603 lines
32 KiB
Plaintext
603 lines
32 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 1, Issue #1.13 (June 12, 1990) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer
|
||
REPLY TO: TK0JUT2@NIU.bitnet
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views.
|
||
--------------------------------------------------------------------
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
--------------------------------------------------------------------
|
||
|
||
|
||
In This Issue:
|
||
|
||
File 1: Moderators' Editorial: The Chilling Effect Hits Home
|
||
File 2: A Hacker's Perspective (by Johnny Yonderboy)
|
||
File 3: Len Rose Information and Commentary
|
||
File 4: Response to Telecom Digest's Views (by Emmanuel Goldstein)
|
||
File 5: Reprinted Editorial on Steve Jackson Games
|
||
--------------------------------------------------------------------
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.11 / File 1 of 5 ***
|
||
***************************************************************
|
||
|
||
*** THE CHILLING EFFECT HITS CuD ***
|
||
|
||
Craig Niedorf was arraigned for a second time on June 12. CuD 1.14 will
|
||
have a detailed article on the arraignment on Friday, but our preliminary
|
||
analysis of Tuesday's events suggests that the witch hunt continues in full
|
||
force. Several of the charges were dropped, but new ones were added based
|
||
on articles Craig allegedly wrote. It appears that the definition of
|
||
"forbidden information" grows wider as the Secret Service and zealous
|
||
federal prosecutors show their commitment to law and order by trampling the
|
||
First Amendment. If Craig is convicted, the implications are serious. All
|
||
persons who currently, or have in the past, written, distributed, or
|
||
received "forbidden knowledge"--knowledge which is defined as illegal only
|
||
after the fact--may be vulnerable to prosecution. More serious is the
|
||
possibility that those who agents feel may possess such information may
|
||
have their equipment confiscated in the sweep for evidence.
|
||
|
||
We have found that in attempting to acquire information about the current
|
||
indictments, much of the information is "closed," whether officially or
|
||
because of the attempt to control information flow by prosecutors. For
|
||
example, in the federal district court in Chicago, staff either cannot or
|
||
will not release *any* information, and all queries are referred to Bill
|
||
Cook. If Mr. Cook is not available or choses not to return calls,
|
||
obtaining accurate information becomes nearly impossible.
|
||
|
||
In fifteenth century England, the Star Chamber was a powerful tribunal
|
||
feared for its often capricious way of dispensing justice, often in
|
||
secrecy, and for the political overtones it acquired in suppressing
|
||
"enemies of the state." The current handling of federal investigation into
|
||
the CU in many ways resembles the dread Star Chamber. Information is
|
||
tightly guarded, secrecy is maintained, it seems to function as much as a
|
||
device to inspire fear (judging from comments by agents) as to dispense
|
||
justice, because those whose equipment has been confiscated without a
|
||
subsequent indictment or without reasonable opportunity for successful
|
||
appeal have no open trial, and the charges, while seemingly precise on
|
||
paper, do not seem to match the facts as presented by the tribunal. In
|
||
short, in Operation Sun Devil, the judicial system seems to have broken
|
||
down.
|
||
|
||
In 1985, then-U.S. Attorney General Edwin Meese was asked the following by
|
||
an interviewer:
|
||
|
||
"You criticize the Miranda Ruling, which gives suspects the right to
|
||
have a lawyer present before police questioning. Shouldn't people, who
|
||
may be innocent, have such protection?
|
||
|
||
Meese replied:
|
||
|
||
Suspects who are innocent of a crime should. But the thing is, you
|
||
don't have many suspects who are innocent of a crime. That's
|
||
contradictory. If a person is innocent of a crime, then he is not a
|
||
suspect.
|
||
|
||
The power to name the world provides a non-coercive, yet effective, means
|
||
of imposing preferred doctrines and corresponding behaviors on others.
|
||
Hyper-active law enforcement agents seem to have learned from Meese and are
|
||
first defining--after the fact--"crimes" of information acquisition,
|
||
control, and dissemination as "illegal," and innocence or guilt do not seem
|
||
to matter. Granted, courts may ultimately vindicate one who has been
|
||
indicted, but not after considerable financial and emotional hardship.
|
||
Those who merely possess evidence may not be indicted, but may nonetheless
|
||
suffer, as have Steve Jackson and others, the loss of equipment vital to
|
||
their work.
|
||
|
||
There is also a chilling effect that occurs with a system of justice in
|
||
which "crimes" are so loosely defined. Should sysops and others
|
||
self-censor themselves out of fear of possible government reprisals? We at
|
||
CuD provide CU archives for several reasons. First, as a teaching aid, it
|
||
provides information for students wishing to write term papers on the CU.
|
||
Without this information, they could not learn. CU documents also provide
|
||
helpful handouts for lectures, speeches, and other public presentations.
|
||
The chilling effect of suppression of first amendment rights and not
|
||
knowing in advance what is considered lawful and what is not--even when
|
||
nothing appears illegal on its surface--stifles academic freedom.
|
||
|
||
Second, we offer the archives for research purposes. As professional
|
||
scholars, we find that to limit access to what is the *only* source of
|
||
material of this kind inhibits inquiry in a way way that is simply
|
||
unacceptable in a democratic society. Much of our own information has come
|
||
from the variety of publications put out by various CU groups. To
|
||
criminalize publishing this material or making it available to other
|
||
like-minded scholars subverts the very principles of scholarship. If we
|
||
cite the infamous E911 file, innocuous as it may be, we, as scholars, are
|
||
required to have read it and to either produce it or indicate a source
|
||
where it can be found. That is the nature of science. We find the current
|
||
witch hunt mentality to have a serious repercussions for social science.
|
||
Should we adopt the "CYA" syndrome and change research directions? Or
|
||
should we pursue our inquiry and risk possible repercussions?
|
||
|
||
Finally, we make archives available for the layperson who simply wishes to
|
||
more fully understand what the fuss is about. An informed public is an
|
||
enlightened public, but it seems that the government has decided for us
|
||
what the public can and cannot learn.
|
||
|
||
We have both directly and indirectly invited members of law enforcement to
|
||
respond, to participate in dialogue, to give us a reasoned response to the
|
||
current "crackdown." None have. We have no wish to attack those who, in
|
||
good faith, may believe they are protecting society. But, neither do we
|
||
desire to become victims of the current purge.
|
||
|
||
Within the past two weeks, there seems to be a backlash--not by
|
||
hackers--but by established business persons, computer hobbyists,
|
||
academics, politicians, and others, who recognize the danger of the current
|
||
sweeps to civil liberties. We hope that others will also understand that,
|
||
when freedom of speech and freedom to share information is threatened, a
|
||
serious threat does indeed exist. THIS THREAT DOES NOT COME FROM THE CU!
|
||
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
END C-u-D, #1.13 +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.13 / File 2 of 5 ***
|
||
***************************************************************
|
||
|
||
|
||
* * * A Hacker's Perspective * * *
|
||
|
||
|
||
...insights into Operation Sun Devil...
|
||
|
||
...from the OTHER side...
|
||
|
||
by Johnny Yonderboy
|
||
|
||
|
||
A long time ago, in a land far, far away, hacking and phreaking were
|
||
safe, relatively painless hobbies to get into. People did not have major
|
||
law enforcement agencies hunting them down...huge bureaus weren't devoted
|
||
to the eradication of this crime. When caught, the usual punishment was to
|
||
simply be billed for the act that you perpetrated. Even myself, when I was
|
||
busted for illegally using AT&T credit cards, only received a stiff bill.
|
||
When they did prosecute further, the sentencing was designed to punish you
|
||
for your deviance, but also commended you on your cleverness.
|
||
|
||
That was a long time ago, and I came in on the tail end of the Golden
|
||
Age of Phreaking/Hacking. Phreaking was easy, and hacking was young.
|
||
Those who could hack in those days were also those who got the better jobs.
|
||
Those who couldn't, phreaked. And those who didn't fool around with that
|
||
"illegal nonsense" wrote bulletin board software. Life was simple, and
|
||
social divisions were even moreso.
|
||
|
||
Today, however, things are quite different.
|
||
|
||
An average bulletin board today can expect to be visited by a major law
|
||
enforcement agency (the FBI, the SS) about once a year. Most of the time,
|
||
you won't even know who is intruding upon your sacred privacy. These
|
||
visits are standard practice to be expected on the elite boards - a status
|
||
symbol, if you will. But to a normal user, this is terrifying. And among
|
||
non-computer users, this type of practice is totally unheard of. You might
|
||
scoff, but consider this - say you were a member of the NRA, and you had
|
||
weekly meetings (if indeed the NRA has weekly meetings). Suppose a federal
|
||
agent started sitting in at your meetings, looking for illegal activity.
|
||
Not participating, not speaking, but just watching. Would the NRA stand
|
||
for it? Not just no, but HELL NO! But as members (even legitimate ones)
|
||
of the computer-using community, we are supposed to accept this, as blindly
|
||
and complacently as we accept income tax. Sure, there is a law being
|
||
broken on certain boards, but what about those boards that are legitimate?
|
||
Or, what about the times on elite boards that the conversation is centered
|
||
around something besides illegal matters? Are we to always accept these
|
||
KGB-like raids upon our homes as well? Or how about the seizure of our
|
||
personal property? Which, notably, there is no guarantee of it's return if
|
||
you are proven innocent. If we accept these things, (i.e. surveillance,
|
||
raids, seizures, etc.) how much farther will we let them go before we have
|
||
to put them in check?
|
||
|
||
Indeed, it is easy to state that what hackers are doing mandates this
|
||
type of personal infringement. But by all definitions of "personal
|
||
rights", the actions taken by the involved law enforcement agencies in
|
||
Operation Sun Devil go beyond what is democratic and free, and begins to
|
||
step into the formation of a police state. The distribution of information
|
||
is heavily controlled in Communist Russia. As they take steps towards
|
||
democracy with Glasnost, are we also to take steps towards totalitarianism?
|
||
|
||
The media used to play us up to be high-tech folk heroes. With this
|
||
new computer-phobia on the rise, we are the electronic mafia. We, the
|
||
Computer Underground, have no say over this - it has happened. But what
|
||
are we, really? Are we pranksters, attacking in the middle of the night to
|
||
scrawl obscenities in email? Sure, this has happened, and a lot of damage
|
||
has been done both to victim computers as well as to the reputation of the
|
||
Computer Underground as a whole. Are we high-tech hooligans burglarizing
|
||
systems for their valuable data, to sell to the highest bidder? The
|
||
infamous E911 document which was stolen is proof of that. Did the involved
|
||
parties sell that material? Indeed not. They were going to distribute
|
||
that information to the general public. Are we political subversives
|
||
trying to overthrow the government? Indeed not. While some of us may have
|
||
radical political ideas, none of us get tied up in outside government for
|
||
any reason beyond what effects us here (sorry for the broad
|
||
generalization...some of us ARE political subversives...). So, what
|
||
exactly are we trying to do?
|
||
|
||
To go further. To stay online longer. To do more. Not to be able to
|
||
destroy more, but to simply be able to do more on the national networks.
|
||
The end goal of all this hacking, cracking and phreaking is to be able to
|
||
exchange information with people all over the world. This is not always
|
||
economically feasible, so illegal methods have to be employed. How many of
|
||
YOU can say that you would go to any limits to achieve something that you
|
||
wanted? Is this "ambition" a bad thing? Indeed not.
|
||
|
||
Laying judgements down on us doesn't solve a thing. Saying that you
|
||
don't agree with what we do, but you don't like what is being done to us is
|
||
supportive, but you have to make your own judgements in the long run
|
||
anyhow. If you have never done it, then you will never be able to
|
||
understand why we do this.
|
||
|
||
This should about wrap up what I have to say. If you have any comments
|
||
or such, then please mail them to the editors here at CuD.
|
||
|
||
|
||
|
||
-=* Keep the flames burning,
|
||
|
||
AND DON'T LET PHREAKING/HACKING DIE!!! *=-
|
||
|
||
|
||
|
||
... Johnny Yonderboy ...
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.13 / File 3 of 5 ***
|
||
***************************************************************
|
||
|
||
-----------------
|
||
%The contributor of the following requested anonymity%
|
||
------------------
|
||
|
||
|
||
Here is a interesting message I found posted in the Telecom newsgroup on
|
||
USENET today ([* are my comments *]:
|
||
********************************************************************
|
||
|
||
Subject: "Legion of Doom" Indictment Date: 30 May 90 16:42:21 GMT Sender:
|
||
news@accuvax.nwu.edu Organization: TELECOM Digest
|
||
|
||
Computer Consultant Could get 32 Years If Convicted of Source-Code Theft
|
||
|
||
Baltimore - A Middletown, Md., man faces as many as 32 years in prison and
|
||
nearly $1 million in fines if convicted of being involved in the "Legion of
|
||
Doom" nationwide group of Unix computer buffs now facing the wrath of
|
||
federal investigators.
|
||
|
||
[* I thought the LOD was a group interested in all types of computer
|
||
operating systems....I guess now they are Unix gurus *]
|
||
|
||
The U.S. Attorney's Office here on May 15 announced the indictment of
|
||
Leonard Rose, 31, a computer consultant also known as "Terminus," on
|
||
charges that he stole Unix source code from AT&T and distributed two
|
||
"Trojan Horse" programs designed to allow for unauthorized access to
|
||
computer systems. Incidents occurred between May, 1988 and January, 1990,
|
||
according to the indictment.
|
||
|
||
The five-count indictment, handed down by a federal grand jury, charges
|
||
Rose with violations of interstate transportation laws and the federal
|
||
Computer Fraud and Abuse Act. Rose faces as many as 32 years in prison,
|
||
plus a maximum fine of $950,000.
|
||
|
||
He is the third person to be indicted who was accused of being connected
|
||
with the so-called Legion of Doom. Robert J. Riggs, a 21-year-old DeVry
|
||
Institute student from Decatur, Ga., and Craig M. Neidorf, 19, a
|
||
University of Missouri student from Columbia, Mo., also have been indicted.
|
||
|
||
[* This is getting pretty ridiculous about Craig Neidorf being in the LOD,
|
||
he was the editor of Phrack magazine. I guess since security and
|
||
commercial types subscribed to Phrack, he is also part of there
|
||
organizations. Geeshh...I wonder how many groups the editors of CUD
|
||
belong to also based on who their readers are...*]
|
||
|
||
Rose's indictment stemmed from a federal investigation that began in
|
||
Chicago and led investigators to Missouri and Maryland, assistant U.S.
|
||
Attorney David King said. While executing a search warrant in Missouri,
|
||
investigators uncovered evidence Rose was transporting stolen Unix 3.2
|
||
source code, King said. Investigators then obtained a warrant to search
|
||
Rose's computer system and found the stolen source code, King added.
|
||
|
||
He said the Trojan Horse programs were substitutes for a legitimate sign-in
|
||
or log-in program, with a separate shell for collecting user log-ins or
|
||
passwords.
|
||
|
||
[* The question is was he caught using those programs to acquire
|
||
pass-words? Or is this an assumption by the government??? I guess
|
||
writing or having specific public domain programs is against the law.*]
|
||
|
||
"Whoever substituted [the Trojan Horse program] could get passwords to use
|
||
the system any way he or she wanted to," King said.
|
||
|
||
The indictment was a result of a long-term investigation by the U.S. Secret
|
||
Service, and was issued one week after federal authorities raided computer
|
||
systems at 27 sites across the United States. Investigators seized 23,000
|
||
computer disks from suspects accused of being responsible for more than $50
|
||
million in thefts and damages. The Secret Service at that time announced
|
||
that five people have been arrested in February in connection with the
|
||
investigation.
|
||
|
||
King said he was unaware if Rose indictment was related to the raids made
|
||
earlier this month.
|
||
|
||
"We don't just go out and investigate people because we want to throw them
|
||
in jail. We investigate them because they commit an offense. The grand
|
||
jury was satisfied," King said.
|
||
|
||
[* I wonder how many copies (non-site licensed) of software exist in the
|
||
State Office building (ie. Word Perfect, Lotus, etc.) or in the homes of
|
||
the employees. That would be considered illegal. *]
|
||
|
||
The U.S. Attorney's Office said the investigation revealed individuals had
|
||
accessed computers belonging to federal research centers, schools and
|
||
private businesses. King would not name any of the victims involved.
|
||
|
||
Rose was associated with the Legion of Doom and operated his own computer
|
||
system known as Netsys, according to the indictment. His electronic mailing
|
||
address was Netsys!len, the document said.
|
||
|
||
The Legion, according to the indictment, gained fraudulent, unauthorized
|
||
access to computer systems for the purpose of stealing software; stole
|
||
proprietary source code and other information; disseminated information
|
||
about gaining illegal access, and made telephone calls at the expense of
|
||
other people.
|
||
|
||
Well that is the latest in the Summer '90 busts. I just hope that everyone
|
||
arrested by the government receives as fair a deal that Robert Morris
|
||
received for his little prank. Because I doubt Mr. Morris was given
|
||
special treatment because his dad works for the NSA...
|
||
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.13 / File 4 of 5 ***
|
||
***************************************************************
|
||
|
||
*** CRITIQUE OF TELECOM DIGEST'S POSITON ON THE CURRENT BUSTS ***
|
||
(By Emmanuel Goldstein)
|
||
|
||
|
||
=====================
|
||
It's real disturbing to read the comments that have been posted recently on
|
||
Telecom Digest concerning Operation Sun Devil and Mitch Kapor's involvement.
|
||
While I think the moderator has been chastised sufficiently, there are still a
|
||
few remarks I want to make.
|
||
|
||
First of all, I understand the point he was trying to get across. But I think
|
||
he shot from the hip without rationalizing his point first, thereby leaving
|
||
many of us in a kind of stunned silence. If I understand it correctly, the
|
||
argument is: Kapor says he wants to help people that the moderator believes
|
||
are thieves. Therefore, using that logic, it's okay to steal from Kapor.
|
||
|
||
Well, I don't agree. Obviously, Kapor DOESN'T believe these people are
|
||
criminals. Even if one or two of them ARE criminals, he is concerned with all
|
||
of the innocent bystanders that are being victimized here. And make no mistake
|
||
about that - there are many innocent bystanders here. I've spoken to quite a
|
||
few of them. Steve Jackson, Craig Neidorf, the friends and families of people
|
||
who've had armed agents of the federal government storm into their homes and
|
||
offices. It's a very frightening scenario - one that I've been through myself.
|
||
And when it happens there are permanent scars and a fear that never quite
|
||
leaves. For drug dealers, murderers, hardened criminals, it's an acceptable
|
||
price in my view. But a 14 year old kid who doesn't know when to stop
|
||
exploring a computer system? Let's get real. Do we really want to mess up
|
||
someone's life just to send a message?
|
||
|
||
I've been a hacker for a good part of my life. Years ago, I was what you
|
||
would call an "active" hacker, that is, I wandered about on computer systems
|
||
and explored. Throughout it all, I knew it would be wrong to mess up data or
|
||
do something that would cause harm to a system. I was taught to respect
|
||
tangible objects; extending that to encompass intangible objects was not
|
||
very hard to do. And most, if not all, of the people I explored with felt
|
||
the same way. Nobody sold their knowledge. The only profit we got was an
|
||
education that far surpassed any computer class or manual.
|
||
|
||
Eventually, though, I was caught. But fortunately for me, the witch-hunt
|
||
mentality hadn't caught on yet. I cooperated with the authorities, explained
|
||
how the systems I used were flawed, and proved that there was no harm done. I
|
||
had to pay for the computer time I used and if I stayed out of trouble, I
|
||
would have no criminal record. They didn't crush my spirit. And the computers
|
||
I used became more secure. Except for the fear and intimidation that occurred
|
||
during my series of raids, I think I was dealt with fairly.
|
||
|
||
Now I publish a hacker magazine. And in a way, it's an extension of that
|
||
experience. The hackers are able to learn all about many different computer
|
||
and phone systems. And those running the systems, IF THEY ARE SMART, listen
|
||
to what is being said and learn valuable lessons before it's too late.
|
||
Because sooner or later, someone will figure out a way to get in. And you'd
|
||
better hope it's a hacker who can help you figure out ways to improve the
|
||
system and not an ex-employee with a monumental grudge.
|
||
|
||
In all fairness, I've been hacked myself. Someone figured out a way to break
|
||
the code for my answering machine once. Sure, I was angry. At the company.
|
||
They had no conception of what security was. I bought a new machine from a
|
||
different company, but not before letting a lot of people know EXACTLY what
|
||
happened. And I've had people figure out my calling card numbers. This gave
|
||
me firsthand knowledge of the ineptitude of the phone companies. And I used
|
||
to think they understood their own field! My point is: you're only a victim
|
||
if you refuse to learn. If I do something stupid like empty my china cabinet
|
||
on the front lawn and leave it there for three weeks, I don't think many
|
||
people will feel sympathetic if it doesn't quite work out. And I don't think
|
||
we should be sympathetic towards companies and organizations that obviously
|
||
don't know the first thing about security and very often are entrusted with
|
||
important data.
|
||
|
||
The oldest hacker analogy is the walking-in-through-the-front-door-and-
|
||
rummaging-through-my-personal-belongings one. I believe the moderator
|
||
recently asked a critic if he would leave his door unlocked so he could drop
|
||
in and rummage. The one fact that always seems to be missed with this
|
||
analogy is that an individual's belongings are just not interesting to
|
||
someone who simply wants to learn. But they ARE interesting to someone who
|
||
wants to steal. A big corporation's computer system is not interesting to
|
||
someone who wants to steal, UNLESS they have very specific knowledge as to
|
||
how to do this (which eliminates the hacker aspect). But that system is a
|
||
treasure trove for those interested in LEARNING. To those that insist on
|
||
using this old analogy, I say at least be consistent. You wouldn't threaten
|
||
somebody with 30 years in jail for taking something from a house. What's
|
||
especially ironic is that your personal belongings are probably much more
|
||
secure than the data in the nation's largest computer systems!
|
||
|
||
When you refer to hacking as "burglary and theft", as the moderator
|
||
frequently does, it becomes easy to think of these people as hardened
|
||
criminals. But it's just not the case. I don't know any burglars or
|
||
thieves, yet I hang out with an awful lot of hackers. It serves a definite
|
||
purpose to blur the distinction, just as pro-democracy demonstrators are
|
||
referred to as rioters by nervous leaders. Those who have staked a claim
|
||
in the industry fear that the hackers will reveal vulnerabilities in their
|
||
systems that they would just as soon forget about. It would have been very
|
||
easy for Mitch Kapor to join the bandwagon on this. The fact that he
|
||
didn't tells me something about his character. And he's not the only one.
|
||
|
||
Since we published what was, to the best of my knowledge, the first pro-hacker
|
||
article on all of these raids, we've been startled by the intensity of the
|
||
feedback we've gotten. A lot of people are angry, upset, and frightened by
|
||
what the Secret Service is doing. They're speaking out and communicating their
|
||
outrage to other people who we could never have reached. And they've
|
||
apparently had these feelings for some time. Is this the anti-government bias
|
||
our moderator accused another writer of harboring? Hardly. This is America at
|
||
its finest.
|
||
|
||
Emmanuel Goldstein
|
||
Editor, 2600 Magazine - The Hacker Quarterly
|
||
|
||
emmanuel@well.sf.ca.us po box 752, middle island, ny 11953
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.13 / File 5 of 5 ***
|
||
***************************************************************
|
||
|
||
|
||
------------------------------
|
||
|
||
Date: 27 May 90 03:50:07 EDT (Sun)
|
||
From: aha@m-net.ann-arbor.mi.us (Brian Sherwood)
|
||
Subject: Steve Jackson Games & A.B. 3280
|
||
|
||
> Computer Gaming World (Golden Empire Publications)
|
||
> June, 1990, Number 72, Page 8
|
||
> Editorial by Johnny L. Wilson
|
||
|
||
It CAN Happen Here
|
||
|
||
Although Nobel Prize-winning novelist Sinclair Lewis is probably best
|
||
known for 'Main Street', 'Babbitt', 'Elmer Gantry', and 'Arrowsmith', my
|
||
personal favorites are 'It Can't Happen Here' and 'Kingsblood Royal'. The
|
||
latter is an ironic narrative in which who suffers from racial prejudice
|
||
toward the black population discovers, through genealogical research, that
|
||
he himself has black ancestors. The protagonist experienced a
|
||
life-challenging discovery that enabled Lewis to preach a gospel of civil
|
||
rights to his readership.
|
||
|
||
The former is, perhaps, Lewis' most lengthy novel and it tells how a
|
||
radio evangelist was able to use the issues of morality and national
|
||
security to form a national mandate and create a fascist dictatorship in
|
||
the United States. As Lewis showed how patriotic symbolism could be
|
||
distorted by power-hungry elite and religious fervor channeled into a
|
||
political movement, I was personally shaken. As a highschool student,
|
||
reading this novel, for the first time, I suddenly realized what lewis
|
||
intended for his readers to realize. "It" (a dictatorship) really CAN
|
||
happen here, There is an infinitesimally fine line between protecting the
|
||
interests of society and encumbering the freedoms of the self-same society
|
||
in the name of protection.
|
||
|
||
Now it appears that the civil liberties of game designers and gamers
|
||
themselves are to be assaulted in the name of protecting society. In
|
||
recent months two unrelated events have taken place which must make us
|
||
pause: the raiding of Steve Jackson Games' offices by the United States
|
||
Secret Service, and the introduction of A.B. 3280 into the California State
|
||
Assembly by Assemblyperson Tanner.
|
||
|
||
On March 1, 1990, Steve Jackson Games (a small pen and paper game
|
||
company) was raided by agents of the United States Secret Service. The
|
||
raid was allegedly part of an investigation into data piracy and was,
|
||
apparently, related to the latest supplement from SJG entitled, GURPS
|
||
Cyberpunk (GURPS stands for Generic Universal Role-Playing System). GURPS
|
||
Cyberpunk features rules for a game universe analogous to the dark futures
|
||
of George Alec Effinger ('When Gravity Fails'), William Gibson
|
||
('Neuromancer'), Norman Spinrad ('Little Heroes'), Bruce Sterling ('Islands
|
||
in the Net'), and Walter Jon Williams ('Hardwired').
|
||
|
||
GURPS Cyberpunk features character related to breaking into networks and
|
||
phreaking (abusing the telephone system).Hence, certain federal agents are
|
||
reported to have made several disparaging remarks about the game rules
|
||
being a "handbook for computer crime". In the course of the raid (reported
|
||
to have been conducted under the authority of an unsigned photocopy of a
|
||
warrant; at least, such was the only warrant showed to the employees at
|
||
SJG) significant destruction allegedly occurred. A footlocker, as well as
|
||
exterior storage units and cartons, were deliberately forced open even
|
||
though an employee with appropriate keys was present and available to lend
|
||
assistance. In addition, the materials confiscated included: two
|
||
computers, an HP Laserjet II printer, a variety of computer cards and
|
||
parts, and an assortment of commercial software. In all, SJG estimates
|
||
that approximately $10,000 worth of computer hardware and software was
|
||
confiscated.
|
||
|
||
The amorphous nature of the raid is what is most frightening to me. Does
|
||
this raid indicate that those who operate bulletin board systems as
|
||
individuals are at risk for similar raids if someone posts "hacking"
|
||
information on their computer? Or does it indicate that games which
|
||
involve "hacking" are subject to searches and seizures by the federal
|
||
government? Does it indicate that writing about "hacking" exposes one to
|
||
the risk of a raid? It seems that this raid goes over the line of
|
||
protecting society and has, instead, violated the freedom of its citizenry.
|
||
Further facts may indicate that this is not the case, but the first
|
||
impression strongly indicates an abuse of freedom.
|
||
|
||
Then there is the case of California's A.B 3280 which would forbid the
|
||
depiction of any alcohol or tobacco package or container in any video game
|
||
intended primarily for use by minors. The bill makes no distinction
|
||
between positive or negative depiction of alcohol or tobacco, does not
|
||
specify what "primarily designed for" means, and defines 'video game' in
|
||
such a way that coin-ops, dedicated game machines, and computer games can
|
||
all fit within the category.
|
||
|
||
Now the law is, admittedly, intended to help curb the use and abuse of
|
||
alcohol and tobacco among minors. Yet the broad stroke of the brush with
|
||
which it is written limits the dramatic license which can be used to make
|
||
even desirable points in computer games. For example, Chris Crawford's
|
||
'Balance of the Planet' depicts a liquor bottle on a trash heap as part of
|
||
a screen talking about the garbage problem. Does this encourage alcohol
|
||
abuse? In 'Wasteland', one of the encounters involves two winos in an
|
||
alley. Does their use of homemade white lightening commend it to any
|
||
minors that might be playing the game?
|
||
|
||
One of the problems with legislating art is that art is designed to both
|
||
reflect and cast new light and new perspectives on life. As such,
|
||
depiction of any aspect of life may be appropriate, in context.
|
||
Unfortunately for those who want to use the law as a means of enforcing
|
||
morality, laws cannot be written to cover every context.
|
||
|
||
We urge our California readers to oppose A.B. 3280 and help defend our
|
||
basic freedoms. We urge all of our readers to be on the alert for any
|
||
governmental intervention that threatens our freedom of expression. "It"
|
||
not only CAN happen here, but "it" is very likely to if we are not careful.
|
||
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|