
____________________
|
|
|
|
7 "Warez" is a common underground term that refers
|
|
to pirated software.
|
|
|
|
^
|
|
|
|
|
|
|
|
31
|
|
|
|
copies of commercial software. Having access to these
|
|
|
|
systems (usually obtained by contributing a copyrighted
|
|
|
|
program via a telephone modem) allows the pirate to
|
|
|
|
copy, or "download," between two to six programs that
|
|
|
|
others have contributed.
|
|
|
|
Software piracy is a growing concern among
|
|
|
|
software publishing companies. Some contend that the
|
|
|
|
illegal copying of software programs costs the industry
|
|
|
|
billions of dollars in lost revenues. Pirates challenge
|
|
|
|
this, and claim that in many ways pirating is a hobby,
|
|
|
|
much like collecting stamps or baseball cards, and
|
|
|
|
their participation actually induces them to spend more
|
|
|
|
on software than they would otherwise, even to the
|
|
|
|
point of buying software they don't truly need:
|
|
|
|
There's a certain sense of, ahh, satisfaction
|
|
in having the latest program, or being the
|
|
first to upload a program on the "want list."
|
|
I just like to play around with them, see
|
|
what they can do. If I like something, I'll
|
|
buy it, or try out several programs like it,
|
|
then buy one. In fact, if I wasn't pirating,
|
|
I wouldn't buy any warez, because some of
|
|
these I buy I do for uploading or just for
|
|
the fun of it. So I figure the software
|
|
companies are making money off me, and this
|
|
is pretty much the same for all the really
|
|
elite boards, the ones that have the best and
|
|
most programs. . . . I just bought a $117.
|
|
program, an accounting program, and I have
|
|
absolutely no use for it. It's for small
|
|
businesses. I thought maybe it would auto-
|
|
write checks, but it's really a bit too high
|
|
powered for me. I thought it would be fun to
|
|
trade to some other boards, but I learned a
|
|
lot from just looking at it (JX, field notes,
|
|
1989).
|
|
^
|
|
|
|
|
|
|
|
32
|
|
|
|
|
|
Pirates and phreak/hackers do not necessarily
|
|
|
|
support the activities of each other, and there is
|
|
|
|
distrust and misunderstanding between the two groups.
|
|
|
|
At least part of this distrust lies in the
|
|
|
|
phreak/hacker perception that piracy is an unskilled
|
|
|
|
activity.8 While p/hackers probably don't disapprove
|
|
|
|
of piracy as an activity, they nevertheless tend to
|
|
|
|
avoid pirate bulletin board systems --partly because
|
|
|
|
there is little pertinent phreak/hack information
|
|
|
|
contained on them, and partly because of the belief
|
|
|
|
that pirates indiscriminately abuse the telephone
|
|
|
|
network in pursuit of the latest computer game. One
|
|
|
|
hacker illustrates this belief by theorizing that
|
|
|
|
pirates are responsible for a large part of telephone
|
|
|
|
credit card fraud.
|
|
|
|
The media claims that it is solely hackers
|
|
who are responsible for losses pertaining to
|
|
large telecommunication companies and long
|
|
distance services. This is not the case. We
|
|
are %hackers% but a small portion of these
|
|
losses. The rest are caused by pirates and
|
|
thieves who sell these codes to people on the
|
|
street (AF, message log, 1988).
|
|
|
|
Other hackers complained that uploading large
|
|
____________________
|
|
|
|
8 A possible exception to this are those pirates
|
|
that have the programming skills needed to remove copy
|
|
protection from software. By removing the program code
|
|
that inhibits duplicate copies from being made these
|
|
individuals, known as "crackers," contribute greatly to
|
|
the easy distribution of "warez."
|
|
|
|
^
|
|
|
|
|
|
|
|
33
|
|
|
|
programs frequently takes several hours to complete,
|
|
|
|
and it is pirate calls, not the ones placed by "tele-
|
|
|
|
communications enthusiasts" (a popular euphemism for
|
|
|
|
phreakers and hackers) that cost the telephone industry
|
|
|
|
large sums of money. However, the data do not support
|
|
|
|
the assertation that all pirates phreak their calls.
|
|
|
|
Phreaking is considered "very tacky" among elite
|
|
|
|
pirates, and system operators (Sysops) of pirate
|
|
|
|
bulletin boards discourage phreaked calls because it
|
|
|
|
draws attention to the system when the call is
|
|
|
|
discovered by the telephone company.
|
|
|
|
Regardless of whether it is the lack of phreak/
|
|
|
|
hack skills, the reputation for abusing the network, or
|
|
|
|
some other reason, there is indeed a certain amount of
|
|
|
|
division between the world of phreakers and hackers and
|
|
|
|
that of pirates. The two communities co-exist and share
|
|
|
|
resources and methods, but function separately.
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
|
|
|
|
|
Social Organization and Deviant Associations
|
|
|
|
Having outlined and defined the activities of the
|
|
|
|
computer underground, the question of social
|
|
|
|
organization can be addressed. Joel Best and David
|
|
|
|
Luckenbill (1982) have developed a typology for
|
|
|
|
identifying the social organization of deviant
|
|
|
|
associations. Essentially they state that deviant
|
|
|
|
organizations, regardless of their actual type of
|
|
|
|
deviance, will vary in the complexity of their division
|
|
|
|
of labor, coordination among organization roles, and
|
|
|
|
the purposiveness with which they attempt to achieve
|
|
|
|
their goals. Those organizations which display high
|
|
|
|
levels in each of these categories are more
|
|
|
|
sophisticated than those with lower levels.
|
|
|
|
Deviants relations with one another can be
|
|
arrayed along the dimension of organizational
|
|
sophistication. Beginning with the least
|
|
sophisticated form, %we% discuss five forms
|
|
of the social organization of deviants:
|
|
loners, colleagues, peers, mobs, and formal
|
|
organizations. These organization forms are
|
|
defined in terms of four variables: whether
|
|
the deviants associate with one another;
|
|
whether they participate in deviance
|
|
together; whether their deviance requires an
|
|
elaborate division of labor; and whether
|
|
their organization's activities extend over
|
|
time and space (Best and Luckenbill, 1982,
|
|
p.24).
|
|
|
|
These four variables, also known as mutual association,
|
|
|
|
mutual participation, elaborate division of labor, and
|
|
^
|
|
|
|
|
|
|
|
35
|
|
|
|
extended organization, are indicators of the social
|
|
|
|
organization of deviant groups. The following, taken
|
|
|
|
from Best and Luckenbill, illustrates:
|
|
|
|
FORM OF MUTUAL MUTUAL DIVISION EXTENDED
|
|
ORGAN- ASSOCIA- PARTICIPA- OF ORGAN-
|
|
IZATION TION TION LABOR IZATION
|
|
-----------------------------------------------------
|
|
Loners no no no no
|
|
Colleagues yes no no no
|
|
Peers yes yes no no
|
|
Mobs yes yes yes no
|
|
Formal
|
|
Organizations yes yes yes yes
|
|
_____________________________________________________
|
|
(1982, p.25)
|
|
|
|
|
|
Loners do not associate with other deviants,
|
|
participate in shared deviance, have a
|
|
division of labor, or maintain their deviance
|
|
over extended time and space. Colleagues
|
|
differ from loners because they associate
|
|
with fellow deviants. Peers not only
|
|
associate with one another, but also
|
|
participate in deviance together. In mobs,
|
|
this shared participation requires an
|
|
elaborate division of labor. Finally, formal
|
|
organizations involve mutual association,
|
|
mutual participation, an elaborate division
|
|
of labor, and deviant activities extended
|
|
over time and space (Best and Luckenbill,
|
|
1982, pp.24-25).
|
|
|
|
The five forms of organizations are presented as
|
|
|
|
ideal types, and "organizational sophistication" should
|
|
|
|
be regarded as forming a continuum with groups located
|
|
|
|
at various points along the range (Best and Luckenbill,
|
|
|
|
1982, p.25). With these two caveats in mind, we begin
|
|
|
|
to examine the computer underground in terms of each of
|
|
^
|
|
|
|
|
|
|
|
36
|
|
|
|
the four organizational variables. The first level,
|
|
|
|
mutual association, is addressed in the following
|
|
|
|
section.
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
|
|
|
|
|
Mutual Association
|
|
|
|
Mutual association is an indicator of
|
|
|
|
organizational sophistication in deviant associations.
|
|
|
|
Its presence in the computer underground indicates that
|
|
|
|
on a social organization level phreak/hackers act as
|
|
|
|
"colleagues." Best and Luckenbill discuss the
|
|
|
|
advantages of mutual association for unconventional
|
|
|
|
groups:
|
|
|
|
The more sophisticated the form of
|
|
organization, the more likely the deviants
|
|
can help one another with their problems.
|
|
Deviants help one another in many ways: by
|
|
teaching each other deviant skills and a
|
|
deviant ideology; by working together to
|
|
carry out complicated tasks; by giving each
|
|
other sociable contacts and moral support; by
|
|
supplying one another with deviant equipment;
|
|
by protecting each other from the
|
|
authorities; and so forth. Just as %others%
|
|
rely on one another in the course of everyday
|
|
life, deviants find it easier to cope with
|
|
practical problems when they have the help of
|
|
deviant associates (1982,pp.27-28).
|
|
|
|
|
|
Hackers, phreakers, and pirates face practical
|
|
|
|
problems. For example, in order to pursue their
|
|
|
|
activities they require equipment9 and knowledge. The
|
|
____________________
|
|
|
|
9 The basic equipment consists of a modem, phone
|
|
line, and a computer -- all items that are available
|
|
through legitimate channels. It is the way the
|
|
equipment is used, and the associated knowledge that is
|
|
required, that distinguishes hackers from other
|
|
computer users.
|
|
|
|
^
|
|
|
|
|
|
|
|
38
|
|
|
|
problem of acquiring the latter must be solved and,
|
|
|
|
additionally, they must devise ways to prevent
|
|
|
|
discovery , apprehension and sanctioning by social
|
|
|
|
control agents.10
|
|
|
|
One method of solving these problems is to turn to
|
|
|
|
other CU members for help and support. Various means
|
|
|
|
of communication have been established that allow
|
|
|
|
individuals to interact regardless of their location.
|
|
|
|
As might be expected, the communication channels used
|
|
|
|
by the CU reflect their interest and ability in high-
|
|
|
|
technology, but the technical aspects of these methods
|
|
|
|
should not overshadow the mutual association that they
|
|
|
|
support. This section examines the structure of
|
|
|
|
mutual association within the computer underground.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
____________________
|
|
|
|
|
|
|
|
10 Telephone company security personnel, local law
|
|
enforcement, FBI, and Secret Service agents have all
|
|
been involved in apprehending hackers.
|
|
|
|
^
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
|
|
|
|
|
The Structure of the Computer Underground
|
|
|
|
Both computer underground communities, the
|
|
|
|
p/hackers and the pirates, depend on communications
|
|
|
|
technology to provide meeting places for social and
|
|
|
|
"occupational" exchanges. However, phreakers, hackers,
|
|
|
|
and pirates are widely dispersed across the country
|
|
|
|
and, in many cases, the globe. In order for the
|
|
|
|
communication to be organized and available to
|
|
|
|
participants in many time zones and "working" under
|
|
|
|
different schedules, centralized points of information
|
|
|
|
distribution are required. Several existing
|
|
|
|
technologies --computer bulletin boards, voice mail
|
|
|
|
boxes, "chat" lines, and telephone bridges/loops --
|
|
|
|
have been adopted by the CU for use as communication
|
|
|
|
points. Each of these technologies will be addressed in
|
|
|
|
turn, giving cultural insight into CU activities, and
|
|
|
|
illustrating mutual association among CU participants.
|
|
|
|
|
|
|
|
Bulletin Board Systems
|
|
|
|
Communication in the computer underground takes
|
|
|
|
place largely at night, and primarily through Bulletin
|
|
|
|
Board Systems (BBS). By calling these systems and
|
|
|
|
"logging on" with an account and password individuals
|
|
|
|
can leave messages to each other, download files and
|
|
^
|
|
|
|
|
|
|
|
40
|
|
|
|
programs, and, depending on the number of phone lines
|
|
|
|
into the system, type messages to other users that may
|
|
|
|
be logged on at the same time.
|
|
|
|
Computer Bulletin Board Systems, or "boards," are
|
|
|
|
quite common in this computerized age. Nearly every
|
|
|
|
medium-sized city or town has at least one. But not all
|
|
|
|
BBS are part of the computer underground culture. In
|
|
|
|
fact, many systems prohibit users from discussing CU
|
|
|
|
related activity. However, since all bulletin boards
|
|
|
|
systems essentially function alike it is only the
|
|
|
|
content, users, and CU culture that distinguish an
|
|
|
|
"underground" from a "legitimate" bulletin board.
|
|
|
|
Computer Underground BBS are generally owned and
|
|
|
|
operated by a single person (known as the "system
|
|
|
|
operator" or "sysop"). Typically setup in a spare
|
|
|
|
bedroom, the costs of running the system are paid by
|
|
|
|
the sysop, though some boards solicit donations from
|
|
|
|
users. The sysop maintains the board and allocates
|
|
|
|
accounts to people who call the system.
|
|
|
|
It is difficult to assess the number of
|
|
|
|
underground bulletin boards in operation at any one
|
|
|
|
time. BBS in general are transitory in nature, and CU
|
|
|
|
boards are no exception to this. Since they are
|
|
|
|
operated by private individuals, they are often set up
|
|
|
|
and closed down at the whim of the operator. A week
|
|
^
|
|
|
|
|
|
|
|
41
|
|
|
|
that sees two new boards come online may also see
|
|
|
|
another close down. A "lifetime" of anywhere from 1
|
|
|
|
month to 1-1/2 years is common for pirate and
|
|
|
|
phreak/hack boards.11 One BBS, claimed to be the
|
|
|
|
"busiest phreak/hack board in the country" at the
|
|
|
|
time,12 operated for less than one year and was
|
|
|
|
suddenly closed when the operator was laid off work.
|
|
|
|
Further compounding the difficulty of estimating
|
|
|
|
the number of CU boards is their "underground" status.
|
|
|
|
CU systems do not typically publicize their existence.
|
|
|
|
However, once access to one has been achieved, it is
|
|
|
|
easy to learn of other systems by asking users for the
|
|
|
|
phone numbers. Additionally, most BBS maintain lists
|
|
|
|
of other boards that users can download or read. So it
|
|
|
|
is possible, despite the difficulties, to get a feel
|
|
|
|
for the number of CU boards in operation. Pirate
|
|
|
|
boards are the most common of "underground" BBS. While
|
|
|
|
there is no national "directory" of pirate boards,
|
|
|
|
there are several listings of numbers for specific
|
|
____________________
|
|
|
|
11 While some non-CU BBS' have been operating
|
|
since 1981, the longest operating phreak/hack board has
|
|
only been in operation since 1984.
|
|
|
|
|
|
12 At it's peak this p/h board was receiving 1000
|
|
calls a month and supported a community of 167 users
|
|
(TP BBS, message log, 1989).
|
|
|
|
^
|
|
|
|
|
|
|
|
42
|
|
|
|
computer brands.13 One list of Apple pirate boards has
|
|
|
|
700 entries. Another, for IBM boards, lists just over
|
|
|
|
500. While there is no way of determining if these
|
|
|
|
lists are comprehensive, they provide a minimum
|
|
|
|
estimate. Pirate boards for systems other than IBM or
|
|
|
|
Apple seem to exhibit similar numbers. David Small, a
|
|
|
|
software developer that has taken an aggressive stance
|
|
|
|
in closing down pirate boards, estimates that there are
|
|
|
|
two thousand in existence at any one time (1988).
|
|
|
|
Based on the boards discovered in the course of this
|
|
|
|
research, and working from an assumption that each of
|
|
|
|
the four major brands of microcomputers have equal
|
|
|
|
numbers of pirate boards, two thousand is a reasonable
|
|
|
|
estimate.
|
|
|
|
The phreak/hack BBS community is not divided by
|
|
|
|
differing brands of micro-computers. The applicability
|
|
|
|
of phreak/hack information to a wide range of systems
|
|
|
|
does not require the specialization that pirate boards
|
|
|
|
exhibit. This makes it easier to estimate the number
|
|
|
|
of systems in this category.
|
|
|
|
John Maxfield, a computer security consultant, has
|
|
|
|
asserted that there are "thousands" of phreak/hack
|
|
____________________
|
|
|
|
13 Pirate boards are normally "system specific" in
|
|
that they only support one brand or model of
|
|
microcomputer.
|
|
|
|
^
|
|
|
|
|
|
|
|
43
|
|
|
|
boards in existence (WGN-Radio, November 1988). The
|
|
|
|
data, however, do not confirm this. A list of
|
|
|
|
phreak/hack boards compiled by asking active p/hackers
|
|
|
|
and downloading BBS lists from known phreak/hack
|
|
|
|
boards, indicates that there are probably no more than
|
|
|
|
one hundred. Experienced phreak/hackers say that the
|
|
|
|
quality of these boards varies greatly, and of those
|
|
|
|
that are in operation today only a few (less than ten)
|
|
|
|
attract the active and knowledgeable user.
|
|
|
|
Right after "War Games" came out there must
|
|
have been hundreds of hacker bulletin boards
|
|
spring up. But 99% of those were lame. Just a
|
|
bunch of dumb kids that saw the movie and
|
|
spent all there %sic% time asking "anyone got
|
|
any k00l numberz?" instead of actually
|
|
hacking on anything. But for a while there
|
|
was %sic% maybe ten systems worth calling . .
|
|
. where you could actually learn something
|
|
and talk to people who knew what was going
|
|
Nowadays %sic% there are maybe three that I
|
|
consider good . . . and about four or five
|
|
others that are okay. The problem is that
|
|
anybody can set up a board with a k-rad name
|
|
and call it a hacker board and the media/feds
|
|
will consider it one if it gets busted. But
|
|
it never really was worth a shit from the
|
|
beginning.(TP2, field notes, 1989)
|
|
|
|
|
|
Towards a BBS Culture. Defining and identifying
|
|
|
|
CU boards can be problematic. The lack of an ideal
|
|
|
|
type undoubtedly contributes to the varying estimates
|
|
|
|
of the number of CU bulletin board systems. While
|
|
|
|
developing such a typology is not the intent of this
|
|
|
|
work, it is appropriate to examine the activities and
|
|
^
|
|
|
|
|
|
|
|
44
|
|
|
|
characteristics exhibited by BBS supporting the pirate
|
|
|
|
and phreak/hack communities. While much of the culture
|
|
|
|
of pirate and phreak/hack worlds overlap, there are
|
|
|
|
some differences in terms of how the BBS medium is used
|
|
|
|
to serve their interests. We begin with a short
|
|
|
|
discussion of the differences between the two
|
|
|
|
communities, then discuss cultural characteristics
|
|
|
|
common to all CU BBS systems.
|
|
|
|
All BBS feature a "files area" where programs and
|
|
|
|
text files are available for downloading by users.
|
|
|
|
Initially these programs/files are supplied by the
|
|
|
|
system operator, but as the board grows they are
|
|
|
|
contributed (called "uploading") by callers. The
|
|
|
|
content and size of the files area differs according to
|
|
|
|
whether the board supports the pirate or phreak/hack
|
|
|
|
community.
|
|
|
|
The files area on a pirate board consists
|
|
|
|
primarily of programs and program documentation.
|
|
|
|
Normally these programs are for only one brand of
|
|
|
|
micro-computer (usually the same as the system is being
|
|
|
|
run on). Text files on general or non-computer topics
|
|
|
|
are uncommon. A "files area" menu from a pirate BBS
|
|
|
|
illustrates the emphasis on software:
|
|
|
|
%1% Documentation %2% Telecommunications
|
|
%3% Misc Applications %4% Word Processing
|
|
%5% Graphics %6% Utilities
|
|
%7% Games 1 %8% Games 2
|
|
^
|
|
|
|
|
|
|
|
45
|
|
|
|
%9% XXX Rated %10% Elite_1
|
|
%11% Elite_2 %12% Super_Elite
|
|
(IN BBS, message log, 1988)
|
|
|
|
The "files area" on a phreak/hack BBS is
|
|
|
|
noticeably smaller than it is on pirate systems. It
|
|
|
|
consists primarily of instructional files (known as "g-
|
|
|
|
files" for "general files") and copies of phreak/hack
|
|
|
|
newsletters and journals. Pirated commercial software
|
|
|
|
is very rare; any programs that are available are
|
|
|
|
usually non-copyrighted specialized programs used to
|
|
|
|
automate the more mundane aspects of phreaking or
|
|
|
|
hacking. It is not uncommon to find them in forms
|
|
|
|
usable by different brands of computers. A "files
|
|
|
|
area" list from a phreak/hack BBS is listed here
|
|
|
|
(edited for size):
|
|
|
|
Misc Stuff
|
|
-------------
|
|
BRR2 .TXT: Bell Research Report Volume II
|
|
BRR1 .TXT: Bell Research Report Volume I
|
|
CONFIDE .ARC: Confide v1.0 DES
|
|
EnCryption/DeCryption
|
|
CNA .TXT: A bunch of CNA numbers
|
|
CLIPS .ARC: newsclippings/articles on hackers
|
|
and busts
|
|
ESS1 .TXT: FILE DESCRIBING THE ESS1 CHIP
|
|
TELEPHON.TXT: NY Times Article on hackers/phreaks
|
|
HP-3000 .TXT: This tells a little info about hp
|
|
VIRUS .TXT: Digest of PC anti-viral programs.
|
|
|
|
Hack/Phreak Programs
|
|
-----------------------
|
|
THIEF .ARC: Code Thief for IBM!
|
|
PC-LOK11.ARC: IBM Hard Disk Lock Utility- fairly
|
|
good.
|
|
PHONELIS.COM: Do a PHONE DIR command on VAX from
|
|
DCL.
|
|
XMO .FOR: VAX Xmodem Package in FORTRAN
|
|
^
|
|
|
|
|
|
|
|
46
|
|
|
|
PASSWORD.ARC: IBM Password on bootup. Not too
|
|
bad.
|
|
|
|
Archived Gfiles
|
|
----------------------
|
|
PHRACK15.ARC: Phrack #15
|
|
PHRACK10.ARC: Phrack #10
|
|
PHRACK20.ARC: Phrack #20
|
|
ATI1_6.ARC : ATI issues one thru six
|
|
PHRACK5.ARC : Phrack #5
|
|
PHRACK25.ARC: Phrack #25
|
|
PHUN1.ARC : P/Hun first issue
|
|
TCSJ.ARC : Telecom Security Journal
|
|
ATI31.ARC : Activist Times Inc number 31
|
|
LODTECH3.ARC: LoD Tech Journal three
|
|
(TPP BBS, message log, 1988)
|
|
|
|
The difference in files area size is consistent
|
|
|
|
with the activities of pirates and phreak/hackers. The
|
|
|
|
main commodity of exchange between pirates is, as
|
|
|
|
discussed earlier, copyrighted software thus accounting
|
|
|
|
for the heavy use of that area of the board that
|
|
|
|
permits exchange of programs. The phreak/hackers, on
|
|
|
|
the other hand, primarily exchange information about
|
|
|
|
outside systems and techniques. Their interests are
|
|
|
|
better served by the "message bases" of BBS.
|
|
|
|
The "message bases" (areas where callers leave
|
|
|
|
messages to other users) are heavily used on
|
|
|
|
phreak/hack systems. The messages are not specific to
|
|
|
|
one brand of micro-computer due to the fact that not
|
|
|
|
all users own the same equipment. Rather than focus on
|
|
|
|
the equipment owned by the phreak/hacker, the messages
|
|
|
|
deal with their "targets." Everything from
|
|
|
|
phreak/hacking techniques to CU gossip is discussed. On
|
|
^
|
|
|
|
|
|
|
|
47
|
|
|
|
some boards all the messages, regardless of topic, are
|
|
|
|
strung together in one area. But on others there are
|
|
|
|
separate areas dealing with specific networks and
|
|
|
|
mainframe computers:
|
|
|
|
Message Boards available:
|
|
|
|
1 : General
|
|
2 : Telecommunications
|
|
3 : Electronics
|
|
4 : Packet Switched Nets
|
|
5 : VAX/DEC
|
|
6 : Unix
|
|
7 : Primos
|
|
8 : HP-x000
|
|
9 : Engineering
|
|
10 : Programming & Theory
|
|
11 : Phrack Inc.
|
|
12 : Sociological Inquiries
|
|
13 : Security Personnel & Discussion
|
|
14 : Upper Deck
|
|
15 : Instructors
|
|
(TPP BBS, message log, 1988)
|
|
|
|
|
|
The pirate community, on the other hand, makes
|
|
|
|
little use of the "message bases." Most users prefer to
|
|
|
|
spend their time (which may be limited by the system
|
|
|
|
operator on a per day or per call basis) uploading
|
|
|
|
and/or downloading files rather than leaving messages
|
|
|
|
for others. Those messages that do exist are usually
|
|
|
|
specific to the pirating enterprise such as help with
|
|
|
|
programs on the board, requests for specific programs
|
|
|
|
("want lists"), and notices about other pirate bulletin
|
|
|
|
boards that users may want to call. Occasional
|
|
|
|
discussion of phreaking may occur, but the emphasis is
|
|
^
|
|
|
|
|
|
|
|
48
|
|
|
|
on techniques used to make free calls, not technical
|
|
|
|
network discussions as often occurs on phreak/hack
|
|
|
|
systems. A list of message areas from a large pirate
|
|
|
|
BBS illustrates the emphasis on the pirating
|
|
|
|
enterprise. A message area for general discussions has
|
|
|
|
been created, but those areas devoted to pirating
|
|
|
|
display more use:
|
|
|
|
Area %1% General Discussion 15 messages
|
|
Area %2% Pirating Only!! 75 messages
|
|
Area %3% Warez Wants 31 messages
|
|
Area %4% **private messages** 10 messages
|
|
(TL BBS, message log, 1988)
|
|
|
|
|
|
In addition to the differences between files and
|
|
|
|
message use on pirate and phreak/hack boards, they
|
|
|
|
differ in degree of community cohesiveness. Every BBS
|
|
|
|
has a group of "users" --the people who have accounts
|
|
|
|
on the system. The group of users that call a specific
|
|
|
|
BBS can be considered to be a "community" of loosely
|
|
|
|
associated individuals by virtue of their "membership"
|
|
|
|
in the BBS.
|
|
|
|
Additionally, the system itself, serving either
|
|
|
|
pirates or phreak/hackers, exists within a loose
|
|
|
|
network of other bulletin boards that serve these same
|
|
|
|
interests. It is within this larger community where
|
|
|
|
pirate and phreak/hack boards seem to differ.
|
|
|
|
Due to the brand-specific nature of pirate boards,
|
|
|
|
there is not a strong network between pirate BBS that
|
|
^
|
|
|
|
|
|
|
|
49
|
|
|
|
operate on other systems. This is understandable as a
|
|
|
|
pirate that owned an Apple computer would have little
|
|
|
|
use for the programs found on an IBM board. However,
|
|
|
|
this creates separate communities of active pirates,
|
|
|
|
each loosely associated with other users of their
|
|
|
|
computer type, but with little or no contact with
|
|
|
|
pirate communities on other systems.
|
|
|
|
There is, however, a degree of cohesiveness among
|
|
|
|
pirate boards that support the same micro-computers.
|
|
|
|
While the users may be different on systems, the data
|
|
|
|
shows that some pirate boards are "networked" with each
|
|
|
|
other via special software that allows messages and
|
|
|
|
files to be automatically shared between different
|
|
|
|
boards. Thus a message posted on a west coast pirate
|
|
|
|
board will be automatically copied on an east coast BBS
|
|
|
|
later that night. In a like manner, software programs
|
|
|
|
can be sent between "networked" boards. The extent of
|
|
|
|
this network is unknown.
|
|
|
|
The pirate BBS community also exhibits
|
|
|
|
cohesiveness in the form of "co-sysops." As discussed
|
|
|
|
earlier, sysops are the system operators and usually
|
|
|
|
owners of BBS. On some pirate boards, "co-sysop"
|
|
|
|
distinction is given to an operator of another board,
|
|
|
|
often located in another state. This forms a loose
|
|
|
|
network of "sister boards" where the sysop of one has
|
|
^
|
|
|
|
|
|
|
|
50
|
|
|
|
co-sysop privileges on the other. However, this
|
|
|
|
cooperative effort appears to be limited mainly to the
|
|
|
|
system operators as comparing user lists from sister
|
|
|
|
boards shows little overlap between the regular
|
|
|
|
callers. How co-sysop positions are utilized is
|
|
|
|
unknown, and it is suspected that they are largely
|
|
|
|
honorary. But nonetheless it is indicative of mutual
|
|
|
|
association between a small number of boards.
|
|
|
|
The phreak/hack board community does not exhibit
|
|
|
|
the same brand-specific division as the pirate
|
|
|
|
community. Unlike the divided community of pirates,
|
|
|
|
phreak/hackers appear to maintain contacts throughout
|
|
|
|
the country. Obtaining and comparing user lists from
|
|
|
|
several phreak/hack BBS reveals largely the same group
|
|
|
|
of people using several different boards across the
|
|
|
|
country.14 While phreak/hack boards have yet to adopt
|
|
|
|
the "networking" software used by pirate boards, an
|
|
|
|
active group of phreak/hackers is known to use the
|
|
|
|
sophisticated university mainframe computer network,
|
|
|
|
called Bitnet, to exchange phreak/hack newsletters and
|
|
|
|
gossip.
|
|
|
|
Despite the operational differences between pirate
|
|
____________________
|
|
|
|
14 In fact, users lists from phreak/hack BBSs
|
|
located in Europe and Australia show that many U.S.
|
|
p/hackers utilize these systems as well.
|
|
|
|
^
|
|
|
|
|
|
|
|
51
|
|
|
|
and phreak/hack boards, their cultures are remarkably
|
|
|
|
similar. Any discussion of the computer underground
|
|
|
|
must include both communities. Additionally, a
|
|
|
|
formulation of the culture of CU BBS must address the
|
|
|
|
means in which access to the board, and thus deviant
|
|
|
|
associates, is obtained.
|
|
|
|
For a caller to successfully enter the CU BBS
|
|
|
|
community, he must display an awareness of CU culture
|
|
|
|
and technical skill in the CU enterprise. If the caller
|
|
|
|
fails to exhibit cultural knowledge, then access to the
|
|
|
|
board is unlikely to be granted. The ways in which
|
|
|
|
this cultural knowledge is obtained and displayed
|
|
|
|
illustrates the social nature of the CU and further
|
|
|
|
displays some of the subcultural norms of behavior.
|
|
|
|
On most "licit" (non-underground) boards,
|
|
|
|
obtaining permission to use the system is accomplished
|
|
|
|
by logging on and providing a name and home phone
|
|
|
|
number to the system operator (sysop). Sysop's
|
|
|
|
normally do not check the validity of the information,
|
|
|
|
and once a caller has provided it he or she is granted
|
|
|
|
full access to the system. There is normally one level
|
|
|
|
of access for all users, with only the sysop having
|
|
|
|
more "powerful" access.
|
|
|
|
Obtaining access to underground bulletin boards is
|
|
|
|
more complicated and requires more steps to complete.
|
|
^
|
|
|
|
|
|
|
|
52
|
|
|
|
In an attempt to prevent law enforcement agents
|
|
|
|
("feds") from obtaining accounts on systems where
|
|
|
|
pirates or p/hackers are vulnerable, if not to actual
|
|
|
|
arrest, then at least to exposing their latest act-
|
|
|
|
ivities and methods, sysop's of illicit boards attempt
|
|
|
|
to limit access to the system.
|
|
|
|
One method of doing this is to restrict
|
|
|
|
publicizing the existence of the board. Computer
|
|
|
|
underground BBS are not normally included in BBS
|
|
|
|
listings found in computer books and magazines, and
|
|
|
|
there is a norm, particularly strong on p/hack systems,
|
|
|
|
that the boards are not to be mentioned on non-CU
|
|
|
|
systems. There are, however, some "entry-level" CU BBS
|
|
|
|
that are fairly well known. These systems are known as
|
|
|
|
"anarchist" boards.
|
|
|
|
"Anarchist" boards, while exhibiting many of the
|
|
|
|
same characteristics as pirate and phreak/hack boards,
|
|
|
|
are really a cross between the two and serve primarily
|
|
|
|
as social outlets for both pirates and phreak/hackers.
|
|
|
|
The message areas on "anarchist" boards are quite
|
|
|
|
active, "chatty" messages are not discouraged. Indeed
|
|
|
|
there are normally several different message areas
|
|
|
|
devoted to a wide range of topics including everything
|
|
|
|
from "skipping school" to "punk rock." The files area
|
|
|
|
contains both warez (but normally only the newest
|
|
^
|
|
|
|
|
|
|
|
53
|
|
|
|
games, and specific to the computer system that the
|
|
|
|
board runs on) and phreak/hack text files. Neither
|
|
|
|
collection is as extensive as it would be on pirate-
|
|
|
|
only or p/hack-only systems.
|
|
|
|
The data suggest that one function of "anarchist"
|
|
|
|
boards is to introduce newcomers to the culture of the
|
|
|
|
computer underground. By acting as "feeder boards,"
|
|
|
|
they can provide preliminary socialization and
|
|
|
|
instruction for CU behavior and techniques.
|
|
|
|
Additionally, "anarchist" boards frequently provide
|
|
|
|
areas where phone numbers to pirate and p/hack systems
|
|
|
|
can be traded, thus providing systems where more in-
|
|
|
|
depth information, and other contacts, can be found. A
|
|
|
|
phreak/hacker describes how an "anarchist" board was
|
|
|
|
instrumental in introducing him to the computer
|
|
|
|
underground:
|
|
|
|
I've been phreaking and hacking for about
|
|
four years now. I discovered phreaking on my
|
|
own at this place I used to work. We had
|
|
this small LD %long distance% provider that
|
|
used codez so I started hacking them out and
|
|
calling places myself . . . but I didn't know
|
|
no other phreaks at that time. Then I
|
|
started using the codez to call boards from
|
|
home on my computer. Somebody gave me the
|
|
number to Jack Black's Whore House %an
|
|
"anarchy board"% and I started learning about
|
|
hacking and shit from the people and philes
|
|
they had there. Then one day this guy, King
|
|
Hammer, sent me some e-mail %a private
|
|
message% and told me to call his system.
|
|
That's where I really learned my way around
|
|
the nets and shit. You could ask questions
|
|
and people would help you out and stuff. If I
|
|
^
|
|
|
|
|
|
|
|
54
|
|
|
|
hadn't found out some of the tricks that I
|
|
did I probably would have got busted by now.
|
|
(TP2, field notes, 1989)
|
|
|
|
Once an individual has obtained the telephone
|
|
|
|
number to a CU BBS, through whatever channels, callers
|
|
|
|
follow essentially the same procedure as they do on
|
|
|
|
licit systems . . . that of calling and logging on.
|
|
|
|
However, since "underground" boards are not truly
|
|
|
|
underground (that is, totally secret) first-time
|
|
|
|
callers are not given access to the board itself. When
|
|
|
|
a user is unable to provide an already valid
|
|
|
|
username/password, the system will automatically begin
|
|
|
|
its registration procedure. First, the caller is
|
|
|
|
asked to enter a "username" (the name used by the
|
|
|
|
system to distinguish between callers) and "phone
|
|
|
|
number." These first system requests, normally seen
|
|
|
|
only as "Enter Your Name and Phone Number," serve as
|
|
|
|
partial screens to keep out non-underground callers
|
|
|
|
that may have happened across the board. The way that
|
|
|
|
a user responds to these questions indicates if they
|
|
|
|
have cultural knowledge of the CU. The norm is to
|
|
|
|
enter a pseudonym and a fake phone number.15 If a
|
|
____________________
|
|
|
|
15 A functional reason for this norm is that
|
|
usernames and telephone numbers are stored on the
|
|
computer as part of the BBS system files. Should the
|
|
BBS ever be seized in legal proceedings, this list of
|
|
names and numbers (and on some systems addresses . . .
|
|
which are also normally false) could be used to
|
|
identify the users of the system.
|
|
|
|
^
|
|
|
|
|
|
|
|
55
|
|
|
|
caller enters his or her real name (or at least a name
|
|
|
|
that does not appear to be a pseudonym) the system
|
|
|
|
operator will be put on guard that the caller may not
|
|
|
|
be aware of the type of board that he has called, for
|
|
|
|
the pseudonym is the most visible of CU cultural
|
|
|
|
traits.
|
|
|
|
All members of the underground adopt "handles" to
|
|
|
|
protect their identity. The pseudonyms become second
|
|
|
|
identities and are used to log onto bulletin boards,
|
|
|
|
and as "signatures" on messages and instructional text
|
|
|
|
files.16 They are not unlike those adopted by
|
|
|
|
citizens-band radio users, and reflect both the humor
|
|
|
|
and technical orientation of computer underground
|
|
|
|
participants. A review of handles used by phreakers,
|
|
|
|
hackers, and pirates finds that they fall into three
|
|
|
|
broad categories: figures from literature, films, and
|
|
|
|
entertainment (often science fiction); names that play
|
|
|
|
upon computers and related technologies; and
|
|
|
|
nouns/descriptive names. (See Appendix A for fictional
|
|
|
|
examples of each.)
|
|
|
|
After providing a user name and entering a
|
|
|
|
____________________
|
|
|
|
|
|
|
|
16 The data suggest that, on the whole,
|
|
individuals retain their handles over time.
|
|
|
|
^
|
|
|
|
|
|
|
|
56
|
|
|
|
password to be used for future calls, the caller is
|
|
|
|
asked several more questions designed to screen users
|
|
|
|
and determine initial access privileges. Unlike licit
|
|
|
|
boards, underground BBS may have several different
|
|
|
|
levels of access with only the most trusted users being
|
|
|
|
able to read messages and get files in "elite" or "high
|
|
|
|
access" areas that are unknown and unavailable to other
|
|
|
|
callers. In many cases, pirate boards are able to
|
|
|
|
operate "above ground" and appear to be open-public
|
|
|
|
access systems unless callers have the proper
|
|
|
|
privileges to access the areas where the "good stuff"
|
|
|
|
is located. The answers given to access questionnaires
|
|
|
|
determine whether a caller will receive access to some,
|
|
|
|
all, or none of the higher levels.
|
|
|
|
These questionnaires frequently ask for "personal
|
|
|
|
references" and a list of other boards the caller has
|
|
|
|
"high access" on. The question is vague, and random
|
|
|
|
callers are unlikely to answer it correctly. However,
|
|
|
|
if the caller lists pseudonyms of other CU members that
|
|
|
|
are known and trustworthy to the sysop, as well as some
|
|
|
|
other boards that are known to have "good users" and
|
|
|
|
"good security" access will usually be granted.17 If
|
|
|
|
all the answers are relevant and indicative of CU
|
|
____________________
|
|
|
|
17 The data suggest that personal references are
|
|
only checked if something seems unusual or suspicious.
|
|
|
|
^
|
|
|
|
|
|
|
|
57
|
|
|
|
knowledge, then initial access is normally granted.
|
|
|
|
Other methods of controlling access include
|
|
|
|
presenting a "quiz" to determine if the technical
|
|
|
|
knowledge of the user is up to par with the expertise
|
|
|
|
expected on the boards.18 Some systems, instead of a
|
|
|
|
quiz, ask the user to write a short statement (100
|
|
|
|
words or less) about why they want access, where they
|
|
|
|
got the phone number to the system, and what they can
|
|
|
|
provide to other users. Some pirate boards come right
|
|
|
|
out and ask the user to supply a list of the good
|
|
|
|
"warez" that they can upload and what they are looking
|
|
|
|
to download. If the caller fails to list recent
|
|
|
|
copyrighted programs then it is evident that they are
|
|
|
|
unaware of the nature of the BBS:
|
|
|
|
I had this one dude call up and he told me in
|
|
his message that he was looking for some
|
|
"good games." So instead of giving him
|
|
access I just left him some e-mail %a private
|
|
message%. I asked what kind of games he was
|
|
looking for. Next time he called he wrote
|
|
back and said "a public domain Asteroids
|
|
game." I couldn't believe it. Not only is
|
|
Asteroids so damn old it's lame, but this guy
|
|
is looking for pd %public domain% shit. No
|
|
way was he going to get access. He didn't
|
|
even know what this board is. I left him a
|
|
message telling him that I didn't have one.
|
|
He never called back after that (CH, sysop of
|
|
a pirate BBS, field notes, 1988).
|
|
|
|
____________________
|
|
|
|
18 One such quiz, from a p/h board, can be found
|
|
in Appendix B.
|
|
|
|
^
|
|
|
|
|
|
|
|
58
|
|
|
|
Ironically, the pseudo-elaborate security methods
|
|
|
|
of underground boards, while they may be effective in
|
|
|
|
keeping off random non-CU callers, are not effective in
|
|
|
|
screening out "feds." Data and media accounts show that
|
|
|
|
boards are regularly infiltrated by telephone security
|
|
|
|
personnel and software companies. Also, the adoption of
|
|
|
|
handles to protect identities is defeated by the
|
|
|
|
consistent use of the same handle over time. But in
|
|
|
|
order to obtain and maintain status and prestige in the
|
|
|
|
CU one must keep the same pseudonym in order to
|
|
|
|
(literally) "make a name for oneself." The fact that CU
|
|
|
|
communication is not face-to-face requires a consistent
|
|
|
|
means of identifying oneself to others. The handle
|
|
|
|
fulfills this purpose but at the same time becomes as
|
|
|
|
attached to a single individual as a real name would.
|
|
|
|
The access rituals of the computer underground, which
|
|
|
|
are contingent on being a "known" pirate or
|
|
|
|
phreak/hacker, make changing handles unproductive.
|
|
|
|
The life blood and center of the computer under-
|
|
|
|
ground is the bulletin board network. Acting as both
|
|
|
|
the main trade center of performance related tools and
|
|
|
|
innovations and as a means of socialization, the
|
|
|
|
underground could not exist without the BBS network.
|
|
|
|
They serve to "recruit" and educate newcomers and
|
|
|
|
provide a way to traffic in information and software.
|
|
^
|
|
|
|
|
|
|
|
59
|
|
|
|
The pirating enterprise in particular is very dependent
|
|
|
|
upon the BBS as they are the very means by which
|
|
|
|
"warez" are traded. For the phreak/hacker community,
|
|
|
|
BBS provide a means of trading the resources of system
|
|
|
|
numbers and passwords, as well as instructional texts
|
|
|
|
on techniques. The access process serves as evidence
|
|
|
|
of mutual association amongst phreakers, hackers, and
|
|
|
|
pirates as cultural knowledge is needed as well as
|
|
|
|
personal references (evidence of acceptance and access
|
|
|
|
to others).
|
|
|
|
The CU bulletin board systems are unique in that
|
|
|
|
they provide a way to exchange information with a large
|
|
|
|
number of others. The other methods of CU commun-
|
|
|
|
ication are based on conversations rather than written
|
|
|
|
texts and thus are much less permanent. These methods,
|
|
|
|
discussed next, are telephone bridges/loops, voice mail
|
|
|
|
boxes, and computer "chat" systems.
|
|
|
|
|
|
|
|
Bridges, Loops, and Voice Mail Boxes
|
|
|
|
Of the additional means of communication used by
|
|
|
|
the CU, telephone "bridges" and "loops" are most
|
|
|
|
common. Unlike BBS, which require data links provided
|
|
|
|
by a computer and modem, bridges and loops are "old
|
|
|
|
fashioned" voice connections. Since they can not
|
|
|
|
accommodate the transfer of programs or files they are
|
|
|
|
used primarily by phreakers and hackers, and most often
|
|
^
|
|
|
|
|
|
|
|
60
|
|
|
|
as a social/recreational outlet.
|
|
|
|
A "bridge" is a technical name for what is
|
|
|
|
commonly known as a "chat line" or "conference system."
|
|
|
|
They are familiar to the public as the pay-
|
|
|
|
per-minute group conversation systems advertised on
|
|
|
|
late night television. Many bridge systems are owned
|
|
|
|
by large corporations who maintain them for business
|
|
|
|
use during the day. While the numbers to these systems
|
|
|
|
is not public knowledge, many of them have been
|
|
|
|
discovered by phreaks who then utilize the systems
|
|
|
|
during the night.
|
|
|
|
In addition to these pre-existing conference
|
|
|
|
systems, phreakers have become skilled at arranging
|
|
|
|
for a temporary, private bridge to be created via
|
|
|
|
AT&T's conference calling facilities. This allows for
|
|
|
|
conversations to be held among a self-selected group of
|
|
|
|
phreak/hackers:19
|
|
|
|
Bridges can be %sic% extremely useful means
|
|
of distributing information as long as the
|
|
%phone% number is not known, and you don't
|
|
have a bunch of children online testing out
|
|
____________________
|
|
|
|
19 The data indicates that these private
|
|
conference calls aren't "scheduled" in any real sense.
|
|
One p/hacker will initiate the conference and call
|
|
others at home to add them to the conference. As more
|
|
people join they suggest others to add. The initiator
|
|
can temporarily jump out of the conference, call the
|
|
new person and solicit their attendance. If they don't
|
|
want to join or aren't home, the initiator simply
|
|
returns to the conference without adding them in.
|
|
|
|
^
|
|
|
|
|
|
|
|
61
|
|
|
|
their DTMF.20 The last great discussion I
|
|
participated with over a bridge occurred
|
|
about 2 months ago on an AT&T Quorum where
|
|
all we did was engineer 3/way %calls% and
|
|
restrict ourselves to purely technical infor-
|
|
mation. We could have convinced the Quorum
|
|
operators that we were AT&T technicians had
|
|
the need occurred. Don't let the kids ruin
|
|
all the fun and convenience of bridges.
|
|
Lameness is one thing, practicality is
|
|
another (DC, message log, 1988).
|
|
|
|
|
|
In addition to setting up "private" bridges,
|
|
|
|
p/hackers can utilize "loop lines" in a further attempt
|
|
|
|
to limit the number of eavesdroppers on their
|
|
|
|
conversations. Unlike bridges, which connect a
|
|
|
|
virtually unlimited number of callers at once, "loops"
|
|
|
|
are limited to just two people at a time.
|
|
|
|
"Loop lines" are actually telephone company test
|
|
|
|
lines installed for internal use.21 A loop consists of
|
|
|
|
two separate telephone numbers that connect only to
|
|
|
|
each other. Each end has a separate phone number, and
|
|
|
|
when each person calls one end, they are connected to
|
|
|
|
each other automatically. This allows for individuals
|
|
____________________
|
|
|
|
20 "Dual Tone Multi Frequency" or in laymen terms,
|
|
the touch tone sounds used to dial phone numbers.
|
|
|
|
|
|
21 These test lines are discovered by phreaks and
|
|
hackers by programming their home computer to dial
|
|
numbers at random and "listen" for the distinctive tone
|
|
that an answering loop makes, by asking sympathetic
|
|
telephone company employees, or through information
|
|
contained on internal company computers.
|
|
|
|
^
|
|
|
|
|
|
|
|
62
|
|
|
|
to hold private conversations without divulging their
|
|
|
|
location or identity by exchanging telephone numbers.
|
|
|
|
Finally, voice mail boxes ("VMB") are another
|
|
|
|
means of communicating with individual actors. There
|
|
|
|
are several commercial voice mail box systems located
|
|
|
|
throughout the country. They function similar to a
|
|
|
|
telephone answering machine in that callers can call
|
|
|
|
in, listen to a recorded message, and then leave a
|
|
|
|
message for the box owner. Many of these systems are
|
|
|
|
accessible via toll-free telephone numbers. The
|
|
|
|
security of some VMB systems is notoriously poor. Many
|
|
|
|
phreaks have expertise in "creating" boxes for
|
|
|
|
themselves that are unknown (until discovered) by the
|
|
|
|
owner of the system. However, these boxes are usually
|
|
|
|
short lived since discovery by the system operator, and
|
|
|
|
closure of the box, is only a matter of time. But as
|
|
|
|
long as the box is functioning, it can serve as a means
|
|
|
|
of communicating with others. VMB numbers are
|
|
|
|
frequently posted on bulletin boards with invitations
|
|
|
|
to "call if you have any good stuff." They are often
|
|
|
|
used by pirates to exchange messages about new releases
|
|
|
|
of software, and by phreak/hackers to trade account and
|
|
|
|
access numbers. Additionally, some of the underground
|
|
|
|
newsletters and journals obtain boxes so users can call
|
|
|
|
in news of arrests and other gossip.
|
|
^
|
|
|
|
|
|
|
|
63
|
|
|
|
Like bulletin boards, VMBs are systems that allow
|
|
|
|
information to be disseminated to a large number of
|
|
|
|
associates, and unlike the live telephone conversations
|
|
|
|
of bridges and loops, they are available at any time of
|
|
|
|
the day. Additionally, VMB's don't require use of a
|
|
|
|
computer and modem, only a touch tone phone is needed
|
|
|
|
to call the box. Their usefulness is limited somewhat
|
|
|
|
because they play only one "outgoing" message at a
|
|
|
|
time, and their transitory nature limits their
|
|
|
|
reliability.
|
|
|
|
|
|
|
|
Summary
|
|
|
|
Phreakers, hackers and pirates do not act as
|
|
|
|
loners. They have adopted existing methods of
|
|
|
|
communication, consistent with their skills in high
|
|
|
|
technology, to form a social network that allows for
|
|
|
|
the exchange of information, the socialization of new
|
|
|
|
members, socializing with others, and in the case of
|
|
|
|
pirates, performing the "deviant" act itself via these
|
|
|
|
means.
|
|
|
|
These communication points create and foster
|
|
|
|
groups of loosely associated individuals, with specific
|
|
|
|
interests, coming together to exchange information
|
|
|
|
and/or software. It is impossible to be a part of the
|
|
|
|
social network of the computer underground and be a
|
|
|
|
loner. Based upon the Best and Luckenbill measure,
|
|
^
|
|
|
|
|
|
|
|
64
|
|
|
|
actors in the computer underground, by displaying
|
|
|
|
mutual association, organize as colleagues.
|
|
|
|
The social network of the computer underground
|
|
|
|
provides the opportunity for colleagues to form
|
|
|
|
cooperative working relationships with others, thus
|
|
|
|
moving the CU towards a more sophisticated form of
|
|
|
|
social organization. These "hacker groups" are
|
|
|
|
addressed in the next section.
|
|
^
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
|
|
|
|
|
Mutual Participation
|
|
|
|
In the previous chapter the ways in which the
|
|
|
|
structure of the computer underground fosters mutual
|
|
|
|
association were discussed. Their social outlets and
|
|
|
|
means for informational exchange bring the CU community
|
|
|
|
together as deviant colleagues. Their relationships
|
|
|
|
fit quite well into the Best and Luckenbill (1982)
|
|
|
|
typology of collegial associations:
|
|
|
|
The relationship between deviant colleagues
|
|
involves limited contact. Like loners,
|
|
colleagues perform their deviant acts alone.
|
|
But unlike loners colleagues associate with
|
|
one another when they are not engaged in
|
|
deviance . . . In effect, there is a division
|
|
between two settings; onstage where
|
|
individual performs alone; and backstage,
|
|
where colleagues meet (cf Goffman). In their
|
|
backstage meetings, colleagues discuss
|
|
matters of common interest, including
|
|
techniques for performing effectively, common
|
|
problems and how to deal with them, and ways
|
|
of coping with the outside world (1982 p.37).
|
|
|
|
However, despite the advantages of collegial
|
|
|
|
association, ties between CU participants are weak.
|
|
|
|
Loyalty between individuals seems rare, as the CU is
|
|
|
|
replete with tales of phreak/hackers who, when
|
|
|
|
apprehended, expose identities or "trade secrets" in
|
|
|
|
order to avoid prosecution. These weak collegial ties
|
|
|
|
may be fostered by the anonymity of CU communication
|
|
|
|
methods, and the fact that all CU actors are, to some
|
|
^
|
|
|
|
|
|
|
|
66
|
|
|
|
extent, in competition with each other. There are only
|
|
|
|
so many systems with weak security and once such a
|
|
|
|
system is found, sharing it with others will virtually
|
|
|
|
ensure that the hole will be sealed when the increased
|
|
|
|
activity is noticed. Thus while p/hackers will share
|
|
|
|
general knowledge with each other, specific information
|
|
|
|
is not disseminated publicly.
|
|
|
|
As Best and Luckenbill have observed, in order to
|
|
|
|
remain in a collegial relationship individuals must be
|
|
|
|
able to successfully carry out operations alone (1982
|
|
|
|
p.45). In order to sustain a career in p/hacking one
|
|
|
|
must pursue and collect information independent of what
|
|
|
|
is shared on the communication channels. Despite the
|
|
|
|
association with other phreakers and hackers, the
|
|
|
|
actual performance of the phreak/hacking act is a
|
|
|
|
solitary activity.22
|
|
|
|
That is not to say, however, that p/hackers never
|
|
|
|
share specific information with others. As discussed
|
|
|
|
earlier, p/hack bulletin board systems frequently have
|
|
|
|
differentiated levels of access where only highly
|
|
|
|
regarded individuals are able to leave and read
|
|
|
|
messages. These areas are frequently used to keep
|
|
____________________
|
|
|
|
22 This does not hold true for pirates. By
|
|
definition they must trade programs with other
|
|
individuals.
|
|
|
|
^
|
|
|
|
|
|
|
|
67
|
|
|
|
information from "unskilled" users at the lower levels.
|
|
|
|
There are strong social norms that some information
|
|
|
|
should not be shared too widely, as it may be either
|
|
|
|
"abused" or fall into the hands of enforcement agents.
|
|
|
|
For example, when one p/hacker announced that he was
|
|
|
|
going to release a tutorial on how to infiltrate a new
|
|
|
|
telephone company computer, he received the following
|
|
|
|
messages in reply:
|
|
|
|
Not smart, DT. %That computer% is a system
|
|
which can be quite powerful if used to its
|
|
potential. I don't think that information on
|
|
programming the switches should be released
|
|
to anyone. Do you realize how destructive
|
|
%that computer% could really be if used by
|
|
someone who is irresponsible and intends on
|
|
destroying things? Don't even think about
|
|
releasing that file. If you do release that
|
|
file, it will disappear and will no longer
|
|
remain in circulation. Believe me. Not many
|
|
have the right to know about %that computer%,
|
|
or any other delicate telco computers for
|
|
that matter. Why do you think the fucking New
|
|
York Times published that big article on
|
|
hackers screwing around with telco machines?
|
|
Not only will you get into a lot of trouble
|
|
by releasing that file on %computer%, you
|
|
will be making telcos more aware of what is
|
|
actually happening, and soon no one will be
|
|
able to learn about their systems. Just think
|
|
twice (EP, message log, 1988).
|
|
|
|
Why would you want normal people to have such
|
|
knowledge? Any why would you post about it?
|
|
If you have knowledge that's fine but DON'T
|
|
spread that knowledge among others that may
|
|
abuse it. It's not impressive! I don't know
|
|
why anyone would want to disperse that
|
|
knowledge. Please don't release any "in
|
|
depth" files on such systems of great power.
|
|
Keep that to yourself it will just mess it up
|
|
for others (UU, message log, 1988).
|
|
|
|
^
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
The desire to share information with selected
|
|
|
|
colleagues often leads to the formation of cooperative
|
|
|
|
"working groups." These partnerships are easily formed,
|
|
|
|
as the structure of mutual association in the CU
|
|
|
|
creates a means where "talent" can be judged on the
|
|
|
|
basis of past interactions, longevity in the field, and
|
|
|
|
mutual interests. When allegiances are formed, the CU
|
|
|
|
actors begin "mutual participating" in their acts, thus
|
|
|
|
becoming "peers" in terms of social organization.
|
|
|
|
Mutual participation, as defined in the Best and
|
|
|
|
Luckenbill typology, is exhibited by actors sharing in
|
|
|
|
the same deviant act, in the physical presence of one
|
|
|
|
another (1982 p.45). However, the measurement was
|
|
|
|
"grounded" in studies of traditional deviant
|
|
|
|
associations (eg: street gangs, prostitutes, etc.)
|
|
|
|
where "real-time" interaction is common. The technology
|
|
|
|
used by the CU negates this requirement as actors can
|
|
|
|
be located in different parts of the country.
|
|
|
|
Additionally, "hacking" on a system, by a group of
|
|
|
|
peers, does not require simultaneous participation by
|
|
|
|
all members. However Best and Luckenbill's typology is
|
|
|
|
an ideal type, and the activities of peers in the
|
|
|
|
computer underground do not fall outside of the spirit
|
|
|
|
or intention of their concept of mutual participation.
|
|
|
|
Their description of deviant peer associations is
|
|
^
|
|
|
|
|
|
|
|
69
|
|
|
|
presented here:
|
|
|
|
Deviant peers are distinguished from
|
|
colleagues by their shared participation in
|
|
deviance. While colleagues carry out their
|
|
deviant operations alone, peers commit
|
|
deviant acts in one another's presence.
|
|
Peers cooperate in carrying out deviant
|
|
operations, but they have a minimal division
|
|
of labor, with each individual making roughly
|
|
comparable contribution. Peer relationships
|
|
also tend to be egalitarian and informal;
|
|
some peers may be acknowledged leaders or
|
|
admired for their skill, but there is no set
|
|
division of authority. Like colleagues,
|
|
peers share subcultural knowledge, but peer
|
|
groups typically provide their members with
|
|
more support. In addition to cooperating in
|
|
deviant operations, peers may recruit and
|
|
socialize newcomers and supply one another
|
|
with deviant equipment and social support.
|
|
Thus, the bonds between peers are stronger
|
|
than those linking colleagues (1982, p.45).
|
|
|
|
Peer associations in the CU are largely limited to
|
|
|
|
small groups23 working on a specified goal. Both
|
|
|
|
pirates and p/hackers organize themselves in this
|
|
|
|
regard, though their characteristics differ. We begin
|
|
|
|
with a discussion of mutual participation among
|
|
|
|
pirates.
|
|
|
|
|
|
|
|
Pirate Groups
|
|
|
|
Pirate groups are composed of less than ten
|
|
____________________
|
|
|
|
23 In terms of the ideal type for deviant peers
|
|
any two individuals working in cooperation exhibit
|
|
mutual participation. The discussion here addresses
|
|
groups that consist of three or more people that
|
|
identify themselves as a sort of "club." Short-lived
|
|
interaction between two people is not considered a
|
|
"group" in the CU culture.
|
|
|
|
^
|
|
|
|
|
|
|
|
70
|
|
|
|
members. Their primary purpose is to obtain the latest
|
|
|
|
software, remove any copy-protection from it, and then
|
|
|
|
distribute it to the pirate community. Often the
|
|
|
|
"warez" that they distribute will be adorned with the
|
|
|
|
group name, so subsequent users will be aware of the
|
|
|
|
source of the software. Many pirate groups have "home"
|
|
|
|
BBS systems that act as key distribution points, and as
|
|
|
|
places where outsiders can communicate with members of
|
|
|
|
the association. This researcher was unable to obtain
|
|
|
|
data about the internal organization of pirate groups,
|
|
|
|
but it appears that they are leaderless, with
|
|
|
|
individual members working alone but giving credit to
|
|
|
|
the group as a whole.
|
|
|
|
|
|
|
|
Phreak/hack groups
|
|
|
|
The existence of phreak/hacker groups is well
|
|
|
|
documented in the data, and has been heavily reported
|
|
|
|
in the media. Two hacker groups in particular, The
|
|
|
|
414's (named for the Wisconsin area code in which they
|
|
|
|
lived), and The Inner Circle, received a large amount
|
|
|
|
of press after being apprehended for various computer
|
|
|
|
break-ins. However, the "threat" that such groups
|
|
|
|
represent has probably been overstated as the data
|
|
|
|
indicate that "hacker gangs" vary greatly in
|
|
|
|
organization and dedication to the CU enterprise.
|
|
|
|
Many hacker groups are short-lived associations of
|
|
^
|
|
|
|
|
|
|
|
71
|
|
|
|
convenience, much like the "no girls allowed!" clubs
|
|
|
|
formed by young boys. They often consist of four to
|
|
|
|
nine beginning phreak/hackers who will assist each
|
|
|
|
other in obtaining telephone credit-card numbers. By
|
|
|
|
pooling their resources, a large number of illicit
|
|
|
|
"codez" can be obtained and shared with others.
|
|
|
|
Distribution of the account numbers is not limited to
|
|
|
|
the group, they are often shared with the community at
|
|
|
|
large, "courtesy of Codez Kidz Ltd." Groups of this
|
|
|
|
type are looked at with disdain by "elite"
|
|
|
|
phreak/hackers and are often criticized as being more
|
|
|
|
interested in self-promotion then they are with
|
|
|
|
actually phreaking or hacking.
|
|
|
|
Some hacker groups are very proficient and
|
|
|
|
dedicated to their craft, however. These groups are
|
|
|
|
characterized by smaller memberships, less visibility
|
|
|
|
to non-members, and commitment to the CU enterprise.
|
|
|
|
They are loosely organized, yet some have managed to
|
|
|
|
exist six or more years despite members dropping out or
|
|
|
|
being arrested. These "elite" groups are selective
|
|
|
|
about membership, and cite trust and talent as the two
|
|
|
|
leading requirements for joining:
|
|
|
|
The group exists mainly for information
|
|
trading. If you trust everyone else in the
|
|
group, it is very profitable to pool
|
|
information on systems . . . also it is nice
|
|
to know someone that you can call if you need
|
|
help on operating system X and to have people
|
|
^
|
|
|
|
|
|
|
|
72
|
|
|
|
feel free to call you if they need help on
|
|
operating system Y (AN, message log, 1988).
|
|
|
|
Trust is a very important part of a group. I
|
|
think that's blatantly obvious. You have to
|
|
be able to trust the other members of the
|
|
group with the information you are providing
|
|
in order to be productive, and have a secure
|
|
situation (UU, message log, 1988).
|
|
|
|
. . . all groups serve the same purpose: to
|
|
make their members feel better about
|
|
themselves (like, wow, I'm in a group) and to
|
|
trade things, whether it's wares, codes, or
|
|
whatever. But the thing is that being in a
|
|
group is like saying "I trust you, so like,
|
|
what can we do together?" (NN, message log,
|
|
1988)
|
|
|
|
Indeed, hacker groups are formed primarily for the
|
|
|
|
purpose of information exchange. To this end, groups
|
|
|
|
attempt to recruit members with a wide variety of
|
|
|
|
"specializations" in order to have a better support
|
|
|
|
network to turn to:
|
|
|
|
%Our group% has always been very selective
|
|
about members (took me six years to get in).
|
|
The only reason the group exists is to bring
|
|
together a diverse group of talents. There is
|
|
very little overlap in %the group% these
|
|
days. Everyone has one thing that they are
|
|
the best in the country at, and are
|
|
conversant with just about any other form of
|
|
hacking. As an example, I got into a Primos
|
|
computer this morning around 9 am. Once I got
|
|
in, I know enough about Primos to get around,
|
|
but that's it. So I call %PS% in New York,
|
|
give him the info, and when I get home
|
|
tonight, he has gotten in and decrypted the
|
|
entire username/password file and uploaded it
|
|
to me. But two weeks ago he got into a VAX.
|
|
He got the account to me, I called it up and
|
|
set up three backdoors into the system that
|
|
we can get in if the account is detected or
|
|
deleted. Simple matter of communism. From
|
|
each according to his ability . . . etc. Also
|
|
^
|
|
|
|
|
|
|
|
73
|
|
|
|
it helps that everyone in the group is
|
|
experienced enough that they don't fuck up
|
|
accounts you spend all day getting (TM, field
|
|
notes, 1989).
|
|
|
|
Consistent with the Best and Luckenbill ideal
|
|
|
|
type, hacker groups do not exhibit a set division of
|
|
|
|
authority or labor. Most groups are leaderless, and
|
|
|
|
every member is free to pursue their own interests,
|
|
|
|
involving other members of the group only when desired:
|
|
|
|
We just got our group together. We've got a
|
|
guy that does VMB's and a Sprinter %obtains
|
|
"codez" from U.S. Sprint% and a couple of
|
|
hackers. Everybody's free to pursue whatever
|
|
system they want but if they want or need
|
|
some help they can call on any of the other
|
|
members if they want to. Like if one guy is
|
|
scanning and finds a VAX he might call and
|
|
give me the dialup. Then I might have to
|
|
call our Sprinter to get some codez so I can
|
|
start hacking on it. Once I get through I'll
|
|
give the account to the other members. But
|
|
if I found it myself I wouldn't have to give
|
|
it out but I probably would anyway 'cuz
|
|
keeping it would be bullshit (DC, field
|
|
notes, 1988).
|
|
|
|
There isn't a leader really. The guy who
|
|
starts the group sort of acts like a contact
|
|
point but everyone else has everyones' phone
|
|
number and you can call whoever you want to
|
|
anytime. Usually when you're putting a group
|
|
together you just get everyone you want and
|
|
you all decide on a name. (DC, field notes,
|
|
1988).
|
|
|
|
|
|
|
|
Summary
|
|
|
|
By virtue of the extensive social network found in
|
|
|
|
the CU, some participants form work groups. The
|
|
|
|
sophistication of these groups varies, but in all cases
|
|
^
|
|
|
|
|
|
|
|
74
|
|
|
|
it is evident that the groups exist to support what are
|
|
|
|
primarily individually performed activities. The
|
|
|
|
groups exhibit many of the ideal-type characteristics
|
|
|
|
of peer associations, and it is clear that in some
|
|
|
|
cases the computer underground is socially organized as
|
|
|
|
peers.
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
75
|
|
|
|
|
|
|
|
|
|
|
|
Conclusion
|
|
|
|
Phreakers, hackers, and pirates do not act as
|
|
|
|
loners. Loners do not associate with others, and are
|
|
|
|
on their own in coping with the practical problems
|
|
|
|
presented by their activities (Best and Luckenbill
|
|
|
|
1982, p.28). From the data presented here, it is
|
|
|
|
evident that the computer underground has established
|
|
|
|
an extensive social network for the exchange of
|
|
|
|
resources and mutual support. The characteristics of
|
|
|
|
the CU varies according to the goals of the
|
|
|
|
participants, but the presence of mutual association is
|
|
|
|
consistent. Contact between individuals is limited,
|
|
|
|
with the acts of phreaking or hacking being committed
|
|
|
|
alone. Computer underground participants do associate
|
|
|
|
with one another in order to discuss matters of common
|
|
|
|
interest, such as performance techniques, news, and
|
|
|
|
problem solving. To facilitate this informational
|
|
|
|
exchange, they have established a technologically
|
|
|
|
sophisticated network that utilizes computer bulletin
|
|
|
|
boards, voice mail boxes, telephone bridges, and
|
|
|
|
telephone loops.
|
|
|
|
The collegial organization of the computer
|
|
|
|
underground is further evidenced by the establishment
|
|
|
|
of a CU culture. The subcultural adaptation of
|
|
^
|
|
|
|
|
|
|
|
76
|
|
|
|
language, expectations of normative conduct, and status
|
|
|
|
stratification based on mastery of cultural knowledge
|
|
|
|
and skill, all indicate that the computer underground
|
|
|
|
is, at the very least, a social organization of
|
|
|
|
colleagues (see Best and Luckenbill, 1982, p.37).
|
|
|
|
The very structure that permits mutual association
|
|
|
|
among CU participants also encourages some to form
|
|
|
|
working relationships, thus acting as peers by mutually
|
|
|
|
participating in CU activities. Peers organized in this
|
|
|
|
manner share in their deviance, organizing informally
|
|
|
|
with little division of labor or set division of
|
|
|
|
authority (Best and Luckenbill, 1982, p.45). These
|
|
|
|
peer associations provide support to members, and can
|
|
|
|
provide socialization and recruitment functions for
|
|
|
|
newcomers. The establishment of work groups, through
|
|
|
|
mutual participation, indicates that though the
|
|
|
|
computer underground is largely organized as a network
|
|
|
|
of colleagues, it is also, to some degree, a social
|
|
|
|
organization of peers.
|
|
|
|
Best and Luckenbill (1982) describe two additional
|
|
|
|
forms of deviant associations that are more
|
|
|
|
organizationally sophisticated than peers: "mobs" and
|
|
|
|
"formal organizations." The computer underground,
|
|
|
|
however, does not display the requisite characteristics
|
|
|
|
of these organizational types. The primary
|
|
^
|
|
|
|
|
|
|
|
77
|
|
|
|
characteristic of "mobs" is an elaborate division of
|
|
|
|
labor (Best and Luckenbill, 1982, p.25). While some CU
|
|
|
|
groups do exhibit a rudimentary division of labor based
|
|
|
|
on individual members' specialization, it is not by any
|
|
|
|
means "elaborate." Any division of labor that does
|
|
|
|
exist is voluntary and arises on the basis of
|
|
|
|
specialized knowledge, not a specialized organizational
|
|
|
|
role.
|
|
|
|
In much the same manner the lack of a designated
|
|
|
|
leader or leadership hierarchy prevents CU groups from
|
|
|
|
being categorized as "formal organizations" in the Best
|
|
|
|
and Luckenbill typology. Deviant organizations at this
|
|
|
|
level are quite sophisticated and there is no empirical
|
|
|
|
evidence that the computer underground is organized in
|
|
|
|
this manner.
|
|
|
|
This study of the computer underground has been a
|
|
|
|
test of the Best and Luckenbill typology of the social
|
|
|
|
organization of deviants. As a test of their
|
|
|
|
organizational indicators, the CU has shown that the
|
|
|
|
categories are well constructed, with the possible
|
|
|
|
exception of limiting "mutual participation" to acts
|
|
|
|
carried out in the presence of others. However, if we
|
|
|
|
modify this to include non-simultaneous, but
|
|
|
|
cooperative, acts as found in phreak/hacker groups, the
|
|
|
|
category is otherwise robust. The flexibility of the
|
|
^
|
|
|
|
|
|
|
|
78
|
|
|
|
typology, which explicitly recognizes that not all
|
|
|
|
deviant associations will display all of the character-
|
|
|
|
istics (Best and Luckenbill, 1982, p.25), is a strength
|
|
|
|
that allowed it to be easily used in terms of the
|
|
|
|
computer underground.
|
|
|
|
By addressing the CU from a social organizational
|
|
|
|
viewpoint we have seen that despite the high technology
|
|
|
|
trappings of their craft, pirates, phreakers, and
|
|
|
|
hackers display organizational characteristics found in
|
|
|
|
other groups that have been criminalized. This may
|
|
|
|
suggest that the development of sophisticated tools to
|
|
|
|
commit "crime" does not necessarily affect the ways in
|
|
|
|
which individuals organize their activities.
|
|
|
|
The implications of peer and collegial
|
|
|
|
organization for the members of the computer
|
|
|
|
underground are vast. The level of sophistication has
|
|
|
|
a direct relationship to the types of resources on
|
|
|
|
which individuals can draw (Best and Luckenbill, 1982,
|
|
|
|
p.54). Because CU members are mutually associated,
|
|
|
|
they are able to turn to colleagues for advice and
|
|
|
|
support with various problems. However, at the
|
|
|
|
collegial level they are left to enact the solutions
|
|
|
|
independently. Whether or not they are successful in
|
|
|
|
doing so will determine if they choose to remain active
|
|
|
|
in the computer underground. The data show that
|
|
^
|
|
|
|
|
|
|
|
79
|
|
|
|
involvement in the CU is short in duration, unless
|
|
|
|
success in early phreak/hack attempts is obtained. As
|
|
|
|
long as the CU remains organized as a collection of
|
|
|
|
colleagues, this trend will continue. Additionally, as
|
|
|
|
the computer and telephone industries become more
|
|
|
|
sophisticated in preventing the unauthorized use of
|
|
|
|
their facilities, new phreak/hackers are unlikely to
|
|
|
|
succeed in their initial attempts at the act, thus
|
|
|
|
dropping away from the activity and never becoming
|
|
|
|
acculturated to the point where peer relationships can
|
|
|
|
be developed.
|
|
|
|
At the peer level, a dimension of sophistication
|
|
|
|
that some members of the CU do display, the knowledge
|
|
|
|
and resources to solve problems and obtain resources is
|
|
|
|
greater. However, even at this level the ties between
|
|
|
|
peers remain weak at best. Although their cooperative
|
|
|
|
ties allow for more sophisticated operations, and
|
|
|
|
somewhat reduce the CU's vulnerability to social
|
|
|
|
control agents (Best and Luckenbill, 1982, p.53), it
|
|
|
|
still does not completely eliminate the need for
|
|
|
|
individual success in order to sustain a CU career. As
|
|
|
|
long as the CU remains at the current level of
|
|
|
|
organizational sophistication, with weak ties and
|
|
|
|
somewhat limited means of support and resource
|
|
|
|
attainment, it will continue to be a transitory and
|
|
^
|
|
|
|
|
|
|
|
80
|
|
|
|
limited "criminal" enterprise.
|
|
|
|
This realization should be considered by policy
|
|
|
|
makers who desire to further criminalize computer
|
|
|
|
underground activities. Given the current organization
|
|
|
|
of the CU, the future social costs of their actions are
|
|
|
|
not likely to expand beyond the current level. There
|
|
|
|
is no evidence to support assertions that the CU is
|
|
|
|
expanding, and the insight provided here shows that it
|
|
|
|
is not likely to do so on a large scale.
|
|
|
|
For sociologists, the computer underground is a
|
|
|
|
field rich for insight into several areas of concern.
|
|
|
|
Future research into the career path of CU members, and
|
|
|
|
the relationships between individuals, could prove
|
|
|
|
helpful to those interested in applying theories of
|
|
|
|
differential association and career deviance.
|
|
|
|
Additionally, the computer underground provides a
|
|
|
|
unique opportunity to study the process of
|
|
|
|
criminalization, and its effect on those who are
|
|
|
|
engaged in the behavior.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
REFERENCES
|
|
|
|
Best, Joel and David F. Luckenbill. 1982. Organizing
|
|
Deviance. Englewood Cliff, New Jersey: Prentice-Hall.
|
|
|
|
Bequai, August. 1987. Technocrimes. Lexington,
|
|
Mass.:Lexington Books.
|
|
|
|
Bickford, Robert. 1988. Personal communication to
|
|
Gordon Meyer.
|
|
|
|
Chicago Tribune. 1989. "Computer hacker, 18, gets
|
|
prison for fraud." Feb. 15:2,1.
|
|
|
|
Field Notes. Interviews with phreakers, hackers, and
|
|
pirates. Conducted from 7/88 to 4/89 (confidential
|
|
material in authors files).
|
|
|
|
Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The
|
|
Process of Criminalization: The Case of Computer Crime
|
|
Laws." Criminology 26:101-126.
|
|
|
|
Levy, Steven. 1984. Hackers: Heroes of the Computer
|
|
Revolution. New York: Dell Publishing.
|
|
|
|
Message Logs from a variety of computer underground
|
|
bulletin board systems, (confidential material), 1988-
|
|
1989.
|
|
|
|
NBC-TV. 1988. Hour Magazine. November 23, 1988.
|
|
|
|
Parker, Donn B. 1983. Fighting Computer Crime. New
|
|
York: Charles Scribner's Sons.
|
|
|
|
Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box."
|
|
Esquire October, pp. 116-125.
|
|
|
|
Small, David. 1988. Personal communication to Gordon
|
|
Meyer.
|
|
|
|
WGN-Radio. 1988. Ed Schwartz Show. September 27, 1988.
|
|
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
82
|
|
|
|
|
|
|
|
|
|
|
|
|
|
APPENDIX A
|
|
COMPUTER UNDERGROUND PSEUDONYMS
|
|
|
|
_________________________________________________________
|
|
|Literature, films,|Computers & |Nouns, titles & |
|
|
|and Entertainment |related technology |Descriptive names|
|
|
---------------------------------------------------------
|
|
| Pink Floyd | Mrs. Teletype | The Professor |
|
|
| Hatchet Molly | Baudy Bastard | Perfect Asshole |
|
|
| Jedi Knight | Doctor Phreak | The Messiah |
|
|
| King Richard | Lord FAX | Right Wing Fool |
|
|
| Captain Hoga | CNA Office | Bed Bug |
|
|
| Al Crowley | Sir Mac | Sleepy Head |
|
|
| Doc Holiday | Busy Signal | Mean Underwear |
|
|
| Mr. Big Dog | Silicon Student | Cockroach |
|
|
| Robin Williams | Fiber Cables | Primo Bomber |
|
|
| Big Bird | Phone Crasher | The Prisoner |
|
|
| Cross-eyed Mary | Doc Cryptic | Night Lighting |
|
|
| Capt. America | Apple Maniac | No Regrets |
|
|
| Uncle Sam | Fuzzy Sector | Grounded Zero |
|
|
| Thumpr | Cntrl. Alt. Del. | Spit Wad |
|
|
| Little John | Byte Ripper | Shadow Dove |
|
|
----------------------------------------------------------
|
|
|
|
|
|
^
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
|
|
|
|
|
APPENDIX B
|
|
NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS
|
|
|
|
|
|
Welcome to Analog Electronics Datum System.
|
|
Please take this time to fill out a one-time
|
|
questionnaire that will allow us to determine your
|
|
level of access on Analog Electronics Datum System.
|
|
|
|
If any question is too difficult for you to
|
|
answer, just answer with your best guess or a simple "I
|
|
don't know."
|
|
|
|
We basically have two different divisions or types
|
|
of users on this system:
|
|
|
|
(1) Apple (%%,Mac), and IBM software traders
|
|
(2) Telecommunication hobbyists - any/all
|
|
computers (networks, mainframes,
|
|
engineering)
|
|
|
|
Your answers will help us decide which category
|
|
you belong to and what access you should get on our
|
|
system.
|
|
|
|
* What type of computer & modem are you using to call
|
|
this system?
|
|
|
|
* Where did you get the phone number to Analog
|
|
Electronics Datum System?
|
|
|
|
* We'll need your first name and real phone # where you
|
|
can be reached for validation purposes only, this
|
|
information is kept in a password encoded file, on
|
|
another computer (critical for higher validation):
|
|
|
|
First for the FILE TRANSFER AREA ACCESS questions:
|
|
|
|
(1) How many bits are in a nibble? (Assume 6502 micro
|
|
processor)
|
|
|
|
(2) Define WORM, RAM, ROM, VDT, CRT, BPS? (Pick any 3)
|
|
|
|
(3) What does 2400 baud mean in terms of bit transfer
|
|
speed?
|
|
|
|
^
|
|
|
|
|
|
|
|
84
|
|
|
|
(4) What is PT,MT,AE,BIN2,Ymodem Batch,BLU? (Pick any
|
|
4)
|
|
|
|
(5) How many Megahertz does a standard Apple %%+ run
|
|
at? (rounding OK)
|
|
|
|
|
|
Now for the TeleCommunication Questions:
|
|
|
|
(1) Describe the Voice Transmission Use of a Loop:
|
|
|
|
(2) If I gave you my phone #, how would you find my
|
|
name and address?!
|
|
|
|
(3) Can you name any networking software operating
|
|
systems or protocols?
|
|
|
|
(4) What is the highest frequency a twisted two wire
|
|
pair can transmit at?
|
|
|
|
(5) We believe Phones and Computers Belong Together,
|
|
what do you BELIEVE?
|
|
|
|
|
|
Ok, thanks for that info.
|
|
|
|
|
|
A MESSAGE FROM AL CAPONE (LOCAL) AND THE TRADER (LD)
|
|
SYSTEM VALIDATORS
|
|
|
|
-----------------------------------------------------
|
|
|
|
|
|
Welcome to ALDS! As a new user you have made
|
|
a change for the better in choosing this system as
|
|
one of your places of telecommunication exchange. In
|
|
my opinion, this is one, if not the best, system
|
|
in telecommunications today as most of the good boards
|
|
such as Shadowspawn, Metal Shop Private, etc. do not
|
|
exist anymore. Quality users exist on this system that
|
|
have established a reputation for themselves so
|
|
questions you ask will be answered thoroughly and
|
|
precisely. We are a sponsor board of the LOD/H
|
|
Technical Journal, and accounts have been
|
|
established representing Phrack, Inc. and 2600
|
|
Magazine. (For our software trading people, we also
|
|
have an excellent file transfer area . . . consistent
|
|
with the rest of the nation . . . )
|
|
|
|
Due to the high quality of our system, we will
|
|
^
|
|
|
|
|
|
|
|
85
|
|
|
|
need some additional information about you.
|
|
Maintenance of a high quality system requires high
|
|
quality users, so the first step in this process is
|
|
keeping the low quality users off of the system . . .
|
|
so please cooperate with us . . . this is for your
|
|
benefit as well as ours. The information you give us
|
|
will be cross referenced with other systems for
|
|
accuracy, and if you leave false information, you may
|
|
suffer low access or deletion.
|
|
|
|
All phone number information is stored outside of
|
|
the housing of this system inside of an encrypted,
|
|
password locked file for your security. So if you have
|
|
left an invalid phone #, please leave one where you can
|
|
be reached, or someone's name and number (if possible)
|
|
that will vouch for you. Keep in mind this validation
|
|
can take up to 1 week to complete due to the high
|
|
volume of new callers to our system.
|
|
|
|
Note: Limited system access will be granted within 24
|
|
Hrs if all of your info seems correct.
|
|
|
|
|
|
Thanks in advance . . . Bugsy Malone
|
|
The Swapper
|
|
SYSOP/SYSTEM VALIDATORS
|
|
|
|
|
|
% Bugsy Malone needs the following info: %
|
|
|
|
(1) Your references (sysops, other users on this
|
|
system, other BBS).
|
|
(2) Your interests in having access to our system.
|
|
(3) How do you feel you can contribute to our system?
|
|
(4) How many years of telecommunication experience do
|
|
you have?
|
|
(5) Do you have any special talents in programming, or
|
|
operating systems?
|
|
If yes, then name the language(s) or operating
|
|
system(s).
|
|
|
|
|
|
|
|
Enter message now, answering these questions:
|
|
|
|
|
|
|
|
%after entering the message the BBS hangs up and the
|
|
caller will call back in 24 hours to see if access has
|
|
been granted.%
|
|
^
|
|
|
|
|
|
! |