4488 lines
149 KiB
Plaintext
4488 lines
149 KiB
Plaintext
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
NORTHERN ILLINOIS UNIVERSITY
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
A THESIS SUBMITTED TO THE GRADUATE SCHOOL
|
||
|
||
IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
|
||
|
||
FOR THE DEGREE
|
||
|
||
MASTER OF ARTS
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
DEPARTMENT OF SOCIOLOGY
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
BY
|
||
|
||
GORDON R. MEYER
|
||
|
||
%CompuServe: 72307,1502%
|
||
%GEnie: GRMEYER%
|
||
|
||
|
||
DEKALB, ILLINOIS
|
||
|
||
AUGUST 1989
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
ABSTRACT
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Name: Gordon R. Meyer Department: Sociology
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Title: The Social Organization of the Computer Underground
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Major: Criminology Degree: M.A.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Approved by: Date:
|
||
|
||
|
||
|
||
__________________________ ________________________
|
||
Thesis Director
|
||
|
||
|
||
|
||
|
||
|
||
NORTHERN ILLINOIS UNIVERSITY
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
ABSTRACT
|
||
|
||
|
||
|
||
This paper examines the social organization of the
|
||
|
||
"computer underground" (CU). The CU is composed of
|
||
|
||
actors in three roles, "computer hackers," "phone
|
||
|
||
phreaks," and "software pirates." These roles have
|
||
|
||
frequently been ignored or confused in media and other
|
||
|
||
accounts of CU activity. By utilizing a data set culled
|
||
|
||
from CU channels of communication this paper provides
|
||
|
||
an ethnographic account of computer underground
|
||
|
||
organization. It is concluded that despite the
|
||
|
||
widespread social network of the computer underground,
|
||
|
||
it is organized primarily on the level of colleagues,
|
||
|
||
with only small groups approaching peer relationships.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Certification: In accordance with departmental and
|
||
|
||
Graduate School policies, this thesis
|
||
|
||
is accepted in partial fulfillment
|
||
|
||
of degree requirements.
|
||
|
||
|
||
|
||
_____________________________________
|
||
Thesis Director
|
||
|
||
_____________________________________
|
||
Date
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
ACKNOWLEDGMENTS
|
||
|
||
|
||
|
||
FOR CRITIQUE, ADVICE, AND COMMENTS:
|
||
|
||
DR. JAMES L. MASSEY
|
||
|
||
DR. JIM THOMAS
|
||
|
||
DR. DAVID F. LUCKENBILL
|
||
|
||
|
||
|
||
FOR SUPPORT AND ENCOURAGEMENT:
|
||
|
||
GALE GREINKE
|
||
|
||
|
||
|
||
SPECIAL THANKS TO:
|
||
|
||
D.C., T.M., T.K., K.L., D.P.,
|
||
|
||
M.H., AND G.Z.
|
||
|
||
|
||
|
||
THIS WORK IS DEDICATED TO:
|
||
|
||
GEORGE HAYDUKE
|
||
|
||
AND
|
||
|
||
BARRY FREED
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
TABLE OF CONTENTS
|
||
|
||
Introduction . . . . . . . . . . . . . . . . . . . 1
|
||
|
||
Methodology . . . . . . . . . . . . . . . . . . . 6
|
||
|
||
What is the Computer Underground? . . . . . . . . 11
|
||
|
||
Topography of the Computer Underground . . . . . . 20
|
||
Hacking . . . . . . . . . . . . . . . . . 20
|
||
Phreaking . . . . . . . . . . . . . . . . . . 21
|
||
Pirating . . . . . . . . . . . . . . . . . 24
|
||
|
||
Social Organization and Deviant Associations . . . 28
|
||
|
||
Mutual Association . . . . . . . . . . . . . . . . 31
|
||
|
||
The Structure of the Computer Underground . . . . 33
|
||
Bulletin Board Systems . . . . . . . . . . 33
|
||
Towards a BBS Culture . . . . . . . . . 37
|
||
Bridges, Loops, and Voice Mail Boxes . . . 53
|
||
Summary . . . . . . . . . . . . . . . . . . 57
|
||
|
||
Mutual Participation . . . . . . . . . . . . . . . 59
|
||
Pirate Groups . . . . . . . . . . . . . . . 63
|
||
Phreak/hack groups . . . . . . . . . . . . 64
|
||
Summary . . . . . . . . . . . . . . . . . . 67
|
||
|
||
Conclusion . . . . . . . . . . . . . . . . . . . . 69
|
||
|
||
REFERENCES . . . . . . . . . . . . . . . . . . . . 75
|
||
|
||
APPENDIX A. COMPUTER UNDERGROUND PSEUDONYMS . . . 76
|
||
|
||
APPENDIX B.
|
||
NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Introduction
|
||
|
||
The proliferation of home computers has been
|
||
|
||
accompanied by a corresponding social problem involving
|
||
|
||
the activities of so-called "computer hackers."
|
||
|
||
"Hackers" are computer aficionados who "break in" to
|
||
|
||
corporate and government computer systems using their
|
||
|
||
home computer and a telephone modem. The prevalence of
|
||
|
||
the problem has been dramatized by the media and
|
||
|
||
enforcement agents, and evidenced by the rise of
|
||
|
||
specialized private security firms to confront the
|
||
|
||
"hackers." But despite this flurry of attention,
|
||
|
||
little research has examined the social world of the
|
||
|
||
"computer hacker." Our current knowledge in this regard
|
||
|
||
derives from hackers who have been caught, from
|
||
|
||
enforcement agents, and from computer security
|
||
|
||
specialists. The everyday world and activities of the
|
||
|
||
"computer hacker" remain largely unknown.
|
||
|
||
This study examines the way actors in the
|
||
|
||
"computer underground" (CU) organize to perform their
|
||
|
||
acts. The computer underground, as it is called by
|
||
|
||
those who participate in it, is composed of actors
|
||
|
||
adhering to one of three roles: "hackers," "phreakers,"
|
||
|
||
or "pirates." To further understanding this growing
|
||
|
||
"social problem," this project will isolate and clarify
|
||
|
||
|
||
|
||
|
||
8
|
||
|
||
these roles, and examine how each contributes to the
|
||
|
||
culture as a whole. By doing so the sociological
|
||
|
||
question of how the "underground" is organized will be
|
||
|
||
answered, rather than the technical question of how CU
|
||
|
||
participants perform their acts.
|
||
|
||
Best and Luckenbill (1982) describe three basic
|
||
|
||
approaches to the study of "deviant" groups. The first
|
||
|
||
approach is from a social psychological level, where
|
||
|
||
analysis focuses on the needs, motives, and individual
|
||
|
||
characteristics of the actors involved. Secondly,
|
||
|
||
deviant groups can be studied at a socio-structural
|
||
|
||
level. Here the emphasis is on the distribution and
|
||
|
||
consequences of deviance within the society as a whole.
|
||
|
||
The third approach, the one adopted by this work, forms
|
||
|
||
a middle ground between the former two by addressing
|
||
|
||
the social organization of deviant groups. Focusing
|
||
|
||
upon neither the individual nor societal structures
|
||
|
||
entirely, social organization refers to the network of
|
||
|
||
social relations between individuals involved in a
|
||
|
||
common activity (pp. 13-14). Assessing the degree and
|
||
|
||
manner in which the underground is organized provides
|
||
|
||
the opportunity to also examine the culture, roles, and
|
||
|
||
channels of communication used by the computer
|
||
|
||
underground. The focus here is on the day to day
|
||
|
||
experience of persons whose activities have been
|
||
|
||
|
||
|
||
|
||
9
|
||
|
||
criminalized over the past several years.
|
||
|
||
Hackers, and the "danger" that they present in our
|
||
|
||
computer dependent society, have often received
|
||
|
||
attention from the legal community and the media. Since
|
||
|
||
1980, every state and the federal government has
|
||
|
||
criminalized "theft by browsing" of computerized
|
||
|
||
information (Hollinger and Lanza-Kaduce, 1988, pp.101-
|
||
|
||
102). In the media, hackers have been portrayed as
|
||
|
||
maladjusted losers, forming "high-tech street gangs"
|
||
|
||
(Chicago Tribune, 1989) that are dangerous to society.
|
||
|
||
My research will show that the computer underground
|
||
|
||
consists of a more sophisticated level of social
|
||
|
||
organization than has been generally recognized. The
|
||
|
||
very fact that CU participants are to some extent
|
||
|
||
"networked" has implications for social control
|
||
|
||
policies that may have been implemented based on an in-
|
||
|
||
complete understanding of the activity. This project
|
||
|
||
not only offers sociological insight into the organ-
|
||
|
||
ization of deviant associations, but may be helpful to
|
||
|
||
policy makers as well.
|
||
|
||
I begin with a discussion of the definitional
|
||
|
||
problems that inhibit the sociological analysis of the
|
||
|
||
computer underground. The emergence of the computer
|
||
|
||
underground is a recent phenomenon, and the lack of
|
||
|
||
empirical research on the topic has created an area
|
||
|
||
|
||
|
||
|
||
10
|
||
|
||
where few "standard" definitions and categories exist.
|
||
|
||
This work will show that terms such as "hacker,"
|
||
|
||
"phreaker," and "pirate" have different meanings for
|
||
|
||
those who have written about the computer underground
|
||
|
||
and those who participate in it. This work bridges
|
||
|
||
these inconsistencies by providing definitions that
|
||
|
||
focus on the intentions and goals of the participants,
|
||
|
||
rather than the legality or morality of their actions.
|
||
|
||
Following the definition of CU activities is a
|
||
|
||
discussion of the structure of the underground.
|
||
|
||
Utilizing a typology for understanding the social
|
||
|
||
organization of deviant associations, developed by Best
|
||
|
||
and Luckenbill (1982), the organization of the
|
||
|
||
computer underground is examined in depth.
|
||
|
||
The analysis begins by examining the structure of
|
||
|
||
mutual association. This provides insight into how CU
|
||
|
||
activity is organized, the ways in which information is
|
||
|
||
obtained and disseminated, and explores the subcultural
|
||
|
||
facets of the computer underground. More importantly,
|
||
|
||
it clearly illustrates that the computer underground is
|
||
|
||
primarily a social network of individuals that perform
|
||
|
||
their acts separately, yet support each other by
|
||
|
||
sharing information and other resources.
|
||
|
||
After describing mutual association within the
|
||
|
||
underground community, evidence of mutual participation
|
||
|
||
|
||
|
||
|
||
11
|
||
|
||
is presented. Although the CU is a social network, the
|
||
|
||
ties developed at the social level encourage the
|
||
|
||
formation of small "work groups." At this level, some
|
||
|
||
members of the CU work in cooperation to perform their
|
||
|
||
acts. The organization and purposes of these groups are
|
||
|
||
examined, as well as their relationship to the CU as a
|
||
|
||
whole. However, because only limited numbers of
|
||
|
||
individuals join these short-lived associations, it is
|
||
|
||
concluded that the CU is organized as colleagues. Those
|
||
|
||
who do join "work groups" display the characteristics
|
||
|
||
of peers, but most CU activity takes place at a fairly
|
||
|
||
low level of sophistication.
|
||
|
||
|
||
|
||
|
||
12
|
||
|
||
|
||
|
||
|
||
|
||
Methodology
|
||
|
||
Adopting an ethnographic approach, data have been
|
||
|
||
gathered by participating in, monitoring, and cata-
|
||
|
||
loging channels of communication used by active members
|
||
|
||
of the computer underground. These channels, which will
|
||
|
||
be examined in detail later, include electronic
|
||
|
||
bulletin board systems (BBS), voice mail boxes,
|
||
|
||
bridges, loops, e-mail, and telephone conversations.
|
||
|
||
These sources provide a window through which to observe
|
||
|
||
interactions, language, and cultural meanings without
|
||
|
||
intruding upon the situation or violating the privacy
|
||
|
||
of the participants. Because these communication
|
||
|
||
centers are the "back stage" area of the computer
|
||
|
||
underground, they provided insight into organizational
|
||
|
||
(and other) issues that CU participants face, and the
|
||
|
||
methods they use to resolve them.
|
||
|
||
As with any ethnographic research, steps have been
|
||
|
||
taken to protect the identity of informants. The
|
||
|
||
culture of the computer underground aids the researcher
|
||
|
||
in this task since phreakers, hackers, and pirates
|
||
|
||
regularly adopt pseudonyms to mask their identity.
|
||
|
||
However to further ensure confidentiality, all of the
|
||
|
||
pseudonyms cited in this research have been changed by
|
||
|
||
the author. Additionally, any information that is
|
||
|
||
|
||
|
||
|
||
13
|
||
|
||
potentially incriminating has been removed or altered.
|
||
|
||
The data set used for this study consists
|
||
|
||
primarily of messages, or "logs," which are the primary
|
||
|
||
form of communication between users. These logs were
|
||
|
||
"captured" (recorded using the computer to save the
|
||
|
||
messages) from several hundred computer bulletin
|
||
|
||
boards1 located across the United States. The bulk of
|
||
|
||
the data were gathered over a seventeen month period
|
||
|
||
(12/87 to 4/89) and will reflect the characteristics of
|
||
|
||
the computer underground during that time span.
|
||
|
||
However, some data, provided to the researcher by
|
||
|
||
cooperative subjects, dates as far back as 1984.
|
||
|
||
The logged data were supplemented by referring to
|
||
|
||
several CU "publications." The members of the computer
|
||
|
||
underground produce and distribute several technical
|
||
|
||
and tutorial newsletters and "journals." Since these
|
||
|
||
"publications" are not widely available outside of CU
|
||
|
||
circles I have given a brief description of each below.
|
||
|
||
Legion of Doom/Hackers Technical Journal. This
|
||
|
||
____________________
|
||
|
||
1 Computer Bulletin Boards (BBS) are personal
|
||
computers that have been equipped with a telephone
|
||
modem and special software. Users can connect with a
|
||
BBS by dialing, with their own computer and modem, the
|
||
phone number to which the BBS is connected. After
|
||
"logging in" by supplying a valid user name and pass-
|
||
word, the user can leave messages to other users of the
|
||
system. These messages are not private and anyone
|
||
calling the BBS can freely read and respond to them.
|
||
|
||
|
||
|
||
|
||
|
||
14
|
||
|
||
publication is written and distributed by a group known
|
||
|
||
as "The Legion of Doom/Legion of Hackers" (LoD/H). It
|
||
|
||
is available in electronic format (a computer text
|
||
|
||
file) and contains highly technical information on
|
||
|
||
computer operating systems. As of this writing, three
|
||
|
||
issues have been published.
|
||
|
||
PHRACK Inc.: Phrack Inc is a newsletter that
|
||
|
||
contains various articles, written by different
|
||
|
||
authors, and "published" under one banner. Phrack
|
||
|
||
Inc's first issue was released in 1985, making it the
|
||
|
||
oldest of the electronically distributed underground
|
||
|
||
publications. CU participants are invited to submit
|
||
|
||
articles to the editors, who release a new issue when a
|
||
|
||
sufficient number (about nine) of acceptable pieces
|
||
|
||
have been gathered. Phrack also features a lengthy
|
||
|
||
"World News" with stories about hackers who have been
|
||
|
||
apprehended and interviews with various members of the
|
||
|
||
underground. As of this writing twenty-seven issues of
|
||
|
||
Phrack, have been published.
|
||
|
||
Phreakers/Hackers Underground Network (P/Hun):
|
||
|
||
Like Phrack, P/Hun collects articles from various
|
||
|
||
authors and releases them as one issue. Three issues
|
||
|
||
have been published to date.
|
||
|
||
Activist Times, Incorporated (ATI): Unlike the
|
||
|
||
other electronically distributed publications, ATI does
|
||
|
||
|
||
|
||
|
||
15
|
||
|
||
not limit itself to strictly computer/telephone news.
|
||
|
||
Articles normally include commentary on world and
|
||
|
||
government events, and other "general interest" topics.
|
||
|
||
ATI issues are generally small and consist of articles
|
||
|
||
written by a core group of four to seven people.
|
||
|
||
Unlike the publications discussed thus far, ATI is
|
||
|
||
available in printed "hard copy" form by sending
|
||
|
||
postage reimbursement to the editor. ATI is currently
|
||
|
||
on their 38th issue.
|
||
|
||
2600 Magazine: Published in a traditional
|
||
|
||
(printed) magazine format, 2600 (named for the
|
||
|
||
frequency tone used to make free long distance phone
|
||
|
||
calls) is arguably an "underground" publication as it
|
||
|
||
is available on some newsstands and at some libraries.
|
||
|
||
Begun in 1987 as a monthly magazine, it is now
|
||
|
||
published quarterly. Subscription rates are $25.00 a
|
||
|
||
year with a complete back-issue selection available.
|
||
|
||
The magazine specializes in publishing technical
|
||
|
||
information on telephone switching systems, satellite
|
||
|
||
descrambling codes, and news about the computer
|
||
|
||
underground.
|
||
|
||
TAP/YIPL: First established in 1972 as YIPL (Youth
|
||
|
||
International Party Line), this publication soon
|
||
|
||
changed its name to TAP (Technical Assistance Party).
|
||
|
||
Co-founded by Abbie Hoffman, it is generally recognized
|
||
|
||
|
||
|
||
|
||
16
|
||
|
||
as the grandfather of computer underground
|
||
|
||
publications. Publication of the 2-4 page newsletter
|
||
|
||
has been very sporadic over the years, and currently
|
||
|
||
two different versions of TAP, each published in
|
||
|
||
different areas of the country, are in circulation.
|
||
|
||
Utilizing a data set that consists of current
|
||
|
||
message logs, old messages logs, and various CU
|
||
|
||
publications yields a reasonably rich collection from
|
||
|
||
which to draw the analysis. Examination of the older
|
||
|
||
logs and publications shows that while the actors have
|
||
|
||
changed over the years, cultural norms and
|
||
|
||
characteristics have remained consistent over time.
|
||
|
||
|
||
|
||
|
||
17
|
||
|
||
|
||
|
||
|
||
|
||
What is the Computer Underground?
|
||
|
||
Defining the "computer underground" can be
|
||
|
||
difficult. The sociologist soon finds that there are
|
||
|
||
several competing definitions of computer underground
|
||
|
||
activity. Those who have written on the subject, the
|
||
|
||
media, criminologists, computer programmers, social
|
||
|
||
control agents, and CU participants themselves, have
|
||
|
||
adopted definitions consistent with their own social
|
||
|
||
positions and perspectives. Not surprisingly, these
|
||
|
||
definitions rarely correspond. Therefore, before
|
||
|
||
discussing the organization of the computer
|
||
|
||
underground, it is necessary to discuss and compare the
|
||
|
||
various definitions. This will illustrate the range of
|
||
|
||
beliefs about CU activity, and provide a springboard
|
||
|
||
for the discussion of types of roles and activities
|
||
|
||
found in the underground.
|
||
|
||
We begin with a discussion of the media image of
|
||
|
||
computer hackers. The media's concept of "hackers" is
|
||
|
||
important because the criminalization of the activity
|
||
|
||
has largely occurred as the result of media drama-
|
||
|
||
tization of the "problem" (Hollinger and Lanza-Kaduce,
|
||
|
||
1988). In fact, it was a collection of newspaper and
|
||
|
||
film clips that was presented to the United States
|
||
|
||
Congress during legislative debates as evidence of the
|
||
|
||
|
||
|
||
|
||
18
|
||
|
||
computer hacking problem (Hollinger and Lanza-Kaduce,
|
||
|
||
1988, p.107). Unfortunately, the media assessment of
|
||
|
||
the computer underground displays a naive understanding
|
||
|
||
of CU activity.
|
||
|
||
The media generally makes little distinction
|
||
|
||
between different types of CU activity. Most any
|
||
|
||
computer-related crime activity can be attributed to
|
||
|
||
"hackers." Everything from embezzlement to computer
|
||
|
||
viruses have, at one time or another, been attributed
|
||
|
||
to them. Additionally, hackers are often described as
|
||
|
||
being sociopathic or malicious, creating a media image
|
||
|
||
of the computer underground that may exaggerate their
|
||
|
||
propensity for doing damage.
|
||
|
||
The labeling of hackers as being "evil" is well
|
||
|
||
illustrated by two recent media examples. The first is
|
||
|
||
from Eddie Schwartz, a WGN-Radio talk show host. Here
|
||
|
||
Schwartz is addressing "Anna," a self-identified hacker
|
||
|
||
that has phoned into the show:
|
||
|
||
You know what Anna, you know what disturbs
|
||
me? You don't sound like a stupid person but
|
||
you represent a . . . a . . . a . . . lack of
|
||
morality that disturbs me greatly. You really
|
||
do. I think you represent a certain way of
|
||
thinking that is morally bankrupt. And I'm
|
||
not trying to offend you, but I . . . I'm
|
||
offended by you! (WGN Radio, 1988)
|
||
|
||
Just two months later, NBC-TV's "Hour Magazine"
|
||
|
||
featured a segment on "computer crime." In this
|
||
|
||
example, Jay Bloombecker, director of the National
|
||
|
||
|
||
|
||
|
||
19
|
||
|
||
Center for Computer Crime Data, discusses the "hacker
|
||
|
||
problem" with the host of the show, Gary Collins.
|
||
|
||
Collins: . . . are they %hackers% malicious
|
||
in intent, or are they simply out to prove,
|
||
ah, a certain machismo amongst their peers?
|
||
|
||
Bloombecker: I think so. I've talked about
|
||
"modem macho" as one explanation for what's
|
||
being done. And a lot of the cases seem to
|
||
involve %proving% %sic% that he . . . can do
|
||
something really spiffy with computers. But,
|
||
some of the cases are so evil, like causing
|
||
so many computers to break, they can't look
|
||
at that as just trying to prove that you're
|
||
better than other people.
|
||
|
||
GC: So that's just some of it, some kind of
|
||
"bet" against the computer industry, or
|
||
against the company.
|
||
|
||
JB: No, I think it's more than just
|
||
rottenness. And like someone who uses
|
||
graffiti doesn't care too much whose building
|
||
it is, they just want to be destructive.
|
||
|
||
GC: You're talking about a sociopath in
|
||
control of a computer!
|
||
|
||
JB: Ah, lots of computers, because there's
|
||
thousands, or tens of thousands %of hackers%
|
||
(NBC-TV, 1988).
|
||
|
||
|
||
The media image of computer hackers, and thus all
|
||
|
||
members of the computer underground, is burdened with
|
||
|
||
value-laden assumptions about their psychological
|
||
|
||
makeup, and focuses almost entirely upon the morality
|
||
|
||
of their actions. Additionally, since media stories
|
||
|
||
are taken from the accounts of police blotters,
|
||
|
||
security personnel, and hackers who have been caught,
|
||
|
||
each of whom have different perspectives and
|
||
|
||
|
||
|
||
|
||
20
|
||
|
||
definitions of their own, the media definition, if not
|
||
|
||
inherently biased, is at best inconsistent.
|
||
|
||
Criminologists, by way of contrast, have done
|
||
|
||
little to define the computer underground from a
|
||
|
||
sociological perspective. Those criminological
|
||
|
||
definitions that do exist are less judgmental than the
|
||
|
||
media image, but no more precise. Labels of
|
||
|
||
"electronic trespassers" (Parker, 1983), and
|
||
|
||
"electronic vandals" (Bequai, 1987) have both been
|
||
|
||
applied to hackers. Both terms, while acknowledging
|
||
|
||
that "hacking" is deviant, shy away from labeling it as
|
||
|
||
"criminal" or sociopathic behavior. Yet despite this
|
||
|
||
seemingly non-judgmental approach to the computer
|
||
|
||
underground, both Parker and Bequai have testified
|
||
|
||
before Congress, on behalf of the computer security in-
|
||
|
||
dustry, on the "danger" of computer hackers.
|
||
|
||
Unfortunately, their "expert" testimony was largely
|
||
|
||
based on information culled from newspaper stories, the
|
||
|
||
objectiveness of which has been seriously questioned
|
||
|
||
(Hollinger and Lanza-Kaduce 1988 p.105).
|
||
|
||
Computer security specialists, on the other hand,
|
||
|
||
are often quick to identify CU participants as part of
|
||
|
||
the criminal element. Correspondingly, some reject the
|
||
|
||
notion that there are different roles and motivations
|
||
|
||
among computer underground participants and thereby
|
||
|
||
|
||
|
||
|
||
21
|
||
|
||
refuse to define just what it is that a "hacker" or
|
||
|
||
"phreaker" does. John Maxfield, a "hacker expert,"
|
||
|
||
suggests that differentiating between "hackers" and
|
||
|
||
"phone phreaks" is a moot point, preferring instead
|
||
|
||
that they all just be called "criminals" (WGN-Radio.
|
||
|
||
Sept 28, 1988).
|
||
|
||
The reluctance or inability to differentiate
|
||
|
||
between roles and activities in the computer
|
||
|
||
underground, as exhibited in the media and computer
|
||
|
||
security firms, creates an ambiguous definition of
|
||
|
||
"hacker" that possesses two extremes: the modern-day
|
||
|
||
bank robber at one end, the trespassing teenager at the
|
||
|
||
other. Thus, most any criminal or mischievous act that
|
||
|
||
involves computers can be attributed to "hackers,"2
|
||
|
||
regardless of the nature of the crime.
|
||
|
||
Further compounding the inconsistent use of
|
||
|
||
"hacker" is the evolution of meaning that the word has
|
||
|
||
undergone. "Hacker" was first applied to computer
|
||
|
||
related activities when it was used by programmers in
|
||
|
||
the late 1950's. At that time it referred to the
|
||
|
||
pioneering researchers, such as those at M.I.T., who
|
||
____________________
|
||
|
||
2 During the WGN-Radio show on computer crime one
|
||
caller, who was experiencing a malfunctioning phone
|
||
that would "chirp" occasionally while hung up, believed
|
||
that "computer hackers" were responsible for the
|
||
problem. The panel assured her that it was unrelated
|
||
to CU activity.
|
||
|
||
|
||
|
||
|
||
|
||
22
|
||
|
||
were constantly adjusting and experimenting with the
|
||
|
||
new technology (Levy, 1984. p.7). A "hacker" in this
|
||
|
||
context refers to an unorthodox, yet talented,
|
||
|
||
professional programmer. This use of the term still
|
||
|
||
exits today, though it is largely limited to
|
||
|
||
professional computing circles.
|
||
|
||
Another definition of "hacker" refers to one who
|
||
|
||
obtains unauthorized, if not illegal, access to
|
||
|
||
computer systems and networks. This definition was
|
||
|
||
popularized by the movie War Games and, generally
|
||
|
||
speaking, is the one used by the media.3 It is also the
|
||
|
||
definition favored by the computer underground.
|
||
|
||
Both the members of the computer underground and
|
||
|
||
computer programmers claim ownership of "hacker," and
|
||
|
||
each defend the "proper" use of term. The computer
|
||
|
||
professionals maintain that using "hackers" (or
|
||
|
||
"hacking") to refer to any illegal or illicit activity
|
||
|
||
is a corruption of the "true" meaning of the word. Bob
|
||
|
||
Bickford, a professional programmer who has organized
|
||
|
||
several programmer conferences, explains:
|
||
____________________
|
||
|
||
3 This is not always true of course. The AP
|
||
Stylebook has yet to specify how "hacker" should be
|
||
used. A recent Associated Press story featured a
|
||
computer professional explaining that a "real hacker"
|
||
would never do anything illegal. Yet just a few weeks
|
||
later Associated Press distributed stories proclaiming
|
||
that West German "hackers" had broken into US Defense
|
||
Department computer systems.
|
||
|
||
|
||
|
||
|
||
|
||
23
|
||
|
||
At the most recent conference %called
|
||
"Hackers 4.0"% we had 200 of the most
|
||
brilliant computer professionals in the world
|
||
together for one weekend; this crowd included
|
||
several PhD's, several presidents of
|
||
companies (including large companies, such as
|
||
Pixar), and various artists, writers,
|
||
engineers, and programmers. These people all
|
||
consider themselves Hackers: all derive great
|
||
joy from their work, from finding ways around
|
||
problems and limits, from creating rather
|
||
than destroying. It would be a great
|
||
disservice to these people, and the thousands
|
||
of professionals like them, to let some
|
||
pathetic teenaged criminals destroy the one
|
||
word which captures their style of
|
||
interaction with the universe: Hackers
|
||
(Bickford, 1988).
|
||
|
||
Participants in the computer underground also
|
||
|
||
object to the "misuse" of the term. Their objection
|
||
|
||
centers around the indiscriminate use of the word to
|
||
|
||
refer to computer related crime in general and not,
|
||
|
||
specifically, the activities of the computer
|
||
|
||
underground:
|
||
|
||
Whenever the slightest little thing happens
|
||
involving computer security, or the breach
|
||
thereof, the media goes fucking bat shit and
|
||
points all their fingers at us 'nasty
|
||
hackers.' They're so damned ignorant it's
|
||
sick (EN, message log, 1988).
|
||
|
||
. . . whenever the media happens upon
|
||
anything that involves malicious computer use
|
||
it's the "HACKERS." The word is a catch
|
||
phrase it makes mom drop the dishes and watch
|
||
the TV. They use the word because not only
|
||
they don't really know the meaning but they
|
||
have lack of a word to describe the
|
||
perpetrator. That's why hacker has such a
|
||
bad name, its always associated with evil
|
||
things and such (PA, message log, 1988).
|
||
|
||
I never seen a phreaker called a phreaker
|
||
|
||
|
||
|
||
|
||
24
|
||
|
||
when caught and he's printed in the
|
||
newspaper. You always see them "Hacker caught
|
||
in telephone fraud." "Hacker defrauds old
|
||
man with phone calling card." What someone
|
||
should do is tell the fucken (sic) media to
|
||
get it straight (TP2, message log, 1988).
|
||
|
||
|
||
Obviously the CU and computer professional
|
||
|
||
definitions of "hacker" refer to different social
|
||
|
||
groups. As Best and Luckenbill (1982, p. 39) observe:
|
||
|
||
"Every social group modifies the basic language to fit
|
||
|
||
its own circumstance, creating new words or using
|
||
|
||
ordinary words in special ways." Which definition, if
|
||
|
||
either, will come into widespread use remains to be
|
||
|
||
seen. However, since computer break-ins are likely to
|
||
|
||
receive more media attention than clever feats of
|
||
|
||
programming, the CU definition is likely to dominate
|
||
|
||
simply by being used more often.4 But as long as the
|
||
|
||
two definitions do exist there will be confusion unless
|
||
|
||
writers and researchers adequately specify the group
|
||
|
||
under discussion. For this reason, I suggest that
|
||
|
||
sociologists, and criminologists in particular, adopt
|
||
|
||
the "underground" definition for consistency and
|
||
____________________
|
||
|
||
4 Another factor may be the adoption of a close
|
||
proximity to the underground definition being included
|
||
in the 1986 edition of Webster's New World dictionary:
|
||
hack.er n. 1. a person who hacks 2. an unskilled
|
||
golfer, tennis player, etc. 3. a talented amateur user
|
||
of computers, specif. one who attempts to gain
|
||
unauthorized access to files.
|
||
|
||
|
||
|
||
|
||
|
||
25
|
||
|
||
accuracy when speaking of the actions of CU
|
||
|
||
participants.
|
||
|
||
While it is recognized that computer hacking is a
|
||
|
||
relatively new phenomenon, the indiscriminant use of
|
||
|
||
the term to refer to many different forms of unorthodox
|
||
|
||
computer use has been counterproductive to
|
||
|
||
understanding the extent of the activity. To avoid this
|
||
|
||
a "computer hacker" should be defined as an individual,
|
||
|
||
associated with the computer underground, who
|
||
|
||
specializes in obtaining unauthorized access to
|
||
|
||
computer systems. A "phone phreak" in an individual,
|
||
|
||
associated with the computer underground, who
|
||
|
||
specializes in obtaining unauthorized information about
|
||
|
||
the phone system. A "software pirate" is an
|
||
|
||
individual, associated with the computer underground,
|
||
|
||
who distributes or collects copyrighted computer
|
||
|
||
software. These definitions have been derived from the
|
||
|
||
data, instead of relying upon those who defend the
|
||
|
||
"integrity" of the original meanings, or those who are
|
||
|
||
unfamiliar with the culture.
|
||
|
||
|
||
|
||
|
||
26
|
||
|
||
|
||
|
||
|
||
|
||
Topography of the Computer Underground
|
||
|
||
Having defined the three main roles in the
|
||
|
||
computer underground, it is necessary to examine each
|
||
|
||
activity separately in order to provide a general
|
||
|
||
typology of the computer underground. In doing so, the
|
||
|
||
ways in which each contributes to the culture as a
|
||
|
||
whole will be illustrated, and the divisions between
|
||
|
||
them that affect the overall organization will be
|
||
|
||
developed. Analysis of these roles and divisions is
|
||
|
||
crucial to understanding identity, access, and mobility
|
||
|
||
within the culture.
|
||
|
||
|
||
|
||
Hacking
|
||
|
||
In the vernacular of the computer underground,
|
||
|
||
"hacking" refers to gaining access and exploring
|
||
|
||
computer systems and networks. "Hacking" encompasses
|
||
|
||
both the act and the methods used to obtain valid user
|
||
|
||
accounts on computer systems.
|
||
|
||
"Hacking" also refers to the activity that
|
||
|
||
occurs once access to another computer has been
|
||
|
||
obtained. Since the system is being used without
|
||
|
||
authorization, the hacker does not, generally speaking,
|
||
|
||
have access to the usual operating manuals and other
|
||
|
||
resources that are available to legitimate users.
|
||
|
||
|
||
|
||
|
||
27
|
||
|
||
Therefore, the hacker must experiment with commands and
|
||
|
||
explore various files in order to understand and
|
||
|
||
effectively use the system. The goal here is to
|
||
|
||
explore and experiment with the system that has been
|
||
|
||
entered. By examining files and, perhaps, by a little
|
||
|
||
clever programming, the hacker may be able to obtain
|
||
|
||
protected information or more powerful access
|
||
|
||
privileges.5
|
||
|
||
|
||
|
||
Phreaking
|
||
|
||
Another role in the computer underground is that
|
||
|
||
of the "phone phreak." Phone phreaking, usually called
|
||
|
||
just "phreaking," was widely publicized when the
|
||
|
||
exploits of John "Cap'n Crunch" Draper, the "father of
|
||
|
||
phreaking," were publicized in a 1971 Esquire magazine
|
||
|
||
article.
|
||
|
||
The term "phreaking" encompasses several different
|
||
|
||
means of circumventing the billing mechanisms of
|
||
|
||
telephone companies. By using these methods, long-
|
||
____________________
|
||
|
||
5 Contrary to the image sometimes perpetuated by
|
||
computer security consultants, the data indicate that
|
||
hackers refrain from deliberately destroying data or
|
||
otherwise damaging the system. Doing so would conflict
|
||
with their instrumental goal of blending in with the
|
||
average user so as not to attract undue attention to
|
||
their presence and cause the account to be deleted.
|
||
After spending what may be a substantial amount of time
|
||
obtaining a high access account, the hacker places a
|
||
high priority on not being discovered using it.
|
||
|
||
|
||
|
||
|
||
|
||
28
|
||
|
||
distance phone calls can be placed without cost. In
|
||
|
||
many cases the methods also prevent, or at least
|
||
|
||
inhibit, the possibility of calls being traced to their
|
||
|
||
source thereby helping the phreaker to avoid being
|
||
|
||
caught.
|
||
|
||
Early phreaking methods involved electro-
|
||
|
||
mechanical devices that generated key tones, or altered
|
||
|
||
line voltages in certain ways as to trick the
|
||
|
||
mechanical switches of the phone company into
|
||
|
||
connecting calls without charging. However the advent
|
||
|
||
of computerized telephone-switching systems largely
|
||
|
||
made these devices obsolete. In order to continue
|
||
|
||
their practice the phreaks have had to learn hacking
|
||
|
||
skills:6
|
||
|
||
Phreaking and hacking have just recently
|
||
merged, because now, the telephone companies
|
||
are using computers to operate their network.
|
||
So, in order to learn more about these
|
||
computers in relation to the network, phreaks
|
||
have learned hacking skills, and can now
|
||
program, and get around inside the machines
|
||
(AF, message log, 1988).
|
||
|
||
For most members of the computer underground,
|
||
|
||
phreaking is simply a tool that allows them to call
|
||
|
||
long distance without amassing enormous phone bills.
|
||
____________________
|
||
|
||
6 Because the two activities are so closely
|
||
related, with phreakers learning hacking skills and
|
||
hackers breaking into "telco" computers, reference is
|
||
usually made to phreak/hacking or "p/hackers." This
|
||
paper follows this convention.
|
||
|
||
|
||
|
||
|
||
|
||
29
|
||
|
||
Those who have a deeper and more technically oriented
|
||
|
||
interest in the "telco" (telephone company) are known
|
||
|
||
as phreakers. They, like the hackers discussed earlier,
|
||
|
||
desire to master and explore a system that few
|
||
|
||
outsiders really understand:
|
||
|
||
The phone system is the most interesting,
|
||
fascinating thing that I know of. There is so
|
||
much to know. Even phreaks have their own
|
||
areas of knowledge. There is so much to know
|
||
that one phreak could know something fairly
|
||
important and the next phreak not. The next
|
||
phreak might know ten things that the first
|
||
phreak doesn't though. It all depends upon
|
||
where and how they get their info. I myself
|
||
%sic% would like to work for the telco, doing
|
||
something interesting, like programming a
|
||
switch. Something that isn't slave labor
|
||
bullshit. Something that you enjoy, but have
|
||
to take risks in order to participate unless
|
||
you are lucky enough to work for the telco.
|
||
To have access to telco things, manuals, etc
|
||
would be great (DP, message log, 1988).
|
||
|
||
Phreaking involves having the dedication to
|
||
commit yourself to learning as much about the
|
||
phone system/network as possible. Since most
|
||
of this information is not made public,
|
||
phreaks have to resort to legally
|
||
questionable means to obtain the knowledge
|
||
they want (TP2, message log, 1988).
|
||
|
||
|
||
|
||
Most members of the underground do not approach
|
||
|
||
the telephone system with such passion. Many hackers
|
||
|
||
are interested in the phone system solely to the extent
|
||
|
||
that they can exploit its weaknesses and pursue other
|
||
|
||
goals. In this case, phreaking becomes a means and not
|
||
|
||
a pursuit unto itself. Another individual, one who
|
||
|
||
|
||
|
||
|
||
30
|
||
|
||
identifies himself as a hacker, explains:
|
||
|
||
I know very little about phones . . . I just
|
||
hack. See, I can't exactly call these numbers
|
||
direct. A lot of people are in the same
|
||
boat. In my case, phreaking is a tool, an
|
||
often used one, but nonetheless a tool (TU,
|
||
message log, 1988).
|
||
|
||
|
||
In the world of the computer underground, the
|
||
|
||
ability to "phreak a call" is taken for granted. The
|
||
|
||
invention of the telephone credit card has opened the
|
||
|
||
door to wide-scale phreaking. With these cards, no
|
||
|
||
special knowledge or equipment is required to phreak a
|
||
|
||
call, only valid credit card numbers, known as "codez,"
|
||
|
||
are needed to call any location in the world. This
|
||
|
||
easy access to free long-distance service is
|
||
|
||
instrumental for maintaining contact with CU
|
||
|
||
participants scattered across the nation.
|
||
|
||
|
||
|
||
Pirating
|
||
|
||
The third major role in the computer underground
|
||
|
||
is that of the software pirate. Software piracy refers
|
||
|
||
to the unauthorized copying and distribution of copy-
|
||
|
||
righted software. This activity centers around
|
||
|
||
computer bulletin board systems that specialize in
|
||
|
||
"warez."7 There pirates can contribute and share
|
||
____________________
|
||
|
||
7 "Warez" is a common underground term that refers
|
||
to pirated software.
|
||
|
||
|
||
|
||
|
||
|
||
31
|
||
|
||
copies of commercial software. Having access to these
|
||
|
||
systems (usually obtained by contributing a copyrighted
|
||
|
||
program via a telephone modem) allows the pirate to
|
||
|
||
copy, or "download," between two to six programs that
|
||
|
||
others have contributed.
|
||
|
||
Software piracy is a growing concern among
|
||
|
||
software publishing companies. Some contend that the
|
||
|
||
illegal copying of software programs costs the industry
|
||
|
||
billions of dollars in lost revenues. Pirates challenge
|
||
|
||
this, and claim that in many ways pirating is a hobby,
|
||
|
||
much like collecting stamps or baseball cards, and
|
||
|
||
their participation actually induces them to spend more
|
||
|
||
on software than they would otherwise, even to the
|
||
|
||
point of buying software they don't truly need:
|
||
|
||
There's a certain sense of, ahh, satisfaction
|
||
in having the latest program, or being the
|
||
first to upload a program on the "want list."
|
||
I just like to play around with them, see
|
||
what they can do. If I like something, I'll
|
||
buy it, or try out several programs like it,
|
||
then buy one. In fact, if I wasn't pirating,
|
||
I wouldn't buy any warez, because some of
|
||
these I buy I do for uploading or just for
|
||
the fun of it. So I figure the software
|
||
companies are making money off me, and this
|
||
is pretty much the same for all the really
|
||
elite boards, the ones that have the best and
|
||
most programs. . . . I just bought a $117.
|
||
program, an accounting program, and I have
|
||
absolutely no use for it. It's for small
|
||
businesses. I thought maybe it would auto-
|
||
write checks, but it's really a bit too high
|
||
powered for me. I thought it would be fun to
|
||
trade to some other boards, but I learned a
|
||
lot from just looking at it (JX, field notes,
|
||
1989).
|
||
|
||
|
||
|
||
|
||
32
|
||
|
||
|
||
Pirates and phreak/hackers do not necessarily
|
||
|
||
support the activities of each other, and there is
|
||
|
||
distrust and misunderstanding between the two groups.
|
||
|
||
At least part of this distrust lies in the
|
||
|
||
phreak/hacker perception that piracy is an unskilled
|
||
|
||
activity.8 While p/hackers probably don't disapprove
|
||
|
||
of piracy as an activity, they nevertheless tend to
|
||
|
||
avoid pirate bulletin board systems --partly because
|
||
|
||
there is little pertinent phreak/hack information
|
||
|
||
contained on them, and partly because of the belief
|
||
|
||
that pirates indiscriminately abuse the telephone
|
||
|
||
network in pursuit of the latest computer game. One
|
||
|
||
hacker illustrates this belief by theorizing that
|
||
|
||
pirates are responsible for a large part of telephone
|
||
|
||
credit card fraud.
|
||
|
||
The media claims that it is solely hackers
|
||
who are responsible for losses pertaining to
|
||
large telecommunication companies and long
|
||
distance services. This is not the case. We
|
||
are %hackers% but a small portion of these
|
||
losses. The rest are caused by pirates and
|
||
thieves who sell these codes to people on the
|
||
street (AF, message log, 1988).
|
||
|
||
Other hackers complained that uploading large
|
||
____________________
|
||
|
||
8 A possible exception to this are those pirates
|
||
that have the programming skills needed to remove copy
|
||
protection from software. By removing the program code
|
||
that inhibits duplicate copies from being made these
|
||
individuals, known as "crackers," contribute greatly to
|
||
the easy distribution of "warez."
|
||
|
||
|
||
|
||
|
||
|
||
33
|
||
|
||
programs frequently takes several hours to complete,
|
||
|
||
and it is pirate calls, not the ones placed by "tele-
|
||
|
||
communications enthusiasts" (a popular euphemism for
|
||
|
||
phreakers and hackers) that cost the telephone industry
|
||
|
||
large sums of money. However, the data do not support
|
||
|
||
the assertation that all pirates phreak their calls.
|
||
|
||
Phreaking is considered "very tacky" among elite
|
||
|
||
pirates, and system operators (Sysops) of pirate
|
||
|
||
bulletin boards discourage phreaked calls because it
|
||
|
||
draws attention to the system when the call is
|
||
|
||
discovered by the telephone company.
|
||
|
||
Regardless of whether it is the lack of phreak/
|
||
|
||
hack skills, the reputation for abusing the network, or
|
||
|
||
some other reason, there is indeed a certain amount of
|
||
|
||
division between the world of phreakers and hackers and
|
||
|
||
that of pirates. The two communities co-exist and share
|
||
|
||
resources and methods, but function separately.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
34
|
||
|
||
|
||
|
||
|
||
|
||
Social Organization and Deviant Associations
|
||
|
||
Having outlined and defined the activities of the
|
||
|
||
computer underground, the question of social
|
||
|
||
organization can be addressed. Joel Best and David
|
||
|
||
Luckenbill (1982) have developed a typology for
|
||
|
||
identifying the social organization of deviant
|
||
|
||
associations. Essentially they state that deviant
|
||
|
||
organizations, regardless of their actual type of
|
||
|
||
deviance, will vary in the complexity of their division
|
||
|
||
of labor, coordination among organization roles, and
|
||
|
||
the purposiveness with which they attempt to achieve
|
||
|
||
their goals. Those organizations which display high
|
||
|
||
levels in each of these categories are more
|
||
|
||
sophisticated than those with lower levels.
|
||
|
||
Deviants relations with one another can be
|
||
arrayed along the dimension of organizational
|
||
sophistication. Beginning with the least
|
||
sophisticated form, %we% discuss five forms
|
||
of the social organization of deviants:
|
||
loners, colleagues, peers, mobs, and formal
|
||
organizations. These organization forms are
|
||
defined in terms of four variables: whether
|
||
the deviants associate with one another;
|
||
whether they participate in deviance
|
||
together; whether their deviance requires an
|
||
elaborate division of labor; and whether
|
||
their organization's activities extend over
|
||
time and space (Best and Luckenbill, 1982,
|
||
p.24).
|
||
|
||
These four variables, also known as mutual association,
|
||
|
||
mutual participation, elaborate division of labor, and
|
||
|
||
|
||
|
||
|
||
35
|
||
|
||
extended organization, are indicators of the social
|
||
|
||
organization of deviant groups. The following, taken
|
||
|
||
from Best and Luckenbill, illustrates:
|
||
|
||
FORM OF MUTUAL MUTUAL DIVISION EXTENDED
|
||
ORGAN- ASSOCIA- PARTICIPA- OF ORGAN-
|
||
IZATION TION TION LABOR IZATION
|
||
-----------------------------------------------------
|
||
Loners no no no no
|
||
Colleagues yes no no no
|
||
Peers yes yes no no
|
||
Mobs yes yes yes no
|
||
Formal
|
||
Organizations yes yes yes yes
|
||
_____________________________________________________
|
||
(1982, p.25)
|
||
|
||
|
||
Loners do not associate with other deviants,
|
||
participate in shared deviance, have a
|
||
division of labor, or maintain their deviance
|
||
over extended time and space. Colleagues
|
||
differ from loners because they associate
|
||
with fellow deviants. Peers not only
|
||
associate with one another, but also
|
||
participate in deviance together. In mobs,
|
||
this shared participation requires an
|
||
elaborate division of labor. Finally, formal
|
||
organizations involve mutual association,
|
||
mutual participation, an elaborate division
|
||
of labor, and deviant activities extended
|
||
over time and space (Best and Luckenbill,
|
||
1982, pp.24-25).
|
||
|
||
The five forms of organizations are presented as
|
||
|
||
ideal types, and "organizational sophistication" should
|
||
|
||
be regarded as forming a continuum with groups located
|
||
|
||
at various points along the range (Best and Luckenbill,
|
||
|
||
1982, p.25). With these two caveats in mind, we begin
|
||
|
||
to examine the computer underground in terms of each of
|
||
|
||
|
||
|
||
|
||
36
|
||
|
||
the four organizational variables. The first level,
|
||
|
||
mutual association, is addressed in the following
|
||
|
||
section.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
37
|
||
|
||
|
||
|
||
|
||
|
||
Mutual Association
|
||
|
||
Mutual association is an indicator of
|
||
|
||
organizational sophistication in deviant associations.
|
||
|
||
Its presence in the computer underground indicates that
|
||
|
||
on a social organization level phreak/hackers act as
|
||
|
||
"colleagues." Best and Luckenbill discuss the
|
||
|
||
advantages of mutual association for unconventional
|
||
|
||
groups:
|
||
|
||
The more sophisticated the form of
|
||
organization, the more likely the deviants
|
||
can help one another with their problems.
|
||
Deviants help one another in many ways: by
|
||
teaching each other deviant skills and a
|
||
deviant ideology; by working together to
|
||
carry out complicated tasks; by giving each
|
||
other sociable contacts and moral support; by
|
||
supplying one another with deviant equipment;
|
||
by protecting each other from the
|
||
authorities; and so forth. Just as %others%
|
||
rely on one another in the course of everyday
|
||
life, deviants find it easier to cope with
|
||
practical problems when they have the help of
|
||
deviant associates (1982,pp.27-28).
|
||
|
||
|
||
Hackers, phreakers, and pirates face practical
|
||
|
||
problems. For example, in order to pursue their
|
||
|
||
activities they require equipment9 and knowledge. The
|
||
____________________
|
||
|
||
9 The basic equipment consists of a modem, phone
|
||
line, and a computer -- all items that are available
|
||
through legitimate channels. It is the way the
|
||
equipment is used, and the associated knowledge that is
|
||
required, that distinguishes hackers from other
|
||
computer users.
|
||
|
||
|
||
|
||
|
||
|
||
38
|
||
|
||
problem of acquiring the latter must be solved and,
|
||
|
||
additionally, they must devise ways to prevent
|
||
|
||
discovery , apprehension and sanctioning by social
|
||
|
||
control agents.10
|
||
|
||
One method of solving these problems is to turn to
|
||
|
||
other CU members for help and support. Various means
|
||
|
||
of communication have been established that allow
|
||
|
||
individuals to interact regardless of their location.
|
||
|
||
As might be expected, the communication channels used
|
||
|
||
by the CU reflect their interest and ability in high-
|
||
|
||
technology, but the technical aspects of these methods
|
||
|
||
should not overshadow the mutual association that they
|
||
|
||
support. This section examines the structure of
|
||
|
||
mutual association within the computer underground.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
____________________
|
||
|
||
|
||
|
||
10 Telephone company security personnel, local law
|
||
enforcement, FBI, and Secret Service agents have all
|
||
been involved in apprehending hackers.
|
||
|
||
|
||
|
||
|
||
|
||
39
|
||
|
||
|
||
|
||
|
||
|
||
The Structure of the Computer Underground
|
||
|
||
Both computer underground communities, the
|
||
|
||
p/hackers and the pirates, depend on communications
|
||
|
||
technology to provide meeting places for social and
|
||
|
||
"occupational" exchanges. However, phreakers, hackers,
|
||
|
||
and pirates are widely dispersed across the country
|
||
|
||
and, in many cases, the globe. In order for the
|
||
|
||
communication to be organized and available to
|
||
|
||
participants in many time zones and "working" under
|
||
|
||
different schedules, centralized points of information
|
||
|
||
distribution are required. Several existing
|
||
|
||
technologies --computer bulletin boards, voice mail
|
||
|
||
boxes, "chat" lines, and telephone bridges/loops --
|
||
|
||
have been adopted by the CU for use as communication
|
||
|
||
points. Each of these technologies will be addressed in
|
||
|
||
turn, giving cultural insight into CU activities, and
|
||
|
||
illustrating mutual association among CU participants.
|
||
|
||
|
||
|
||
Bulletin Board Systems
|
||
|
||
Communication in the computer underground takes
|
||
|
||
place largely at night, and primarily through Bulletin
|
||
|
||
Board Systems (BBS). By calling these systems and
|
||
|
||
"logging on" with an account and password individuals
|
||
|
||
can leave messages to each other, download files and
|
||
|
||
|
||
|
||
|
||
40
|
||
|
||
programs, and, depending on the number of phone lines
|
||
|
||
into the system, type messages to other users that may
|
||
|
||
be logged on at the same time.
|
||
|
||
Computer Bulletin Board Systems, or "boards," are
|
||
|
||
quite common in this computerized age. Nearly every
|
||
|
||
medium-sized city or town has at least one. But not all
|
||
|
||
BBS are part of the computer underground culture. In
|
||
|
||
fact, many systems prohibit users from discussing CU
|
||
|
||
related activity. However, since all bulletin boards
|
||
|
||
systems essentially function alike it is only the
|
||
|
||
content, users, and CU culture that distinguish an
|
||
|
||
"underground" from a "legitimate" bulletin board.
|
||
|
||
Computer Underground BBS are generally owned and
|
||
|
||
operated by a single person (known as the "system
|
||
|
||
operator" or "sysop"). Typically setup in a spare
|
||
|
||
bedroom, the costs of running the system are paid by
|
||
|
||
the sysop, though some boards solicit donations from
|
||
|
||
users. The sysop maintains the board and allocates
|
||
|
||
accounts to people who call the system.
|
||
|
||
It is difficult to assess the number of
|
||
|
||
underground bulletin boards in operation at any one
|
||
|
||
time. BBS in general are transitory in nature, and CU
|
||
|
||
boards are no exception to this. Since they are
|
||
|
||
operated by private individuals, they are often set up
|
||
|
||
and closed down at the whim of the operator. A week
|
||
|
||
|
||
|
||
|
||
41
|
||
|
||
that sees two new boards come online may also see
|
||
|
||
another close down. A "lifetime" of anywhere from 1
|
||
|
||
month to 1-1/2 years is common for pirate and
|
||
|
||
phreak/hack boards.11 One BBS, claimed to be the
|
||
|
||
"busiest phreak/hack board in the country" at the
|
||
|
||
time,12 operated for less than one year and was
|
||
|
||
suddenly closed when the operator was laid off work.
|
||
|
||
Further compounding the difficulty of estimating
|
||
|
||
the number of CU boards is their "underground" status.
|
||
|
||
CU systems do not typically publicize their existence.
|
||
|
||
However, once access to one has been achieved, it is
|
||
|
||
easy to learn of other systems by asking users for the
|
||
|
||
phone numbers. Additionally, most BBS maintain lists
|
||
|
||
of other boards that users can download or read. So it
|
||
|
||
is possible, despite the difficulties, to get a feel
|
||
|
||
for the number of CU boards in operation. Pirate
|
||
|
||
boards are the most common of "underground" BBS. While
|
||
|
||
there is no national "directory" of pirate boards,
|
||
|
||
there are several listings of numbers for specific
|
||
____________________
|
||
|
||
11 While some non-CU BBS' have been operating
|
||
since 1981, the longest operating phreak/hack board has
|
||
only been in operation since 1984.
|
||
|
||
|
||
12 At it's peak this p/h board was receiving 1000
|
||
calls a month and supported a community of 167 users
|
||
(TP BBS, message log, 1989).
|
||
|
||
|
||
|
||
|
||
|
||
42
|
||
|
||
computer brands.13 One list of Apple pirate boards has
|
||
|
||
700 entries. Another, for IBM boards, lists just over
|
||
|
||
500. While there is no way of determining if these
|
||
|
||
lists are comprehensive, they provide a minimum
|
||
|
||
estimate. Pirate boards for systems other than IBM or
|
||
|
||
Apple seem to exhibit similar numbers. David Small, a
|
||
|
||
software developer that has taken an aggressive stance
|
||
|
||
in closing down pirate boards, estimates that there are
|
||
|
||
two thousand in existence at any one time (1988).
|
||
|
||
Based on the boards discovered in the course of this
|
||
|
||
research, and working from an assumption that each of
|
||
|
||
the four major brands of microcomputers have equal
|
||
|
||
numbers of pirate boards, two thousand is a reasonable
|
||
|
||
estimate.
|
||
|
||
The phreak/hack BBS community is not divided by
|
||
|
||
differing brands of micro-computers. The applicability
|
||
|
||
of phreak/hack information to a wide range of systems
|
||
|
||
does not require the specialization that pirate boards
|
||
|
||
exhibit. This makes it easier to estimate the number
|
||
|
||
of systems in this category.
|
||
|
||
John Maxfield, a computer security consultant, has
|
||
|
||
asserted that there are "thousands" of phreak/hack
|
||
____________________
|
||
|
||
13 Pirate boards are normally "system specific" in
|
||
that they only support one brand or model of
|
||
microcomputer.
|
||
|
||
|
||
|
||
|
||
|
||
43
|
||
|
||
boards in existence (WGN-Radio, November 1988). The
|
||
|
||
data, however, do not confirm this. A list of
|
||
|
||
phreak/hack boards compiled by asking active p/hackers
|
||
|
||
and downloading BBS lists from known phreak/hack
|
||
|
||
boards, indicates that there are probably no more than
|
||
|
||
one hundred. Experienced phreak/hackers say that the
|
||
|
||
quality of these boards varies greatly, and of those
|
||
|
||
that are in operation today only a few (less than ten)
|
||
|
||
attract the active and knowledgeable user.
|
||
|
||
Right after "War Games" came out there must
|
||
have been hundreds of hacker bulletin boards
|
||
spring up. But 99% of those were lame. Just a
|
||
bunch of dumb kids that saw the movie and
|
||
spent all there %sic% time asking "anyone got
|
||
any k00l numberz?" instead of actually
|
||
hacking on anything. But for a while there
|
||
was %sic% maybe ten systems worth calling . .
|
||
. where you could actually learn something
|
||
and talk to people who knew what was going
|
||
Nowadays %sic% there are maybe three that I
|
||
consider good . . . and about four or five
|
||
others that are okay. The problem is that
|
||
anybody can set up a board with a k-rad name
|
||
and call it a hacker board and the media/feds
|
||
will consider it one if it gets busted. But
|
||
it never really was worth a shit from the
|
||
beginning.(TP2, field notes, 1989)
|
||
|
||
|
||
Towards a BBS Culture. Defining and identifying
|
||
|
||
CU boards can be problematic. The lack of an ideal
|
||
|
||
type undoubtedly contributes to the varying estimates
|
||
|
||
of the number of CU bulletin board systems. While
|
||
|
||
developing such a typology is not the intent of this
|
||
|
||
work, it is appropriate to examine the activities and
|
||
|
||
|
||
|
||
|
||
44
|
||
|
||
characteristics exhibited by BBS supporting the pirate
|
||
|
||
and phreak/hack communities. While much of the culture
|
||
|
||
of pirate and phreak/hack worlds overlap, there are
|
||
|
||
some differences in terms of how the BBS medium is used
|
||
|
||
to serve their interests. We begin with a short
|
||
|
||
discussion of the differences between the two
|
||
|
||
communities, then discuss cultural characteristics
|
||
|
||
common to all CU BBS systems.
|
||
|
||
All BBS feature a "files area" where programs and
|
||
|
||
text files are available for downloading by users.
|
||
|
||
Initially these programs/files are supplied by the
|
||
|
||
system operator, but as the board grows they are
|
||
|
||
contributed (called "uploading") by callers. The
|
||
|
||
content and size of the files area differs according to
|
||
|
||
whether the board supports the pirate or phreak/hack
|
||
|
||
community.
|
||
|
||
The files area on a pirate board consists
|
||
|
||
primarily of programs and program documentation.
|
||
|
||
Normally these programs are for only one brand of
|
||
|
||
micro-computer (usually the same as the system is being
|
||
|
||
run on). Text files on general or non-computer topics
|
||
|
||
are uncommon. A "files area" menu from a pirate BBS
|
||
|
||
illustrates the emphasis on software:
|
||
|
||
%1% Documentation %2% Telecommunications
|
||
%3% Misc Applications %4% Word Processing
|
||
%5% Graphics %6% Utilities
|
||
%7% Games 1 %8% Games 2
|
||
|
||
|
||
|
||
|
||
45
|
||
|
||
%9% XXX Rated %10% Elite_1
|
||
%11% Elite_2 %12% Super_Elite
|
||
(IN BBS, message log, 1988)
|
||
|
||
The "files area" on a phreak/hack BBS is
|
||
|
||
noticeably smaller than it is on pirate systems. It
|
||
|
||
consists primarily of instructional files (known as "g-
|
||
|
||
files" for "general files") and copies of phreak/hack
|
||
|
||
newsletters and journals. Pirated commercial software
|
||
|
||
is very rare; any programs that are available are
|
||
|
||
usually non-copyrighted specialized programs used to
|
||
|
||
automate the more mundane aspects of phreaking or
|
||
|
||
hacking. It is not uncommon to find them in forms
|
||
|
||
usable by different brands of computers. A "files
|
||
|
||
area" list from a phreak/hack BBS is listed here
|
||
|
||
(edited for size):
|
||
|
||
Misc Stuff
|
||
-------------
|
||
BRR2 .TXT: Bell Research Report Volume II
|
||
BRR1 .TXT: Bell Research Report Volume I
|
||
CONFIDE .ARC: Confide v1.0 DES
|
||
EnCryption/DeCryption
|
||
CNA .TXT: A bunch of CNA numbers
|
||
CLIPS .ARC: newsclippings/articles on hackers
|
||
and busts
|
||
ESS1 .TXT: FILE DESCRIBING THE ESS1 CHIP
|
||
TELEPHON.TXT: NY Times Article on hackers/phreaks
|
||
HP-3000 .TXT: This tells a little info about hp
|
||
VIRUS .TXT: Digest of PC anti-viral programs.
|
||
|
||
Hack/Phreak Programs
|
||
-----------------------
|
||
THIEF .ARC: Code Thief for IBM!
|
||
PC-LOK11.ARC: IBM Hard Disk Lock Utility- fairly
|
||
good.
|
||
PHONELIS.COM: Do a PHONE DIR command on VAX from
|
||
DCL.
|
||
XMO .FOR: VAX Xmodem Package in FORTRAN
|
||
|
||
|
||
|
||
|
||
46
|
||
|
||
PASSWORD.ARC: IBM Password on bootup. Not too
|
||
bad.
|
||
|
||
Archived Gfiles
|
||
----------------------
|
||
PHRACK15.ARC: Phrack #15
|
||
PHRACK10.ARC: Phrack #10
|
||
PHRACK20.ARC: Phrack #20
|
||
ATI1_6.ARC : ATI issues one thru six
|
||
PHRACK5.ARC : Phrack #5
|
||
PHRACK25.ARC: Phrack #25
|
||
PHUN1.ARC : P/Hun first issue
|
||
TCSJ.ARC : Telecom Security Journal
|
||
ATI31.ARC : Activist Times Inc number 31
|
||
LODTECH3.ARC: LoD Tech Journal three
|
||
(TPP BBS, message log, 1988)
|
||
|
||
The difference in files area size is consistent
|
||
|
||
with the activities of pirates and phreak/hackers. The
|
||
|
||
main commodity of exchange between pirates is, as
|
||
|
||
discussed earlier, copyrighted software thus accounting
|
||
|
||
for the heavy use of that area of the board that
|
||
|
||
permits exchange of programs. The phreak/hackers, on
|
||
|
||
the other hand, primarily exchange information about
|
||
|
||
outside systems and techniques. Their interests are
|
||
|
||
better served by the "message bases" of BBS.
|
||
|
||
The "message bases" (areas where callers leave
|
||
|
||
messages to other users) are heavily used on
|
||
|
||
phreak/hack systems. The messages are not specific to
|
||
|
||
one brand of micro-computer due to the fact that not
|
||
|
||
all users own the same equipment. Rather than focus on
|
||
|
||
the equipment owned by the phreak/hacker, the messages
|
||
|
||
deal with their "targets." Everything from
|
||
|
||
phreak/hacking techniques to CU gossip is discussed. On
|
||
|
||
|
||
|
||
|
||
47
|
||
|
||
some boards all the messages, regardless of topic, are
|
||
|
||
strung together in one area. But on others there are
|
||
|
||
separate areas dealing with specific networks and
|
||
|
||
mainframe computers:
|
||
|
||
Message Boards available:
|
||
|
||
1 : General
|
||
2 : Telecommunications
|
||
3 : Electronics
|
||
4 : Packet Switched Nets
|
||
5 : VAX/DEC
|
||
6 : Unix
|
||
7 : Primos
|
||
8 : HP-x000
|
||
9 : Engineering
|
||
10 : Programming & Theory
|
||
11 : Phrack Inc.
|
||
12 : Sociological Inquiries
|
||
13 : Security Personnel & Discussion
|
||
14 : Upper Deck
|
||
15 : Instructors
|
||
(TPP BBS, message log, 1988)
|
||
|
||
|
||
The pirate community, on the other hand, makes
|
||
|
||
little use of the "message bases." Most users prefer to
|
||
|
||
spend their time (which may be limited by the system
|
||
|
||
operator on a per day or per call basis) uploading
|
||
|
||
and/or downloading files rather than leaving messages
|
||
|
||
for others. Those messages that do exist are usually
|
||
|
||
specific to the pirating enterprise such as help with
|
||
|
||
programs on the board, requests for specific programs
|
||
|
||
("want lists"), and notices about other pirate bulletin
|
||
|
||
boards that users may want to call. Occasional
|
||
|
||
discussion of phreaking may occur, but the emphasis is
|
||
|
||
|
||
|
||
|
||
48
|
||
|
||
on techniques used to make free calls, not technical
|
||
|
||
network discussions as often occurs on phreak/hack
|
||
|
||
systems. A list of message areas from a large pirate
|
||
|
||
BBS illustrates the emphasis on the pirating
|
||
|
||
enterprise. A message area for general discussions has
|
||
|
||
been created, but those areas devoted to pirating
|
||
|
||
display more use:
|
||
|
||
Area %1% General Discussion 15 messages
|
||
Area %2% Pirating Only!! 75 messages
|
||
Area %3% Warez Wants 31 messages
|
||
Area %4% **private messages** 10 messages
|
||
(TL BBS, message log, 1988)
|
||
|
||
|
||
In addition to the differences between files and
|
||
|
||
message use on pirate and phreak/hack boards, they
|
||
|
||
differ in degree of community cohesiveness. Every BBS
|
||
|
||
has a group of "users" --the people who have accounts
|
||
|
||
on the system. The group of users that call a specific
|
||
|
||
BBS can be considered to be a "community" of loosely
|
||
|
||
associated individuals by virtue of their "membership"
|
||
|
||
in the BBS.
|
||
|
||
Additionally, the system itself, serving either
|
||
|
||
pirates or phreak/hackers, exists within a loose
|
||
|
||
network of other bulletin boards that serve these same
|
||
|
||
interests. It is within this larger community where
|
||
|
||
pirate and phreak/hack boards seem to differ.
|
||
|
||
Due to the brand-specific nature of pirate boards,
|
||
|
||
there is not a strong network between pirate BBS that
|
||
|
||
|
||
|
||
|
||
49
|
||
|
||
operate on other systems. This is understandable as a
|
||
|
||
pirate that owned an Apple computer would have little
|
||
|
||
use for the programs found on an IBM board. However,
|
||
|
||
this creates separate communities of active pirates,
|
||
|
||
each loosely associated with other users of their
|
||
|
||
computer type, but with little or no contact with
|
||
|
||
pirate communities on other systems.
|
||
|
||
There is, however, a degree of cohesiveness among
|
||
|
||
pirate boards that support the same micro-computers.
|
||
|
||
While the users may be different on systems, the data
|
||
|
||
shows that some pirate boards are "networked" with each
|
||
|
||
other via special software that allows messages and
|
||
|
||
files to be automatically shared between different
|
||
|
||
boards. Thus a message posted on a west coast pirate
|
||
|
||
board will be automatically copied on an east coast BBS
|
||
|
||
later that night. In a like manner, software programs
|
||
|
||
can be sent between "networked" boards. The extent of
|
||
|
||
this network is unknown.
|
||
|
||
The pirate BBS community also exhibits
|
||
|
||
cohesiveness in the form of "co-sysops." As discussed
|
||
|
||
earlier, sysops are the system operators and usually
|
||
|
||
owners of BBS. On some pirate boards, "co-sysop"
|
||
|
||
distinction is given to an operator of another board,
|
||
|
||
often located in another state. This forms a loose
|
||
|
||
network of "sister boards" where the sysop of one has
|
||
|
||
|
||
|
||
|
||
50
|
||
|
||
co-sysop privileges on the other. However, this
|
||
|
||
cooperative effort appears to be limited mainly to the
|
||
|
||
system operators as comparing user lists from sister
|
||
|
||
boards shows little overlap between the regular
|
||
|
||
callers. How co-sysop positions are utilized is
|
||
|
||
unknown, and it is suspected that they are largely
|
||
|
||
honorary. But nonetheless it is indicative of mutual
|
||
|
||
association between a small number of boards.
|
||
|
||
The phreak/hack board community does not exhibit
|
||
|
||
the same brand-specific division as the pirate
|
||
|
||
community. Unlike the divided community of pirates,
|
||
|
||
phreak/hackers appear to maintain contacts throughout
|
||
|
||
the country. Obtaining and comparing user lists from
|
||
|
||
several phreak/hack BBS reveals largely the same group
|
||
|
||
of people using several different boards across the
|
||
|
||
country.14 While phreak/hack boards have yet to adopt
|
||
|
||
the "networking" software used by pirate boards, an
|
||
|
||
active group of phreak/hackers is known to use the
|
||
|
||
sophisticated university mainframe computer network,
|
||
|
||
called Bitnet, to exchange phreak/hack newsletters and
|
||
|
||
gossip.
|
||
|
||
Despite the operational differences between pirate
|
||
____________________
|
||
|
||
14 In fact, users lists from phreak/hack BBSs
|
||
located in Europe and Australia show that many U.S.
|
||
p/hackers utilize these systems as well.
|
||
|
||
|
||
|
||
|
||
|
||
51
|
||
|
||
and phreak/hack boards, their cultures are remarkably
|
||
|
||
similar. Any discussion of the computer underground
|
||
|
||
must include both communities. Additionally, a
|
||
|
||
formulation of the culture of CU BBS must address the
|
||
|
||
means in which access to the board, and thus deviant
|
||
|
||
associates, is obtained.
|
||
|
||
For a caller to successfully enter the CU BBS
|
||
|
||
community, he must display an awareness of CU culture
|
||
|
||
and technical skill in the CU enterprise. If the caller
|
||
|
||
fails to exhibit cultural knowledge, then access to the
|
||
|
||
board is unlikely to be granted. The ways in which
|
||
|
||
this cultural knowledge is obtained and displayed
|
||
|
||
illustrates the social nature of the CU and further
|
||
|
||
displays some of the subcultural norms of behavior.
|
||
|
||
On most "licit" (non-underground) boards,
|
||
|
||
obtaining permission to use the system is accomplished
|
||
|
||
by logging on and providing a name and home phone
|
||
|
||
number to the system operator (sysop). Sysop's
|
||
|
||
normally do not check the validity of the information,
|
||
|
||
and once a caller has provided it he or she is granted
|
||
|
||
full access to the system. There is normally one level
|
||
|
||
of access for all users, with only the sysop having
|
||
|
||
more "powerful" access.
|
||
|
||
Obtaining access to underground bulletin boards is
|
||
|
||
more complicated and requires more steps to complete.
|
||
|
||
|
||
|
||
|
||
52
|
||
|
||
In an attempt to prevent law enforcement agents
|
||
|
||
("feds") from obtaining accounts on systems where
|
||
|
||
pirates or p/hackers are vulnerable, if not to actual
|
||
|
||
arrest, then at least to exposing their latest act-
|
||
|
||
ivities and methods, sysop's of illicit boards attempt
|
||
|
||
to limit access to the system.
|
||
|
||
One method of doing this is to restrict
|
||
|
||
publicizing the existence of the board. Computer
|
||
|
||
underground BBS are not normally included in BBS
|
||
|
||
listings found in computer books and magazines, and
|
||
|
||
there is a norm, particularly strong on p/hack systems,
|
||
|
||
that the boards are not to be mentioned on non-CU
|
||
|
||
systems. There are, however, some "entry-level" CU BBS
|
||
|
||
that are fairly well known. These systems are known as
|
||
|
||
"anarchist" boards.
|
||
|
||
"Anarchist" boards, while exhibiting many of the
|
||
|
||
same characteristics as pirate and phreak/hack boards,
|
||
|
||
are really a cross between the two and serve primarily
|
||
|
||
as social outlets for both pirates and phreak/hackers.
|
||
|
||
The message areas on "anarchist" boards are quite
|
||
|
||
active, "chatty" messages are not discouraged. Indeed
|
||
|
||
there are normally several different message areas
|
||
|
||
devoted to a wide range of topics including everything
|
||
|
||
from "skipping school" to "punk rock." The files area
|
||
|
||
contains both warez (but normally only the newest
|
||
|
||
|
||
|
||
|
||
53
|
||
|
||
games, and specific to the computer system that the
|
||
|
||
board runs on) and phreak/hack text files. Neither
|
||
|
||
collection is as extensive as it would be on pirate-
|
||
|
||
only or p/hack-only systems.
|
||
|
||
The data suggest that one function of "anarchist"
|
||
|
||
boards is to introduce newcomers to the culture of the
|
||
|
||
computer underground. By acting as "feeder boards,"
|
||
|
||
they can provide preliminary socialization and
|
||
|
||
instruction for CU behavior and techniques.
|
||
|
||
Additionally, "anarchist" boards frequently provide
|
||
|
||
areas where phone numbers to pirate and p/hack systems
|
||
|
||
can be traded, thus providing systems where more in-
|
||
|
||
depth information, and other contacts, can be found. A
|
||
|
||
phreak/hacker describes how an "anarchist" board was
|
||
|
||
instrumental in introducing him to the computer
|
||
|
||
underground:
|
||
|
||
I've been phreaking and hacking for about
|
||
four years now. I discovered phreaking on my
|
||
own at this place I used to work. We had
|
||
this small LD %long distance% provider that
|
||
used codez so I started hacking them out and
|
||
calling places myself . . . but I didn't know
|
||
no other phreaks at that time. Then I
|
||
started using the codez to call boards from
|
||
home on my computer. Somebody gave me the
|
||
number to Jack Black's Whore House %an
|
||
"anarchy board"% and I started learning about
|
||
hacking and shit from the people and philes
|
||
they had there. Then one day this guy, King
|
||
Hammer, sent me some e-mail %a private
|
||
message% and told me to call his system.
|
||
That's where I really learned my way around
|
||
the nets and shit. You could ask questions
|
||
and people would help you out and stuff. If I
|
||
|
||
|
||
|
||
|
||
54
|
||
|
||
hadn't found out some of the tricks that I
|
||
did I probably would have got busted by now.
|
||
(TP2, field notes, 1989)
|
||
|
||
Once an individual has obtained the telephone
|
||
|
||
number to a CU BBS, through whatever channels, callers
|
||
|
||
follow essentially the same procedure as they do on
|
||
|
||
licit systems . . . that of calling and logging on.
|
||
|
||
However, since "underground" boards are not truly
|
||
|
||
underground (that is, totally secret) first-time
|
||
|
||
callers are not given access to the board itself. When
|
||
|
||
a user is unable to provide an already valid
|
||
|
||
username/password, the system will automatically begin
|
||
|
||
its registration procedure. First, the caller is
|
||
|
||
asked to enter a "username" (the name used by the
|
||
|
||
system to distinguish between callers) and "phone
|
||
|
||
number." These first system requests, normally seen
|
||
|
||
only as "Enter Your Name and Phone Number," serve as
|
||
|
||
partial screens to keep out non-underground callers
|
||
|
||
that may have happened across the board. The way that
|
||
|
||
a user responds to these questions indicates if they
|
||
|
||
have cultural knowledge of the CU. The norm is to
|
||
|
||
enter a pseudonym and a fake phone number.15 If a
|
||
____________________
|
||
|
||
15 A functional reason for this norm is that
|
||
usernames and telephone numbers are stored on the
|
||
computer as part of the BBS system files. Should the
|
||
BBS ever be seized in legal proceedings, this list of
|
||
names and numbers (and on some systems addresses . . .
|
||
which are also normally false) could be used to
|
||
identify the users of the system.
|
||
|
||
|
||
|
||
|
||
|
||
55
|
||
|
||
caller enters his or her real name (or at least a name
|
||
|
||
that does not appear to be a pseudonym) the system
|
||
|
||
operator will be put on guard that the caller may not
|
||
|
||
be aware of the type of board that he has called, for
|
||
|
||
the pseudonym is the most visible of CU cultural
|
||
|
||
traits.
|
||
|
||
All members of the underground adopt "handles" to
|
||
|
||
protect their identity. The pseudonyms become second
|
||
|
||
identities and are used to log onto bulletin boards,
|
||
|
||
and as "signatures" on messages and instructional text
|
||
|
||
files.16 They are not unlike those adopted by
|
||
|
||
citizens-band radio users, and reflect both the humor
|
||
|
||
and technical orientation of computer underground
|
||
|
||
participants. A review of handles used by phreakers,
|
||
|
||
hackers, and pirates finds that they fall into three
|
||
|
||
broad categories: figures from literature, films, and
|
||
|
||
entertainment (often science fiction); names that play
|
||
|
||
upon computers and related technologies; and
|
||
|
||
nouns/descriptive names. (See Appendix A for fictional
|
||
|
||
examples of each.)
|
||
|
||
After providing a user name and entering a
|
||
|
||
____________________
|
||
|
||
|
||
|
||
16 The data suggest that, on the whole,
|
||
individuals retain their handles over time.
|
||
|
||
|
||
|
||
|
||
|
||
56
|
||
|
||
password to be used for future calls, the caller is
|
||
|
||
asked several more questions designed to screen users
|
||
|
||
and determine initial access privileges. Unlike licit
|
||
|
||
boards, underground BBS may have several different
|
||
|
||
levels of access with only the most trusted users being
|
||
|
||
able to read messages and get files in "elite" or "high
|
||
|
||
access" areas that are unknown and unavailable to other
|
||
|
||
callers. In many cases, pirate boards are able to
|
||
|
||
operate "above ground" and appear to be open-public
|
||
|
||
access systems unless callers have the proper
|
||
|
||
privileges to access the areas where the "good stuff"
|
||
|
||
is located. The answers given to access questionnaires
|
||
|
||
determine whether a caller will receive access to some,
|
||
|
||
all, or none of the higher levels.
|
||
|
||
These questionnaires frequently ask for "personal
|
||
|
||
references" and a list of other boards the caller has
|
||
|
||
"high access" on. The question is vague, and random
|
||
|
||
callers are unlikely to answer it correctly. However,
|
||
|
||
if the caller lists pseudonyms of other CU members that
|
||
|
||
are known and trustworthy to the sysop, as well as some
|
||
|
||
other boards that are known to have "good users" and
|
||
|
||
"good security" access will usually be granted.17 If
|
||
|
||
all the answers are relevant and indicative of CU
|
||
____________________
|
||
|
||
17 The data suggest that personal references are
|
||
only checked if something seems unusual or suspicious.
|
||
|
||
|
||
|
||
|
||
|
||
57
|
||
|
||
knowledge, then initial access is normally granted.
|
||
|
||
Other methods of controlling access include
|
||
|
||
presenting a "quiz" to determine if the technical
|
||
|
||
knowledge of the user is up to par with the expertise
|
||
|
||
expected on the boards.18 Some systems, instead of a
|
||
|
||
quiz, ask the user to write a short statement (100
|
||
|
||
words or less) about why they want access, where they
|
||
|
||
got the phone number to the system, and what they can
|
||
|
||
provide to other users. Some pirate boards come right
|
||
|
||
out and ask the user to supply a list of the good
|
||
|
||
"warez" that they can upload and what they are looking
|
||
|
||
to download. If the caller fails to list recent
|
||
|
||
copyrighted programs then it is evident that they are
|
||
|
||
unaware of the nature of the BBS:
|
||
|
||
I had this one dude call up and he told me in
|
||
his message that he was looking for some
|
||
"good games." So instead of giving him
|
||
access I just left him some e-mail %a private
|
||
message%. I asked what kind of games he was
|
||
looking for. Next time he called he wrote
|
||
back and said "a public domain Asteroids
|
||
game." I couldn't believe it. Not only is
|
||
Asteroids so damn old it's lame, but this guy
|
||
is looking for pd %public domain% shit. No
|
||
way was he going to get access. He didn't
|
||
even know what this board is. I left him a
|
||
message telling him that I didn't have one.
|
||
He never called back after that (CH, sysop of
|
||
a pirate BBS, field notes, 1988).
|
||
|
||
____________________
|
||
|
||
18 One such quiz, from a p/h board, can be found
|
||
in Appendix B.
|
||
|
||
|
||
|
||
|
||
|
||
58
|
||
|
||
Ironically, the pseudo-elaborate security methods
|
||
|
||
of underground boards, while they may be effective in
|
||
|
||
keeping off random non-CU callers, are not effective in
|
||
|
||
screening out "feds." Data and media accounts show that
|
||
|
||
boards are regularly infiltrated by telephone security
|
||
|
||
personnel and software companies. Also, the adoption of
|
||
|
||
handles to protect identities is defeated by the
|
||
|
||
consistent use of the same handle over time. But in
|
||
|
||
order to obtain and maintain status and prestige in the
|
||
|
||
CU one must keep the same pseudonym in order to
|
||
|
||
(literally) "make a name for oneself." The fact that CU
|
||
|
||
communication is not face-to-face requires a consistent
|
||
|
||
means of identifying oneself to others. The handle
|
||
|
||
fulfills this purpose but at the same time becomes as
|
||
|
||
attached to a single individual as a real name would.
|
||
|
||
The access rituals of the computer underground, which
|
||
|
||
are contingent on being a "known" pirate or
|
||
|
||
phreak/hacker, make changing handles unproductive.
|
||
|
||
The life blood and center of the computer under-
|
||
|
||
ground is the bulletin board network. Acting as both
|
||
|
||
the main trade center of performance related tools and
|
||
|
||
innovations and as a means of socialization, the
|
||
|
||
underground could not exist without the BBS network.
|
||
|
||
They serve to "recruit" and educate newcomers and
|
||
|
||
provide a way to traffic in information and software.
|
||
|
||
|
||
|
||
|
||
59
|
||
|
||
The pirating enterprise in particular is very dependent
|
||
|
||
upon the BBS as they are the very means by which
|
||
|
||
"warez" are traded. For the phreak/hacker community,
|
||
|
||
BBS provide a means of trading the resources of system
|
||
|
||
numbers and passwords, as well as instructional texts
|
||
|
||
on techniques. The access process serves as evidence
|
||
|
||
of mutual association amongst phreakers, hackers, and
|
||
|
||
pirates as cultural knowledge is needed as well as
|
||
|
||
personal references (evidence of acceptance and access
|
||
|
||
to others).
|
||
|
||
The CU bulletin board systems are unique in that
|
||
|
||
they provide a way to exchange information with a large
|
||
|
||
number of others. The other methods of CU commun-
|
||
|
||
ication are based on conversations rather than written
|
||
|
||
texts and thus are much less permanent. These methods,
|
||
|
||
discussed next, are telephone bridges/loops, voice mail
|
||
|
||
boxes, and computer "chat" systems.
|
||
|
||
|
||
|
||
Bridges, Loops, and Voice Mail Boxes
|
||
|
||
Of the additional means of communication used by
|
||
|
||
the CU, telephone "bridges" and "loops" are most
|
||
|
||
common. Unlike BBS, which require data links provided
|
||
|
||
by a computer and modem, bridges and loops are "old
|
||
|
||
fashioned" voice connections. Since they can not
|
||
|
||
accommodate the transfer of programs or files they are
|
||
|
||
used primarily by phreakers and hackers, and most often
|
||
|
||
|
||
|
||
|
||
60
|
||
|
||
as a social/recreational outlet.
|
||
|
||
A "bridge" is a technical name for what is
|
||
|
||
commonly known as a "chat line" or "conference system."
|
||
|
||
They are familiar to the public as the pay-
|
||
|
||
per-minute group conversation systems advertised on
|
||
|
||
late night television. Many bridge systems are owned
|
||
|
||
by large corporations who maintain them for business
|
||
|
||
use during the day. While the numbers to these systems
|
||
|
||
is not public knowledge, many of them have been
|
||
|
||
discovered by phreaks who then utilize the systems
|
||
|
||
during the night.
|
||
|
||
In addition to these pre-existing conference
|
||
|
||
systems, phreakers have become skilled at arranging
|
||
|
||
for a temporary, private bridge to be created via
|
||
|
||
AT&T's conference calling facilities. This allows for
|
||
|
||
conversations to be held among a self-selected group of
|
||
|
||
phreak/hackers:19
|
||
|
||
Bridges can be %sic% extremely useful means
|
||
of distributing information as long as the
|
||
%phone% number is not known, and you don't
|
||
have a bunch of children online testing out
|
||
____________________
|
||
|
||
19 The data indicates that these private
|
||
conference calls aren't "scheduled" in any real sense.
|
||
One p/hacker will initiate the conference and call
|
||
others at home to add them to the conference. As more
|
||
people join they suggest others to add. The initiator
|
||
can temporarily jump out of the conference, call the
|
||
new person and solicit their attendance. If they don't
|
||
want to join or aren't home, the initiator simply
|
||
returns to the conference without adding them in.
|
||
|
||
|
||
|
||
|
||
|
||
61
|
||
|
||
their DTMF.20 The last great discussion I
|
||
participated with over a bridge occurred
|
||
about 2 months ago on an AT&T Quorum where
|
||
all we did was engineer 3/way %calls% and
|
||
restrict ourselves to purely technical infor-
|
||
mation. We could have convinced the Quorum
|
||
operators that we were AT&T technicians had
|
||
the need occurred. Don't let the kids ruin
|
||
all the fun and convenience of bridges.
|
||
Lameness is one thing, practicality is
|
||
another (DC, message log, 1988).
|
||
|
||
|
||
In addition to setting up "private" bridges,
|
||
|
||
p/hackers can utilize "loop lines" in a further attempt
|
||
|
||
to limit the number of eavesdroppers on their
|
||
|
||
conversations. Unlike bridges, which connect a
|
||
|
||
virtually unlimited number of callers at once, "loops"
|
||
|
||
are limited to just two people at a time.
|
||
|
||
"Loop lines" are actually telephone company test
|
||
|
||
lines installed for internal use.21 A loop consists of
|
||
|
||
two separate telephone numbers that connect only to
|
||
|
||
each other. Each end has a separate phone number, and
|
||
|
||
when each person calls one end, they are connected to
|
||
|
||
each other automatically. This allows for individuals
|
||
____________________
|
||
|
||
20 "Dual Tone Multi Frequency" or in laymen terms,
|
||
the touch tone sounds used to dial phone numbers.
|
||
|
||
|
||
21 These test lines are discovered by phreaks and
|
||
hackers by programming their home computer to dial
|
||
numbers at random and "listen" for the distinctive tone
|
||
that an answering loop makes, by asking sympathetic
|
||
telephone company employees, or through information
|
||
contained on internal company computers.
|
||
|
||
|
||
|
||
|
||
|
||
62
|
||
|
||
to hold private conversations without divulging their
|
||
|
||
location or identity by exchanging telephone numbers.
|
||
|
||
Finally, voice mail boxes ("VMB") are another
|
||
|
||
means of communicating with individual actors. There
|
||
|
||
are several commercial voice mail box systems located
|
||
|
||
throughout the country. They function similar to a
|
||
|
||
telephone answering machine in that callers can call
|
||
|
||
in, listen to a recorded message, and then leave a
|
||
|
||
message for the box owner. Many of these systems are
|
||
|
||
accessible via toll-free telephone numbers. The
|
||
|
||
security of some VMB systems is notoriously poor. Many
|
||
|
||
phreaks have expertise in "creating" boxes for
|
||
|
||
themselves that are unknown (until discovered) by the
|
||
|
||
owner of the system. However, these boxes are usually
|
||
|
||
short lived since discovery by the system operator, and
|
||
|
||
closure of the box, is only a matter of time. But as
|
||
|
||
long as the box is functioning, it can serve as a means
|
||
|
||
of communicating with others. VMB numbers are
|
||
|
||
frequently posted on bulletin boards with invitations
|
||
|
||
to "call if you have any good stuff." They are often
|
||
|
||
used by pirates to exchange messages about new releases
|
||
|
||
of software, and by phreak/hackers to trade account and
|
||
|
||
access numbers. Additionally, some of the underground
|
||
|
||
newsletters and journals obtain boxes so users can call
|
||
|
||
in news of arrests and other gossip.
|
||
|
||
|
||
|
||
|
||
63
|
||
|
||
Like bulletin boards, VMBs are systems that allow
|
||
|
||
information to be disseminated to a large number of
|
||
|
||
associates, and unlike the live telephone conversations
|
||
|
||
of bridges and loops, they are available at any time of
|
||
|
||
the day. Additionally, VMB's don't require use of a
|
||
|
||
computer and modem, only a touch tone phone is needed
|
||
|
||
to call the box. Their usefulness is limited somewhat
|
||
|
||
because they play only one "outgoing" message at a
|
||
|
||
time, and their transitory nature limits their
|
||
|
||
reliability.
|
||
|
||
|
||
|
||
Summary
|
||
|
||
Phreakers, hackers and pirates do not act as
|
||
|
||
loners. They have adopted existing methods of
|
||
|
||
communication, consistent with their skills in high
|
||
|
||
technology, to form a social network that allows for
|
||
|
||
the exchange of information, the socialization of new
|
||
|
||
members, socializing with others, and in the case of
|
||
|
||
pirates, performing the "deviant" act itself via these
|
||
|
||
means.
|
||
|
||
These communication points create and foster
|
||
|
||
groups of loosely associated individuals, with specific
|
||
|
||
interests, coming together to exchange information
|
||
|
||
and/or software. It is impossible to be a part of the
|
||
|
||
social network of the computer underground and be a
|
||
|
||
loner. Based upon the Best and Luckenbill measure,
|
||
|
||
|
||
|
||
|
||
64
|
||
|
||
actors in the computer underground, by displaying
|
||
|
||
mutual association, organize as colleagues.
|
||
|
||
The social network of the computer underground
|
||
|
||
provides the opportunity for colleagues to form
|
||
|
||
cooperative working relationships with others, thus
|
||
|
||
moving the CU towards a more sophisticated form of
|
||
|
||
social organization. These "hacker groups" are
|
||
|
||
addressed in the next section.
|
||
|
||
|
||
|
||
|
||
65
|
||
|
||
|
||
|
||
|
||
|
||
Mutual Participation
|
||
|
||
In the previous chapter the ways in which the
|
||
|
||
structure of the computer underground fosters mutual
|
||
|
||
association were discussed. Their social outlets and
|
||
|
||
means for informational exchange bring the CU community
|
||
|
||
together as deviant colleagues. Their relationships
|
||
|
||
fit quite well into the Best and Luckenbill (1982)
|
||
|
||
typology of collegial associations:
|
||
|
||
The relationship between deviant colleagues
|
||
involves limited contact. Like loners,
|
||
colleagues perform their deviant acts alone.
|
||
But unlike loners colleagues associate with
|
||
one another when they are not engaged in
|
||
deviance . . . In effect, there is a division
|
||
between two settings; onstage where
|
||
individual performs alone; and backstage,
|
||
where colleagues meet (cf Goffman). In their
|
||
backstage meetings, colleagues discuss
|
||
matters of common interest, including
|
||
techniques for performing effectively, common
|
||
problems and how to deal with them, and ways
|
||
of coping with the outside world (1982 p.37).
|
||
|
||
However, despite the advantages of collegial
|
||
|
||
association, ties between CU participants are weak.
|
||
|
||
Loyalty between individuals seems rare, as the CU is
|
||
|
||
replete with tales of phreak/hackers who, when
|
||
|
||
apprehended, expose identities or "trade secrets" in
|
||
|
||
order to avoid prosecution. These weak collegial ties
|
||
|
||
may be fostered by the anonymity of CU communication
|
||
|
||
methods, and the fact that all CU actors are, to some
|
||
|
||
|
||
|
||
|
||
66
|
||
|
||
extent, in competition with each other. There are only
|
||
|
||
so many systems with weak security and once such a
|
||
|
||
system is found, sharing it with others will virtually
|
||
|
||
ensure that the hole will be sealed when the increased
|
||
|
||
activity is noticed. Thus while p/hackers will share
|
||
|
||
general knowledge with each other, specific information
|
||
|
||
is not disseminated publicly.
|
||
|
||
As Best and Luckenbill have observed, in order to
|
||
|
||
remain in a collegial relationship individuals must be
|
||
|
||
able to successfully carry out operations alone (1982
|
||
|
||
p.45). In order to sustain a career in p/hacking one
|
||
|
||
must pursue and collect information independent of what
|
||
|
||
is shared on the communication channels. Despite the
|
||
|
||
association with other phreakers and hackers, the
|
||
|
||
actual performance of the phreak/hacking act is a
|
||
|
||
solitary activity.22
|
||
|
||
That is not to say, however, that p/hackers never
|
||
|
||
share specific information with others. As discussed
|
||
|
||
earlier, p/hack bulletin board systems frequently have
|
||
|
||
differentiated levels of access where only highly
|
||
|
||
regarded individuals are able to leave and read
|
||
|
||
messages. These areas are frequently used to keep
|
||
____________________
|
||
|
||
22 This does not hold true for pirates. By
|
||
definition they must trade programs with other
|
||
individuals.
|
||
|
||
|
||
|
||
|
||
|
||
67
|
||
|
||
information from "unskilled" users at the lower levels.
|
||
|
||
There are strong social norms that some information
|
||
|
||
should not be shared too widely, as it may be either
|
||
|
||
"abused" or fall into the hands of enforcement agents.
|
||
|
||
For example, when one p/hacker announced that he was
|
||
|
||
going to release a tutorial on how to infiltrate a new
|
||
|
||
telephone company computer, he received the following
|
||
|
||
messages in reply:
|
||
|
||
Not smart, DT. %That computer% is a system
|
||
which can be quite powerful if used to its
|
||
potential. I don't think that information on
|
||
programming the switches should be released
|
||
to anyone. Do you realize how destructive
|
||
%that computer% could really be if used by
|
||
someone who is irresponsible and intends on
|
||
destroying things? Don't even think about
|
||
releasing that file. If you do release that
|
||
file, it will disappear and will no longer
|
||
remain in circulation. Believe me. Not many
|
||
have the right to know about %that computer%,
|
||
or any other delicate telco computers for
|
||
that matter. Why do you think the fucking New
|
||
York Times published that big article on
|
||
hackers screwing around with telco machines?
|
||
Not only will you get into a lot of trouble
|
||
by releasing that file on %computer%, you
|
||
will be making telcos more aware of what is
|
||
actually happening, and soon no one will be
|
||
able to learn about their systems. Just think
|
||
twice (EP, message log, 1988).
|
||
|
||
Why would you want normal people to have such
|
||
knowledge? Any why would you post about it?
|
||
If you have knowledge that's fine but DON'T
|
||
spread that knowledge among others that may
|
||
abuse it. It's not impressive! I don't know
|
||
why anyone would want to disperse that
|
||
knowledge. Please don't release any "in
|
||
depth" files on such systems of great power.
|
||
Keep that to yourself it will just mess it up
|
||
for others (UU, message log, 1988).
|
||
|
||
|
||
|
||
|
||
|
||
68
|
||
|
||
|
||
The desire to share information with selected
|
||
|
||
colleagues often leads to the formation of cooperative
|
||
|
||
"working groups." These partnerships are easily formed,
|
||
|
||
as the structure of mutual association in the CU
|
||
|
||
creates a means where "talent" can be judged on the
|
||
|
||
basis of past interactions, longevity in the field, and
|
||
|
||
mutual interests. When allegiances are formed, the CU
|
||
|
||
actors begin "mutual participating" in their acts, thus
|
||
|
||
becoming "peers" in terms of social organization.
|
||
|
||
Mutual participation, as defined in the Best and
|
||
|
||
Luckenbill typology, is exhibited by actors sharing in
|
||
|
||
the same deviant act, in the physical presence of one
|
||
|
||
another (1982 p.45). However, the measurement was
|
||
|
||
"grounded" in studies of traditional deviant
|
||
|
||
associations (eg: street gangs, prostitutes, etc.)
|
||
|
||
where "real-time" interaction is common. The technology
|
||
|
||
used by the CU negates this requirement as actors can
|
||
|
||
be located in different parts of the country.
|
||
|
||
Additionally, "hacking" on a system, by a group of
|
||
|
||
peers, does not require simultaneous participation by
|
||
|
||
all members. However Best and Luckenbill's typology is
|
||
|
||
an ideal type, and the activities of peers in the
|
||
|
||
computer underground do not fall outside of the spirit
|
||
|
||
or intention of their concept of mutual participation.
|
||
|
||
Their description of deviant peer associations is
|
||
|
||
|
||
|
||
|
||
69
|
||
|
||
presented here:
|
||
|
||
Deviant peers are distinguished from
|
||
colleagues by their shared participation in
|
||
deviance. While colleagues carry out their
|
||
deviant operations alone, peers commit
|
||
deviant acts in one another's presence.
|
||
Peers cooperate in carrying out deviant
|
||
operations, but they have a minimal division
|
||
of labor, with each individual making roughly
|
||
comparable contribution. Peer relationships
|
||
also tend to be egalitarian and informal;
|
||
some peers may be acknowledged leaders or
|
||
admired for their skill, but there is no set
|
||
division of authority. Like colleagues,
|
||
peers share subcultural knowledge, but peer
|
||
groups typically provide their members with
|
||
more support. In addition to cooperating in
|
||
deviant operations, peers may recruit and
|
||
socialize newcomers and supply one another
|
||
with deviant equipment and social support.
|
||
Thus, the bonds between peers are stronger
|
||
than those linking colleagues (1982, p.45).
|
||
|
||
Peer associations in the CU are largely limited to
|
||
|
||
small groups23 working on a specified goal. Both
|
||
|
||
pirates and p/hackers organize themselves in this
|
||
|
||
regard, though their characteristics differ. We begin
|
||
|
||
with a discussion of mutual participation among
|
||
|
||
pirates.
|
||
|
||
|
||
|
||
Pirate Groups
|
||
|
||
Pirate groups are composed of less than ten
|
||
____________________
|
||
|
||
23 In terms of the ideal type for deviant peers
|
||
any two individuals working in cooperation exhibit
|
||
mutual participation. The discussion here addresses
|
||
groups that consist of three or more people that
|
||
identify themselves as a sort of "club." Short-lived
|
||
interaction between two people is not considered a
|
||
"group" in the CU culture.
|
||
|
||
|
||
|
||
|
||
|
||
70
|
||
|
||
members. Their primary purpose is to obtain the latest
|
||
|
||
software, remove any copy-protection from it, and then
|
||
|
||
distribute it to the pirate community. Often the
|
||
|
||
"warez" that they distribute will be adorned with the
|
||
|
||
group name, so subsequent users will be aware of the
|
||
|
||
source of the software. Many pirate groups have "home"
|
||
|
||
BBS systems that act as key distribution points, and as
|
||
|
||
places where outsiders can communicate with members of
|
||
|
||
the association. This researcher was unable to obtain
|
||
|
||
data about the internal organization of pirate groups,
|
||
|
||
but it appears that they are leaderless, with
|
||
|
||
individual members working alone but giving credit to
|
||
|
||
the group as a whole.
|
||
|
||
|
||
|
||
Phreak/hack groups
|
||
|
||
The existence of phreak/hacker groups is well
|
||
|
||
documented in the data, and has been heavily reported
|
||
|
||
in the media. Two hacker groups in particular, The
|
||
|
||
414's (named for the Wisconsin area code in which they
|
||
|
||
lived), and The Inner Circle, received a large amount
|
||
|
||
of press after being apprehended for various computer
|
||
|
||
break-ins. However, the "threat" that such groups
|
||
|
||
represent has probably been overstated as the data
|
||
|
||
indicate that "hacker gangs" vary greatly in
|
||
|
||
organization and dedication to the CU enterprise.
|
||
|
||
Many hacker groups are short-lived associations of
|
||
|
||
|
||
|
||
|
||
71
|
||
|
||
convenience, much like the "no girls allowed!" clubs
|
||
|
||
formed by young boys. They often consist of four to
|
||
|
||
nine beginning phreak/hackers who will assist each
|
||
|
||
other in obtaining telephone credit-card numbers. By
|
||
|
||
pooling their resources, a large number of illicit
|
||
|
||
"codez" can be obtained and shared with others.
|
||
|
||
Distribution of the account numbers is not limited to
|
||
|
||
the group, they are often shared with the community at
|
||
|
||
large, "courtesy of Codez Kidz Ltd." Groups of this
|
||
|
||
type are looked at with disdain by "elite"
|
||
|
||
phreak/hackers and are often criticized as being more
|
||
|
||
interested in self-promotion then they are with
|
||
|
||
actually phreaking or hacking.
|
||
|
||
Some hacker groups are very proficient and
|
||
|
||
dedicated to their craft, however. These groups are
|
||
|
||
characterized by smaller memberships, less visibility
|
||
|
||
to non-members, and commitment to the CU enterprise.
|
||
|
||
They are loosely organized, yet some have managed to
|
||
|
||
exist six or more years despite members dropping out or
|
||
|
||
being arrested. These "elite" groups are selective
|
||
|
||
about membership, and cite trust and talent as the two
|
||
|
||
leading requirements for joining:
|
||
|
||
The group exists mainly for information
|
||
trading. If you trust everyone else in the
|
||
group, it is very profitable to pool
|
||
information on systems . . . also it is nice
|
||
to know someone that you can call if you need
|
||
help on operating system X and to have people
|
||
|
||
|
||
|
||
|
||
72
|
||
|
||
feel free to call you if they need help on
|
||
operating system Y (AN, message log, 1988).
|
||
|
||
Trust is a very important part of a group. I
|
||
think that's blatantly obvious. You have to
|
||
be able to trust the other members of the
|
||
group with the information you are providing
|
||
in order to be productive, and have a secure
|
||
situation (UU, message log, 1988).
|
||
|
||
. . . all groups serve the same purpose: to
|
||
make their members feel better about
|
||
themselves (like, wow, I'm in a group) and to
|
||
trade things, whether it's wares, codes, or
|
||
whatever. But the thing is that being in a
|
||
group is like saying "I trust you, so like,
|
||
what can we do together?" (NN, message log,
|
||
1988)
|
||
|
||
Indeed, hacker groups are formed primarily for the
|
||
|
||
purpose of information exchange. To this end, groups
|
||
|
||
attempt to recruit members with a wide variety of
|
||
|
||
"specializations" in order to have a better support
|
||
|
||
network to turn to:
|
||
|
||
%Our group% has always been very selective
|
||
about members (took me six years to get in).
|
||
The only reason the group exists is to bring
|
||
together a diverse group of talents. There is
|
||
very little overlap in %the group% these
|
||
days. Everyone has one thing that they are
|
||
the best in the country at, and are
|
||
conversant with just about any other form of
|
||
hacking. As an example, I got into a Primos
|
||
computer this morning around 9 am. Once I got
|
||
in, I know enough about Primos to get around,
|
||
but that's it. So I call %PS% in New York,
|
||
give him the info, and when I get home
|
||
tonight, he has gotten in and decrypted the
|
||
entire username/password file and uploaded it
|
||
to me. But two weeks ago he got into a VAX.
|
||
He got the account to me, I called it up and
|
||
set up three backdoors into the system that
|
||
we can get in if the account is detected or
|
||
deleted. Simple matter of communism. From
|
||
each according to his ability . . . etc. Also
|
||
|
||
|
||
|
||
|
||
73
|
||
|
||
it helps that everyone in the group is
|
||
experienced enough that they don't fuck up
|
||
accounts you spend all day getting (TM, field
|
||
notes, 1989).
|
||
|
||
Consistent with the Best and Luckenbill ideal
|
||
|
||
type, hacker groups do not exhibit a set division of
|
||
|
||
authority or labor. Most groups are leaderless, and
|
||
|
||
every member is free to pursue their own interests,
|
||
|
||
involving other members of the group only when desired:
|
||
|
||
We just got our group together. We've got a
|
||
guy that does VMB's and a Sprinter %obtains
|
||
"codez" from U.S. Sprint% and a couple of
|
||
hackers. Everybody's free to pursue whatever
|
||
system they want but if they want or need
|
||
some help they can call on any of the other
|
||
members if they want to. Like if one guy is
|
||
scanning and finds a VAX he might call and
|
||
give me the dialup. Then I might have to
|
||
call our Sprinter to get some codez so I can
|
||
start hacking on it. Once I get through I'll
|
||
give the account to the other members. But
|
||
if I found it myself I wouldn't have to give
|
||
it out but I probably would anyway 'cuz
|
||
keeping it would be bullshit (DC, field
|
||
notes, 1988).
|
||
|
||
There isn't a leader really. The guy who
|
||
starts the group sort of acts like a contact
|
||
point but everyone else has everyones' phone
|
||
number and you can call whoever you want to
|
||
anytime. Usually when you're putting a group
|
||
together you just get everyone you want and
|
||
you all decide on a name. (DC, field notes,
|
||
1988).
|
||
|
||
|
||
|
||
Summary
|
||
|
||
By virtue of the extensive social network found in
|
||
|
||
the CU, some participants form work groups. The
|
||
|
||
sophistication of these groups varies, but in all cases
|
||
|
||
|
||
|
||
|
||
74
|
||
|
||
it is evident that the groups exist to support what are
|
||
|
||
primarily individually performed activities. The
|
||
|
||
groups exhibit many of the ideal-type characteristics
|
||
|
||
of peer associations, and it is clear that in some
|
||
|
||
cases the computer underground is socially organized as
|
||
|
||
peers.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
75
|
||
|
||
|
||
|
||
|
||
|
||
Conclusion
|
||
|
||
Phreakers, hackers, and pirates do not act as
|
||
|
||
loners. Loners do not associate with others, and are
|
||
|
||
on their own in coping with the practical problems
|
||
|
||
presented by their activities (Best and Luckenbill
|
||
|
||
1982, p.28). From the data presented here, it is
|
||
|
||
evident that the computer underground has established
|
||
|
||
an extensive social network for the exchange of
|
||
|
||
resources and mutual support. The characteristics of
|
||
|
||
the CU varies according to the goals of the
|
||
|
||
participants, but the presence of mutual association is
|
||
|
||
consistent. Contact between individuals is limited,
|
||
|
||
with the acts of phreaking or hacking being committed
|
||
|
||
alone. Computer underground participants do associate
|
||
|
||
with one another in order to discuss matters of common
|
||
|
||
interest, such as performance techniques, news, and
|
||
|
||
problem solving. To facilitate this informational
|
||
|
||
exchange, they have established a technologically
|
||
|
||
sophisticated network that utilizes computer bulletin
|
||
|
||
boards, voice mail boxes, telephone bridges, and
|
||
|
||
telephone loops.
|
||
|
||
The collegial organization of the computer
|
||
|
||
underground is further evidenced by the establishment
|
||
|
||
of a CU culture. The subcultural adaptation of
|
||
|
||
|
||
|
||
|
||
76
|
||
|
||
language, expectations of normative conduct, and status
|
||
|
||
stratification based on mastery of cultural knowledge
|
||
|
||
and skill, all indicate that the computer underground
|
||
|
||
is, at the very least, a social organization of
|
||
|
||
colleagues (see Best and Luckenbill, 1982, p.37).
|
||
|
||
The very structure that permits mutual association
|
||
|
||
among CU participants also encourages some to form
|
||
|
||
working relationships, thus acting as peers by mutually
|
||
|
||
participating in CU activities. Peers organized in this
|
||
|
||
manner share in their deviance, organizing informally
|
||
|
||
with little division of labor or set division of
|
||
|
||
authority (Best and Luckenbill, 1982, p.45). These
|
||
|
||
peer associations provide support to members, and can
|
||
|
||
provide socialization and recruitment functions for
|
||
|
||
newcomers. The establishment of work groups, through
|
||
|
||
mutual participation, indicates that though the
|
||
|
||
computer underground is largely organized as a network
|
||
|
||
of colleagues, it is also, to some degree, a social
|
||
|
||
organization of peers.
|
||
|
||
Best and Luckenbill (1982) describe two additional
|
||
|
||
forms of deviant associations that are more
|
||
|
||
organizationally sophisticated than peers: "mobs" and
|
||
|
||
"formal organizations." The computer underground,
|
||
|
||
however, does not display the requisite characteristics
|
||
|
||
of these organizational types. The primary
|
||
|
||
|
||
|
||
|
||
77
|
||
|
||
characteristic of "mobs" is an elaborate division of
|
||
|
||
labor (Best and Luckenbill, 1982, p.25). While some CU
|
||
|
||
groups do exhibit a rudimentary division of labor based
|
||
|
||
on individual members' specialization, it is not by any
|
||
|
||
means "elaborate." Any division of labor that does
|
||
|
||
exist is voluntary and arises on the basis of
|
||
|
||
specialized knowledge, not a specialized organizational
|
||
|
||
role.
|
||
|
||
In much the same manner the lack of a designated
|
||
|
||
leader or leadership hierarchy prevents CU groups from
|
||
|
||
being categorized as "formal organizations" in the Best
|
||
|
||
and Luckenbill typology. Deviant organizations at this
|
||
|
||
level are quite sophisticated and there is no empirical
|
||
|
||
evidence that the computer underground is organized in
|
||
|
||
this manner.
|
||
|
||
This study of the computer underground has been a
|
||
|
||
test of the Best and Luckenbill typology of the social
|
||
|
||
organization of deviants. As a test of their
|
||
|
||
organizational indicators, the CU has shown that the
|
||
|
||
categories are well constructed, with the possible
|
||
|
||
exception of limiting "mutual participation" to acts
|
||
|
||
carried out in the presence of others. However, if we
|
||
|
||
modify this to include non-simultaneous, but
|
||
|
||
cooperative, acts as found in phreak/hacker groups, the
|
||
|
||
category is otherwise robust. The flexibility of the
|
||
|
||
|
||
|
||
|
||
78
|
||
|
||
typology, which explicitly recognizes that not all
|
||
|
||
deviant associations will display all of the character-
|
||
|
||
istics (Best and Luckenbill, 1982, p.25), is a strength
|
||
|
||
that allowed it to be easily used in terms of the
|
||
|
||
computer underground.
|
||
|
||
By addressing the CU from a social organizational
|
||
|
||
viewpoint we have seen that despite the high technology
|
||
|
||
trappings of their craft, pirates, phreakers, and
|
||
|
||
hackers display organizational characteristics found in
|
||
|
||
other groups that have been criminalized. This may
|
||
|
||
suggest that the development of sophisticated tools to
|
||
|
||
commit "crime" does not necessarily affect the ways in
|
||
|
||
which individuals organize their activities.
|
||
|
||
The implications of peer and collegial
|
||
|
||
organization for the members of the computer
|
||
|
||
underground are vast. The level of sophistication has
|
||
|
||
a direct relationship to the types of resources on
|
||
|
||
which individuals can draw (Best and Luckenbill, 1982,
|
||
|
||
p.54). Because CU members are mutually associated,
|
||
|
||
they are able to turn to colleagues for advice and
|
||
|
||
support with various problems. However, at the
|
||
|
||
collegial level they are left to enact the solutions
|
||
|
||
independently. Whether or not they are successful in
|
||
|
||
doing so will determine if they choose to remain active
|
||
|
||
in the computer underground. The data show that
|
||
|
||
|
||
|
||
|
||
79
|
||
|
||
involvement in the CU is short in duration, unless
|
||
|
||
success in early phreak/hack attempts is obtained. As
|
||
|
||
long as the CU remains organized as a collection of
|
||
|
||
colleagues, this trend will continue. Additionally, as
|
||
|
||
the computer and telephone industries become more
|
||
|
||
sophisticated in preventing the unauthorized use of
|
||
|
||
their facilities, new phreak/hackers are unlikely to
|
||
|
||
succeed in their initial attempts at the act, thus
|
||
|
||
dropping away from the activity and never becoming
|
||
|
||
acculturated to the point where peer relationships can
|
||
|
||
be developed.
|
||
|
||
At the peer level, a dimension of sophistication
|
||
|
||
that some members of the CU do display, the knowledge
|
||
|
||
and resources to solve problems and obtain resources is
|
||
|
||
greater. However, even at this level the ties between
|
||
|
||
peers remain weak at best. Although their cooperative
|
||
|
||
ties allow for more sophisticated operations, and
|
||
|
||
somewhat reduce the CU's vulnerability to social
|
||
|
||
control agents (Best and Luckenbill, 1982, p.53), it
|
||
|
||
still does not completely eliminate the need for
|
||
|
||
individual success in order to sustain a CU career. As
|
||
|
||
long as the CU remains at the current level of
|
||
|
||
organizational sophistication, with weak ties and
|
||
|
||
somewhat limited means of support and resource
|
||
|
||
attainment, it will continue to be a transitory and
|
||
|
||
|
||
|
||
|
||
80
|
||
|
||
limited "criminal" enterprise.
|
||
|
||
This realization should be considered by policy
|
||
|
||
makers who desire to further criminalize computer
|
||
|
||
underground activities. Given the current organization
|
||
|
||
of the CU, the future social costs of their actions are
|
||
|
||
not likely to expand beyond the current level. There
|
||
|
||
is no evidence to support assertions that the CU is
|
||
|
||
expanding, and the insight provided here shows that it
|
||
|
||
is not likely to do so on a large scale.
|
||
|
||
For sociologists, the computer underground is a
|
||
|
||
field rich for insight into several areas of concern.
|
||
|
||
Future research into the career path of CU members, and
|
||
|
||
the relationships between individuals, could prove
|
||
|
||
helpful to those interested in applying theories of
|
||
|
||
differential association and career deviance.
|
||
|
||
Additionally, the computer underground provides a
|
||
|
||
unique opportunity to study the process of
|
||
|
||
criminalization, and its effect on those who are
|
||
|
||
engaged in the behavior.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
REFERENCES
|
||
|
||
Best, Joel and David F. Luckenbill. 1982. Organizing
|
||
Deviance. Englewood Cliff, New Jersey: Prentice-Hall.
|
||
|
||
Bequai, August. 1987. Technocrimes. Lexington,
|
||
Mass.:Lexington Books.
|
||
|
||
Bickford, Robert. 1988. Personal communication to
|
||
Gordon Meyer.
|
||
|
||
Chicago Tribune. 1989. "Computer hacker, 18, gets
|
||
prison for fraud." Feb. 15:2,1.
|
||
|
||
Field Notes. Interviews with phreakers, hackers, and
|
||
pirates. Conducted from 7/88 to 4/89 (confidential
|
||
material in authors files).
|
||
|
||
Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The
|
||
Process of Criminalization: The Case of Computer Crime
|
||
Laws." Criminology 26:101-126.
|
||
|
||
Levy, Steven. 1984. Hackers: Heroes of the Computer
|
||
Revolution. New York: Dell Publishing.
|
||
|
||
Message Logs from a variety of computer underground
|
||
bulletin board systems, (confidential material), 1988-
|
||
1989.
|
||
|
||
NBC-TV. 1988. Hour Magazine. November 23, 1988.
|
||
|
||
Parker, Donn B. 1983. Fighting Computer Crime. New
|
||
York: Charles Scribner's Sons.
|
||
|
||
Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box."
|
||
Esquire October, pp. 116-125.
|
||
|
||
Small, David. 1988. Personal communication to Gordon
|
||
Meyer.
|
||
|
||
WGN-Radio. 1988. Ed Schwartz Show. September 27, 1988.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
82
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX A
|
||
COMPUTER UNDERGROUND PSEUDONYMS
|
||
|
||
_________________________________________________________
|
||
|Literature, films,|Computers & |Nouns, titles & |
|
||
|and Entertainment |related technology |Descriptive names|
|
||
---------------------------------------------------------
|
||
| Pink Floyd | Mrs. Teletype | The Professor |
|
||
| Hatchet Molly | Baudy Bastard | Perfect Asshole |
|
||
| Jedi Knight | Doctor Phreak | The Messiah |
|
||
| King Richard | Lord FAX | Right Wing Fool |
|
||
| Captain Hoga | CNA Office | Bed Bug |
|
||
| Al Crowley | Sir Mac | Sleepy Head |
|
||
| Doc Holiday | Busy Signal | Mean Underwear |
|
||
| Mr. Big Dog | Silicon Student | Cockroach |
|
||
| Robin Williams | Fiber Cables | Primo Bomber |
|
||
| Big Bird | Phone Crasher | The Prisoner |
|
||
| Cross-eyed Mary | Doc Cryptic | Night Lighting |
|
||
| Capt. America | Apple Maniac | No Regrets |
|
||
| Uncle Sam | Fuzzy Sector | Grounded Zero |
|
||
| Thumpr | Cntrl. Alt. Del. | Spit Wad |
|
||
| Little John | Byte Ripper | Shadow Dove |
|
||
----------------------------------------------------------
|
||
|
||
|
||
|
||
|
||
|
||
|
||
83
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX B
|
||
NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS
|
||
|
||
|
||
Welcome to Analog Electronics Datum System.
|
||
Please take this time to fill out a one-time
|
||
questionnaire that will allow us to determine your
|
||
level of access on Analog Electronics Datum System.
|
||
|
||
If any question is too difficult for you to
|
||
answer, just answer with your best guess or a simple "I
|
||
don't know."
|
||
|
||
We basically have two different divisions or types
|
||
of users on this system:
|
||
|
||
(1) Apple (%%,Mac), and IBM software traders
|
||
(2) Telecommunication hobbyists - any/all
|
||
computers (networks, mainframes,
|
||
engineering)
|
||
|
||
Your answers will help us decide which category
|
||
you belong to and what access you should get on our
|
||
system.
|
||
|
||
* What type of computer & modem are you using to call
|
||
this system?
|
||
|
||
* Where did you get the phone number to Analog
|
||
Electronics Datum System?
|
||
|
||
* We'll need your first name and real phone # where you
|
||
can be reached for validation purposes only, this
|
||
information is kept in a password encoded file, on
|
||
another computer (critical for higher validation):
|
||
|
||
First for the FILE TRANSFER AREA ACCESS questions:
|
||
|
||
(1) How many bits are in a nibble? (Assume 6502 micro
|
||
processor)
|
||
|
||
(2) Define WORM, RAM, ROM, VDT, CRT, BPS? (Pick any 3)
|
||
|
||
(3) What does 2400 baud mean in terms of bit transfer
|
||
speed?
|
||
|
||
|
||
|
||
|
||
|
||
84
|
||
|
||
(4) What is PT,MT,AE,BIN2,Ymodem Batch,BLU? (Pick any
|
||
4)
|
||
|
||
(5) How many Megahertz does a standard Apple %%+ run
|
||
at? (rounding OK)
|
||
|
||
|
||
Now for the TeleCommunication Questions:
|
||
|
||
(1) Describe the Voice Transmission Use of a Loop:
|
||
|
||
(2) If I gave you my phone #, how would you find my
|
||
name and address?!
|
||
|
||
(3) Can you name any networking software operating
|
||
systems or protocols?
|
||
|
||
(4) What is the highest frequency a twisted two wire
|
||
pair can transmit at?
|
||
|
||
(5) We believe Phones and Computers Belong Together,
|
||
what do you BELIEVE?
|
||
|
||
|
||
Ok, thanks for that info.
|
||
|
||
|
||
A MESSAGE FROM AL CAPONE (LOCAL) AND THE TRADER (LD)
|
||
SYSTEM VALIDATORS
|
||
|
||
-----------------------------------------------------
|
||
|
||
|
||
Welcome to ALDS! As a new user you have made
|
||
a change for the better in choosing this system as
|
||
one of your places of telecommunication exchange. In
|
||
my opinion, this is one, if not the best, system
|
||
in telecommunications today as most of the good boards
|
||
such as Shadowspawn, Metal Shop Private, etc. do not
|
||
exist anymore. Quality users exist on this system that
|
||
have established a reputation for themselves so
|
||
questions you ask will be answered thoroughly and
|
||
precisely. We are a sponsor board of the LOD/H
|
||
Technical Journal, and accounts have been
|
||
established representing Phrack, Inc. and 2600
|
||
Magazine. (For our software trading people, we also
|
||
have an excellent file transfer area . . . consistent
|
||
with the rest of the nation . . . )
|
||
|
||
Due to the high quality of our system, we will
|
||
|
||
|
||
|
||
|
||
85
|
||
|
||
need some additional information about you.
|
||
Maintenance of a high quality system requires high
|
||
quality users, so the first step in this process is
|
||
keeping the low quality users off of the system . . .
|
||
so please cooperate with us . . . this is for your
|
||
benefit as well as ours. The information you give us
|
||
will be cross referenced with other systems for
|
||
accuracy, and if you leave false information, you may
|
||
suffer low access or deletion.
|
||
|
||
All phone number information is stored outside of
|
||
the housing of this system inside of an encrypted,
|
||
password locked file for your security. So if you have
|
||
left an invalid phone #, please leave one where you can
|
||
be reached, or someone's name and number (if possible)
|
||
that will vouch for you. Keep in mind this validation
|
||
can take up to 1 week to complete due to the high
|
||
volume of new callers to our system.
|
||
|
||
Note: Limited system access will be granted within 24
|
||
Hrs if all of your info seems correct.
|
||
|
||
|
||
Thanks in advance . . . Bugsy Malone
|
||
The Swapper
|
||
SYSOP/SYSTEM VALIDATORS
|
||
|
||
|
||
% Bugsy Malone needs the following info: %
|
||
|
||
(1) Your references (sysops, other users on this
|
||
system, other BBS).
|
||
(2) Your interests in having access to our system.
|
||
(3) How do you feel you can contribute to our system?
|
||
(4) How many years of telecommunication experience do
|
||
you have?
|
||
(5) Do you have any special talents in programming, or
|
||
operating systems?
|
||
If yes, then name the language(s) or operating
|
||
system(s).
|
||
|
||
|
||
|
||
Enter message now, answering these questions:
|
||
|
||
|
||
|
||
%after entering the message the BBS hangs up and the
|
||
caller will call back in 24 hours to see if access has
|
||
been granted.%
|
||
|
||
|
||
|