887 lines
44 KiB
Plaintext
887 lines
44 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 2, Issue #2.18 (December 28, 1990) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith
|
||
PERIPATETIC GADFLY: Brendan Kehoe
|
||
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission.
|
||
It is assumed that non-personal mail to the moderators may be reprinted
|
||
unless otherwise specified. Readers are encouraged to submit reasoned
|
||
articles relating to the Computer Underground.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
CONTENTS:
|
||
File 1: Moderators' Corner
|
||
File 2: From the Mailbag
|
||
File 3: Computers Under Attack
|
||
File 4: CU Resources in Germany
|
||
File 5: Trade Secrets; When are they Bad?
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #2.18: File 1 of 5: Moderator's corner ***
|
||
********************************************************************
|
||
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
Date: December 28, 1990
|
||
|
||
++++++++++
|
||
In this file:
|
||
1. FTP FILES
|
||
2. RESOURCES OF CU INTEREST
|
||
++++++++++
|
||
|
||
+++++++++++++++++++++
|
||
FTP Files
|
||
+++++++++++++++++++++
|
||
|
||
The FTP archives are steadily growing. They include Network Information
|
||
Access (NIA), a few new CU magazines, and a variety of computer crime
|
||
statutes (state, federal, foreign), and a few new papers written by law
|
||
students and attorneys. Thanks to all those who send material along. If you
|
||
submit a long paper (20 pages or more), please be sure the format is
|
||
complete (biblio and footnotes not excluded if cited in the text) and line
|
||
length is not over 80 characters per line. Papers should be of publishable
|
||
quality and not simply stream-of-consciousness opinion. If you're not sure
|
||
if your paper is appropriate, send it along anyway. Papers should be timely
|
||
or of historical/archival value, and not something you happened across on a
|
||
BBS somewhere that is dated.
|
||
|
||
--------------------
|
||
Resources Worth Looking At
|
||
--------------------
|
||
|
||
There are a number of first-rate resources available on the nets for
|
||
computerists of all stripes. Among those of particular value include:
|
||
|
||
1. TAP MAGAZINE: TAP contains a variety of information and can be obtained
|
||
for only a postage stamp for each issue from:
|
||
TAP
|
||
PO Box 20264
|
||
Louisville, KY 40250
|
||
|
||
2. 2600 Magazine: 2600 covers a broad range of topics, ranging from
|
||
technical material to political analysis. It is published quarterly in
|
||
hardcopy format. It also holds periodic meetings and is an excellent
|
||
resource for information of relevance to a variety of interests. 2600
|
||
Magazine can be reached at:
|
||
|
||
2600@well.sf.ca.us OR
|
||
2600 EDITORIAL DEPARTMENT
|
||
P.O. BOX 99,
|
||
MIDDLE ISLAND, NY 11953
|
||
|
||
3. EFF DIGEST: The Electronic Frontier Foundation's first issue of EFF
|
||
Digest is out, and it is essential reading for those keeping up with the
|
||
the specifics of EFF activity as well as for following legal cases and
|
||
other issues affecting the computer world. The first issue provides a
|
||
detailed summary of the EFF goals and activities to date.
|
||
E-mail subscription requests: effnews-request@eff.org
|
||
Editorial submissions: effnews@eff.org
|
||
Or:
|
||
Electronic Frontier Foundation
|
||
155 Second St.
|
||
Cambridge, MA 02141
|
||
(617) 864-0665
|
||
(617) 864-0866 (fax)
|
||
|
||
4. BMUG (Berkeley Macintosh Users' Group) Magazine: Don't be deceived by
|
||
the name. BMUG contains a variety of articles relevant to all computerists
|
||
and is well worth reading. The Fall/Winter 1990 issue of the BMUG
|
||
newsletter will be available as of February, 1991. Cost is $25 (comes with
|
||
6 month BMUG membership). To subscribe, call BMUG at (415) 549-BMUG.
|
||
|
||
5. PHRACK CLASSIC: What can we say? Contact them at pc@well.sf.ca.us
|
||
|
||
6. TELECOM DIGEST: TCD, edited by Pat Townson, focuses primarily on telecom
|
||
issues of all kinds (technical, legal, rumor, facts, news articles). During
|
||
a period of hot topics, several issues can come out in a day. Pat chases
|
||
down rumors, keeps posts relevant, and has established TCD as the premier
|
||
e-mail source for telecom information. There is also an ftp site for back
|
||
issues. To subscribe, contact:
|
||
telecom@eecs.nwu.edu
|
||
|
||
7. NIA: Network Information Access, although fairly new, has published 68
|
||
issues to date. The first issues were relative short, but, beginning with
|
||
#68, the issues will be longer and provide a variety of detailed technical
|
||
and other information. For more information, drop a note to:
|
||
elisem@nuchcat.sccsi.com
|
||
|
||
8. NEWSBYTES: The Newsbytes News Network is an electronic news service
|
||
dealing solely with technology issues. It is published daily on GEnie and
|
||
is available in a semi-weekly format on Dialog, America On-Line, NewsNet
|
||
and a Japanese newsnetwork. Excerpts are also downloaded for publication
|
||
by Newspapers throughout the country (such as Computer Currents). The
|
||
service is international and has bureaus from Moscow to Sydney, Australia.
|
||
For more information, contact: mcmullen@well.sf.ca.us; CompuServe -
|
||
70210,172; GEnie - nb.nyc; AppleLink -- x1888 and MCI - 316-9687 with any
|
||
comments or additions.
|
||
|
||
There are other good resources out there, and we will include them in
|
||
future issues. There are also a number of good BBSs with extensive
|
||
collections of text files or discussion sections (Ripco, The Well, The
|
||
Works, Face-to-Face), and we will list a few of them next month. If you
|
||
know of exceptional boards worth mentioning, pass the names and numbers
|
||
along.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Various
|
||
Subject: From the Mailbag
|
||
Date: December 28, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.18: File 2 of 5: From the Mailbag ***
|
||
********************************************************************
|
||
|
||
From: Carrier Wave <MERCURY@LCC.EDU>
|
||
Subject: Operation Sun Devil and Ayn Rand
|
||
To: TK0JUT1%NIU.BITNET@UICVM.UIC.EDU
|
||
Date: Fri, 21 Dec 90 09:15 EST
|
||
|
||
Operation Sun Devil and
|
||
Ayn Rand's Theory of "The Sanction of the Victim"
|
||
by Michael E. Marotta, mercury@well.sf.ca.us
|
||
|
||
Arthur Koestler's novel, Darkness at Noon, tells of the downfall of a
|
||
Bolshevik. He is purged by the party, charged with conspiring to
|
||
assassinate Stalin. Of course, he did no such thing, but he soon comes
|
||
to understand the needs of his captors. As a Bolshevik, he knows the
|
||
theory of the centralized democracy and he comes to understand that
|
||
merely questioning authority is no different than a physical assault on
|
||
the Leader. The operant theory in this true-to-life example was later
|
||
enunciated by Ayn Rand in her novel, Atlas Shrugged. She called it
|
||
"The Sanction of the Victim."
|
||
|
||
In Atlas Shrugged, the heroes are engineers and investors who learn to
|
||
reject mysticism, altruism and collectivism. They learn to be proud of
|
||
their own achievements. They identify and reconcile the contradictions
|
||
that tore them apart and allowed them to be regulated, ruled, taxed and
|
||
vilified. One of the highlights of this novel is the trial of Hank
|
||
Rearden, a steel industrialist who violated an equalization of opportunity
|
||
law. He tells the court that it can sentence him to anything and he is
|
||
powerless to prevent that but he will not help them by participating. He
|
||
does not recognize their right to try him and he will not help them pretend
|
||
that the trial is just. He is acquitted.
|
||
|
||
If this seems too unreal, consider the case of Craig Neidorf in Chicago and
|
||
compare it to the trials of the Legion of Doom in Atlanta. Neidorf stood
|
||
his ground, prepared a First Amendment defense and asked for help from the
|
||
pioneers on the electronic frontier. The government dropped its charges.
|
||
In Atlanta, the hackers co-operated with the government, informed on each
|
||
other and even testified against Craig Neidorf and they were sentenced to
|
||
prison. Neidorf incurred legal expenses near $250,000. This is also about
|
||
the size of the fines to be paid by each of the LoD hackers in Atlanta.
|
||
The difference, of course, is that Neidorf is free and they are in jail.
|
||
|
||
The decision to go to trial rested on the premise that Right makes Might.
|
||
Niedorf prepared a First Amendment argument. In point of fact, victory
|
||
hinged on the demolition of the government's evidence. A suitable defense
|
||
could have been created from any perspective. The First Amendment is a
|
||
broad shield that protects religion, speech and assembly in addition to
|
||
writing. The Tenth Amendment guarantees all those necessary and proper
|
||
rights enjoyed by the people that are not specifically enumerated in the
|
||
Bill of Rights. Niedorf could have claimed that he was performing a
|
||
challenge commanded of him by the Gods of Olympus. What counted most is
|
||
that he felt that his accusers were morally wrong.
|
||
|
||
The Legion of Doom went down the drain in Atlanta because they granted the
|
||
moral high ground to the government. They were wrong in their own eyes and
|
||
they deserved punishment by their own standards. Their viewpoint and their
|
||
standards were the same as the government's.
|
||
|
||
The question then becomes: Is hacking right? Unless you want to go to
|
||
jail, you better find a lot of reasons to believe that it is.
|
||
|
||
+++++++++++++++++++++++++
|
||
|
||
From: gnu@TOAD.COM
|
||
Subject: Re: "strangers probing for security flaws" -- another view
|
||
Date: Fri, 21 Dec 90 13:11:14 -0800
|
||
|
||
Given the existing state of computer security (i.e. it requires excessive
|
||
care by a system administrator to make a system more than nominally
|
||
secure), I think that whatever automation we can bring to bear on security
|
||
testing is welcome.
|
||
|
||
Suppose there was a free program, available in source code and scrutinized
|
||
by wizards all over the net, that you could run to test your security. If
|
||
you had the time, you might run it and fix up the things it found. If you
|
||
didn't have the time, those things would probably go unfixed.
|
||
|
||
If someone at a remote site (Italy?) volunteers to run such a program and
|
||
mail you the results as they pertain to your site, are they performing you
|
||
a service or a disservice? I don't know about you, but when a stranger
|
||
knocks at my door to tell me that I left my garage door gaping wide open
|
||
and the neighborhood hoods are eyeing my bicycles, I usually thank her
|
||
rather than knocking her down and calling the police. Then I go and fix
|
||
the garage door.
|
||
|
||
If the stranger had taken a few bicycles before coming and telling me about
|
||
the problem, that would be different. But even that is preferable to their
|
||
stealing the bicycles and not even telling me I had a problem.
|
||
|
||
Sites all over the Internet *are* being probed by people who want to do
|
||
them harm. We know this as a fact. I would prefer if we had some
|
||
volunteer "cop on the beat"s who would walk by periodically and rattle the
|
||
door to make sure it's locked.
|
||
|
||
John
|
||
|
||
++++++++++++++++++++++++++
|
||
|
||
From: snowgoose!@UUNET.UU.NET
|
||
Date: Mon, 17 Dec 90 16:16:00 -0500
|
||
Subject: Is Technology Beyond the Law?
|
||
|
||
Is Technology Beyond the Law?
|
||
|
||
There are many factors which shape events like Operation Sun Devil.
|
||
Certainly mission, political mandate, public perception, and human frailty
|
||
are forces which shaped the behavior of the Secret Service. But, the
|
||
juxtaposition of technology and the law may well be the most significant
|
||
factor.
|
||
|
||
Law is (or at least, is supposed to be) a reflection of the needs of
|
||
society for definition of and protection of its interests. Technology
|
||
presents rapidly changing circumstances with which the law, because the
|
||
people, cannot keep abreast. Technology is, and will always be, beyond the
|
||
law?
|
||
|
||
Now, I'm not a lawyer, and I haven't got a clue of how to conceptualize
|
||
this under the law, but consider the following:
|
||
|
||
One day, the Secret Service shows up at my door with a search warrant to
|
||
seize and search my computer for incriminating evidence. They get my
|
||
computer back to their lab and discover that the entire hard disk is
|
||
encrypted, (probably block by block). Upon further examination, they find
|
||
either an encryption card or a software encryption routine in the disk
|
||
driver. I'm not going to give them the key. I have used a sufficiently
|
||
difficult encryption technique as to frustrate even the NSA. Where does
|
||
that leave their investigation? Where does that leave my computer?
|
||
|
||
Is there a concept in the law which requires that a law must be
|
||
enforceable? If so, isn't investigation an enforcement procedure? If so,
|
||
and if the law isn't enforceable, what happens to my computer with its
|
||
encrypted disk?
|
||
|
||
I have intentionally exaggerated the technical circumstances to raise the
|
||
question, but it seems to me that the same situation exists today. The
|
||
Secret Service has had 40+ computers and 23,000? disks since their seizure
|
||
on May 8th, 1990. If we assume that the Secret Service has procedures
|
||
(methods and techniques) for using the seized property in their
|
||
investigation, then is there a time limit on how long the investigation
|
||
can continue? If it could be demonstrated that there were *no* procedures
|
||
for using the seized property in furtherance of the investigation, would
|
||
they have a right to have seized it?
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 6 Dec 90 15:00:32 PST
|
||
From: Peter Denning <pjd@riacs.edu>
|
||
Subject: Computers Under Attack
|
||
|
||
********************************************************************
|
||
*** CuD #2.18: File 3 of 5: Computers Under Attack ***
|
||
********************************************************************
|
||
|
||
COMPUTERS UNDER ATTACK
|
||
Intruders, Worms, and Viruses
|
||
Edited by Peter J. Denning
|
||
ACM Press and Addison-Wesley, 1990, 554pp
|
||
$18.50 ACM members, $20.50 others
|
||
|
||
On behalf of ACM Press and the authors of the 38 articles brought together
|
||
in this edition, I am proud to announce that our book on the subject of
|
||
attacks on computers is now available.
|
||
|
||
This subject continues to receive ongoing attention in the national press
|
||
--for example, the recent discovery of $12M of toll fraud at the NASA
|
||
Johnson Space Center, Operation Sun Devil, an Esquire article about
|
||
computer pirates breaking in to the Bell System, and the recent splashy
|
||
appearance of the NRC report, "Computers at Risk".
|
||
|
||
The purpose of this book is to tell the story of attacks on computers in
|
||
the words of those who are making the story and who see the broad
|
||
perspective in which it is taking place. We have painstakingly selected
|
||
the articles and have provided connective material to bring out the global
|
||
context and show that the problem is not purely technology, not purely
|
||
people, but a product of the interaction between people and computers in a
|
||
growing worldwide network.
|
||
|
||
After and introduction and preface by me, the articles are arranged in six
|
||
parts. Most of these have been previously published, but there are a few
|
||
new pieces specifically commissioned for this volume.
|
||
|
||
PART I: THE WORLDWIDE NETWORK OF COMPUTERS
|
||
|
||
Worldnet and ARPANET by Denning, overview of networks by Quarterman,
|
||
reflections by Thompson, survey of computer insecurities by Witten.
|
||
|
||
PART II: INTRUDERS
|
||
|
||
Reflections by Reid, Wily hacker story by Stoll, a followup commentary by
|
||
Mandel, and a business perspective by Wilkes.
|
||
|
||
PART III: WORMS
|
||
|
||
Internet worm overview by Denning, perspectives on the Morris worm by MIT's
|
||
Rochlis et al, Purdue's Spafford, and Utah's Seeley, executive summary of
|
||
Cornell Report, Morris indictment and trial summary by Montz, original worm
|
||
paper by Shoch and Hupp.
|
||
|
||
PART IV: VIRUSES
|
||
|
||
Virus overview by Denning, BRAIN and other virus operation by Highland,
|
||
virus primer by Spafford et al, viral protection in MS/DOS by Brothers, and
|
||
a perspective on viruses by Cohen.
|
||
|
||
PART V: COUNTERCULTURES
|
||
|
||
Computer property rights by Stallman, cyberspace literature by Paul Saffo,
|
||
a dialog on hacking and security by Dorothy Denning and Frank Drake.
|
||
|
||
PART VI: SOCIAL, LEGAL, AND ETHICAL IMPLICATIONS
|
||
|
||
A spectrum of commentaries: moral clarity and sending a signal by Denning,
|
||
global city by Morris, virus bills in congress by Crawford, GAO report
|
||
summary, legal issues by Samuelson and by Gemingani, computer emergency
|
||
response by Scherlis et al, ethics statements by various organizations, ACM
|
||
President's letters by Kocher, ACM forum letters, law and order for the PC
|
||
by Director, RISKS perspectives by Neumann, crimoids by Parker.
|
||
|
||
To order the book, run to your local bookstore or call ACM Press Order
|
||
Department. For credit card orders only call 800-342-6626 or in
|
||
Maryland and outside the continental US call 301-528-4261 and for mail
|
||
orders ACM Order Department, P. O. Box 64145, Baltimore, MD 21264. The
|
||
price for ACM members is $18.50 and for nonmembers $20.50. Shipping is
|
||
extra unless you send a check to the order department. BE SURE TO INCLUDE
|
||
YOUR ACM MEMBER NUMBER AND THE BOOK ORDER NUMBER (706900).
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: "Martin Huber" <martin@EE.UNI-SB.DE>
|
||
Subject: CU Resources in Germany
|
||
Date: Fri, 14 Dec 90 04:29:59 +0100
|
||
|
||
********************************************************************
|
||
*** CuD #2.18: File 4 of 5: CU Resources in Germany ***
|
||
********************************************************************
|
||
|
||
%Moderators' note: We in the U.S. tend to be rather insular and often think
|
||
of the CU world as limited to the 48 contiguous states. We are constantly
|
||
reminded by cybernauts elsewhere that we should be more aggressive in
|
||
recognizing that cyberspace is non-territorial. There are numerous articles
|
||
and newsbits out there that we don't often see because of language
|
||
barriers. We *STRONGLY ENCOURAGE* readers fluent in other languages to
|
||
either send over translations or send summaries of various news stories.
|
||
In addition to their general interest, we are finding that scholars, law
|
||
students, and others find this information quite helpful. Thanks to Martin
|
||
for sending the following over. When we spoke with him, he indicated that
|
||
there is considerable activity in Europe that we neglect here in the U.S.,
|
||
and he uses a comment in Pat Townson's Telecom Digest to segue into the
|
||
discussion%.
|
||
|
||
*******************
|
||
|
||
In article <15334@accuvax.nwu.edu> (of Telecom Digest the
|
||
moderator writes):
|
||
>
|
||
>Len Rose is beginning to prepare for his defense in Baltimore in
|
||
>February. He is looking for Unix experts/gurus who would be willing to
|
||
>provide general technical testimony about Unix. If anybody is willing
|
||
>to consider it, or can provide the names of others who might be
|
||
>willing, call Len at: (708) 527-xxxx.
|
||
>
|
||
>
|
||
>Jim Thomas
|
||
>Computer Underground Digest
|
||
>
|
||
>
|
||
>[Moderator's Note: Poor Len. He's a great subject-candidate for the
|
||
>old negro spiritual song, "Nobody Knows the Trouble I've Seen". PAT]
|
||
|
||
I'll side with PAT and Len (although i didn't notice what he did, but today
|
||
a seemingly funny hack can become a ghostly nightmare real fast). Please
|
||
understand that i do not side my criminal activities, but IMHO mostly the
|
||
wrong people get caught. The real criminals nearly get away with it.
|
||
|
||
Me, i can't give him help (other than moral one). But there are some guys
|
||
here in Germany who should be able to help with real expertise on any kinds
|
||
of hacks (phone, modem, nets, UNIX boxes, other). They are called CCC
|
||
(Chaos Computer Club). Their head has been charged with breaking into some
|
||
kind of NATO network (can't remember details, ask them how it went out). I
|
||
think they won or got a vote of confidence and a slight punishment because
|
||
of having alerted security people about the possibility of the hack. Again,
|
||
to state my opinion: They don't inquire into secrets in order to steal
|
||
something/rob some bank/whatever, but merely want to enwiden their
|
||
knowledge and try to pass information to others. (See below). Oh sh..... .
|
||
Can't find any of their documents in my bureau. Let me try to squeeze my
|
||
brain:
|
||
|
||
Organization: "Chaos Computer Club"
|
||
Contact: ??????? - they all have lots of nicknames
|
||
City: "DW-2000 Hamburg"
|
||
Country: "Germany"
|
||
|
||
Check like 1-3 year old infos on the famous NATO hack. Names should appear
|
||
there. I'll be searching back home and try to come up with more info ASAP.
|
||
|
||
Maybe a secondary contact in Hannover will help: This is a german computer
|
||
magazine called "c't". It is a full-fledged computer magazine for mostly
|
||
small computers and UNIX systems. The spectrum of articles ranges from
|
||
problems in information theory over product reviews, hard- und software
|
||
tests, source code listings in different languages to science-fiction
|
||
stories. They regularly feature editorials on hacking, law problems and
|
||
such and are at the approximate level of expertise as BYTE is in the US (in
|
||
fact, the magazines cooperate). [Of course, professional level in germany
|
||
is in general not as high as in the US (the states are much larger and thus
|
||
have more experts), but in science Germany is competitive.] In their
|
||
January 1991 issue (no kidding, it appears in the mid of December!) they
|
||
published a report on a sociological study on computer freaks which was
|
||
carried out by a german university (Univ. of Trier). In the following,
|
||
i'll give some quotations (transliterated to English):
|
||
[Note that this is done with no regard to copyright issues, i don't know
|
||
what position c't has regarding such matters, but i think it is perfectly
|
||
o.k. to translate something while crediting it to the original author. As
|
||
for publishing, you have my allowance to publish the english summary as
|
||
long as c't or the author is not affected by this move]
|
||
|
||
ARTICLE: "c't, Jan. 1990, p.44-46"
|
||
AUTHOR: "Claudia Schmidt" [Can't find her listed on the
|
||
publisher staff, seems to be an invited article, i bet she is
|
||
from the research group]
|
||
TITLE: Viele Vorurteile - Computerfreaks im Licht der Soziologie
|
||
[ premonitions abound - computer freaks seen from a sociologist's
|
||
point of view ]
|
||
|
||
The article starts:
|
||
"In a study sponsored by the Department of the Interior of the FRG
|
||
a group of scientists from the University of Trier tried to find
|
||
access to the world of computer freaks. The sociologists wanted
|
||
to gain a fundamental platform for the assessment of computer
|
||
technology und to unemotionalize the discussion on it.
|
||
Wherever computing centers are, young alert people with rugged
|
||
hair and deep-set eyes can be seen in front of computer consoles;
|
||
their arms are bent und their hands seem to be waiting for hitting
|
||
the buttons of their keyboards which they watch with the same inten-
|
||
sity a gambler watches the rooling dices. Seemingly more relaxed
|
||
they sit at desks loaded with computer listings and meditate like
|
||
scientists over cabalistic treats ....
|
||
This statement dating back to 1977 clearly demonstrates the
|
||
premonitions which usually are ascribed to computer freaks[1].
|
||
'Pseudo-empirical criticism on culture, mythos-conserving hearsay!'
|
||
it is termed by the authors of a 300-page report of the University
|
||
of Trier[2]. People are adopting fancy images [of freaks] all too
|
||
eagerly: most of the statements suffer from a pseudo-scientific
|
||
method of 'associative reasoning', the scientists claim ...
|
||
The sociologists visited the Chaos Communication Congress 1989
|
||
in Hamburg, ..., 'in order to get a lasting impression of the
|
||
productivity aspects of computer social life' and tested personal
|
||
attitudes of [computer] freaks in meetings with several [computer]
|
||
clubs. After field work, 62 interviews of 1 - 2 hours duration
|
||
complimented by 15 interviews gained from interviews on a BBS
|
||
were to be evaluated.
|
||
|
||
[A description of a typical freak's school and college time follows
|
||
(boring classrooms for under-rated geniuses), including the treat-
|
||
ment of the early attraction of a typical freak towards technology.
|
||
An interesting bynote states that women tend to exclude the computer
|
||
of their private live and they are said to 'be afraid to destroy
|
||
something'.
|
||
The next paragraph follows the growth of a juvenile freak to
|
||
a competent and professional specialist: ]
|
||
Evolution:
|
||
... [freaks], according to the scientists can be separated into
|
||
the classes of 'hackers', 'players', 'programmers', 'crackers' and
|
||
'crashers'.
|
||
Freaks want to use all capabilities of their machines. A high
|
||
degree of professionalism and competence, in general specialist's
|
||
knowledge, gives the benefits of good standing, being recognized
|
||
and admired among fellow professionals.
|
||
The research group noticed that the rapid evolution of technology
|
||
posed a problem. Social sciences always lag behind in assessment
|
||
of new technologies and hust helplessly see a new wave of technology
|
||
coming just as they finished evaluating it's predecessors.
|
||
Lots of questions:
|
||
The only solution to this problem is to tend towards dampening
|
||
critical opinions: Of course the freak is working all alone ...
|
||
in front of his computer, but - does he not communicate with
|
||
fellow freaks over [computer] nets?
|
||
A computer demands clear and concise commands, it cannot handle
|
||
ambiguous statements found in everyday's speech. Under the assumption
|
||
that a broad knowledge of speech is correlated with intellectual
|
||
capabilities, a person who has to adopt his syntactical capability
|
||
to abbreviations fitting a machine is in danger! ... the programming
|
||
paradigm could influence life style towards thinking in rational
|
||
terms only.
|
||
Lone guys:
|
||
On the other hand, there is a thesis that computerization is
|
||
not the reason but the effect of a culture adoring reasoning, and
|
||
that the computer is only fulfilling the wishes of men leaning
|
||
towards a technical zivilisation. ...
|
||
With the impact of lots of new media at home and at work, can
|
||
we see an 'impersonalization of learning', will the real world
|
||
be substituted by a made-up world, which is a secure place to flee
|
||
to? ... Or is this world of synthetic images the expression of a
|
||
desire to create new and singular scenarios, stimulating creativity
|
||
and emotionality in the freaks? Is not today's world by a much
|
||
higher degree plagued by rationalism and lack of emotions compared
|
||
to the computerist's world?
|
||
Summa summarum:
|
||
For public discussion, the scientists drew the following
|
||
conclusions: Since the computer is a well-known part of today's
|
||
work, it is useful for several different specialisations. To the
|
||
freak, it has become a natural part of his live and he spends a
|
||
substantial amount of time and money on it.
|
||
Only people with adequate knowledge can use a computer. A
|
||
broad knowledge of information science is indispensable for a
|
||
freak. His main method of learning is autodidactic. ... The
|
||
'process of auto-professionalisation' is found across all
|
||
social and professional levels.
|
||
Those activities do not tend to neglect leisure-time acti-
|
||
vities. Electronic media are very important, whereas books
|
||
are not so important (with the exception of cs books). Data
|
||
nets created a renaissance of the art of writing letters.
|
||
Computer freaks are not biased towards technology. From
|
||
their intimate knowledge of systems and their limitations,
|
||
their [the freaks] opinions are well balanced and often two-
|
||
sided. Dangers are seen mainly in big uncontrollable systems.
|
||
Contours of the information age of tomorrow are seen as changing
|
||
and not subject to forecast or planning in a deterministic way.
|
||
Methods of learning und practical work show a high degree
|
||
of personal autonomy. New forms of self-controlled and self-
|
||
confident use of communication medias are evolving hand in hand
|
||
with a culture which does not need federal regulations
|
||
(e.g. in form of laws). [because they are self-regulating, i
|
||
can't resist to make my point here]
|
||
The authors close with a proposal to the ministry of the
|
||
interior to inquire into the usefulness of computerclubs and
|
||
groups of hackers as critics of media, similar to the
|
||
function of ecologist's associations in environment.
|
||
[ The article closes with the perfectly natural observation
|
||
that the degree of weirdness and fanaticism does not vary
|
||
between philanthropists, hobby astrologicians and computer
|
||
freaks ]
|
||
|
||
[1] J. Weizenbaum, Die Macht der Computer und die Ohnmacht der Vernunft,
|
||
Frankfurt/a.M., 1977, p.160
|
||
[The power of computers and the impotence of common sense]
|
||
|
||
[2] R. Eckert et al., Im Schatten der Computer-Mythen. Zur kulturellen
|
||
Praxis und den Spezialkulturen von Hackern, Programmierern,
|
||
Crackern und Spielern. Eine ethnografische Untersuchung, Trier,
|
||
[In the twilight of computer myths. On the cultural praxis and the
|
||
specialized cultures of hackers, programmers, crackers and players.
|
||
An ethnografical study]
|
||
|
||
In the following some more citations from "c't", quoted from the
|
||
indices:
|
||
- c't,October 1990,Rechtliche Rahmenbedingungen fuer die Mailbox
|
||
[ Juristical Framework for BBS ]
|
||
|
||
- c't,February 1990,Es geht um Milliarden - Niederlage der Post in einem
|
||
Modem-Prozess
|
||
[ billions on stake - telco looses lawsuit concerning modems ]
|
||
|
||
- c't,May 1989,Hackordnung - Wann wird das Strafrecht fuer Datenreisende
|
||
zur Falle?
|
||
[ hacker's laws - when do hackers get trapped in penal law? ]
|
||
* This is written by a lawyer and treates the relationship *
|
||
* between german penal law and hacker's activities. - excellent. *
|
||
|
||
- c't,July 1988,Latente Bedrohung - Ueber die Verletzlichkeit der
|
||
Informationsgesellschaft
|
||
[ sleeping danger - about the vulnerability of information culture ]
|
||
* This is an interview with Prof. Dr. Klaus Brunnstein, Univ. of
|
||
* Hamburg, Inst. for applied computer science. He is specialising
|
||
* in the field of computer crimes and the security of computer systems
|
||
* Maybe a candidate for expert opinion?
|
||
|
||
The publishing company is:
|
||
"Verlag Heinz Heise GmbH"
|
||
"Postfach 610407"
|
||
"DW-3000 Hannover 61"
|
||
Tel. ++49/511/54747-10 (PBX with direct)
|
||
Fax ++49/511/54747-33 (call extensions)
|
||
The editor is:
|
||
"Christian Persson" extension -10
|
||
The vice editors are:
|
||
"Andreas Burgwitz" extension -12
|
||
"Detlef Grell", MSEE extension -13
|
||
They are reachable on "CosmoNet":
|
||
T. ++49/511/555398 300 Baud [ In fact, i think it is *their* BBS
|
||
T. ++49/511/555392 300 Baud ask PAT or other netlanders for
|
||
T. ++49/511/555686 1200 Baud more info. CosmoNet is well used in
|
||
T. ++49/511/555630 1200 Baud Germany, maybe even Europe ]
|
||
T. ++49/511/555302 2400 Baud
|
||
Datex-P NUA: 45511090835 [ This is the german packet switching
|
||
network. I have no idea of how to
|
||
access it from overseas, but a friend of mine working in CA, USA
|
||
should know it. If you need an european mail feed for this, i have
|
||
access (in principle) to internet, bitnet, uucp and thus should be
|
||
able to reach every german host. However, the transition from
|
||
%internet,bitnet,uucp% to e.g. CosmoNet is newland for me. ]
|
||
|
||
I'll stop here. I have all of the cited articles in my bookshelf.
|
||
I have a FAX and a copier around. So if Len wants to have some, he
|
||
should phone / FAX / mail me. Of course, translations are better to
|
||
be done by somebody which is a native english speaker. I can help
|
||
with nasty german sentences, no problem (with lightspeed communication?
|
||
- never!). Anyway, i'll help what i can, sticking to the old prin-
|
||
ciple: in dubio pro reo.
|
||
--
|
||
/---------------------------------
|
||
Martin / Martin Huber %
|
||
%----------------------------/ Univ. of Saarland %
|
||
%email: mahu@ee.uni-sb.de Dept. of Electr. Eng. %
|
||
%Tel: ++49/681/302-3574 D-66 Saarbruecken 11 %
|
||
%FAX: ++49/681/302-2678 Germany %
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Dark Adept (Ripco-312-528-5020)
|
||
Subject: Trade Secrets; When are they Bad?
|
||
Date: Sat, 1 Dec 90 1:38:06 CST
|
||
|
||
********************************************************************
|
||
*** CuD #2.18: File 5 of 5: Trade Secrets: When are they Bad? ***
|
||
********************************************************************
|
||
|
||
Trade Secrets: When are they bad?
|
||
|
||
by
|
||
|
||
The Dark Adept
|
||
|
||
|
||
A trade secret is a method or procedure or information used by a company to
|
||
obtain profit. The law protects trade secrets through copyrighting and
|
||
patenting and various other laws. The main reason a company protects this
|
||
type of information is to stop competitors from producing the same product
|
||
thereby taking away from its profits. The main reason the government
|
||
protects the rights of the company to protect this information is to
|
||
promote innovation and progress (at least according to the U.S.
|
||
Constitution). But, there are times when copyrighting and patenting reduce
|
||
profits and restrict progress and innovation.
|
||
|
||
|
||
The User Interface
|
||
==================
|
||
|
||
One of the most important aspects of a computer program is the user
|
||
interface (the way in which the user is allowed to interact with the
|
||
computer). Ideally, a program should be able to perform complex tasks and
|
||
remain user-friendly. However, the user interface does not affect the way
|
||
in which the program completes its task. Two different programs with the
|
||
same user interface can perform the same task in two different ways. One
|
||
might be better or faster at the task than the other. Conversely, two
|
||
programs that perform different tasks may have the same user interface.
|
||
The point is that the user interface is generic. It can be applied to many
|
||
different programs without changing the value of the program. It merely
|
||
enhances or detracts from the program.
|
||
|
||
In the same way, the user interface of any product does not change the
|
||
integral operation of the product. Take the automobile, for example.
|
||
In all automobiles the user interface is the same. There is a wheel you
|
||
turn for direction. There are pedals on the floor to control speed, etc.
|
||
The quality of the automobiles are not judged for value by the user
|
||
interface, but by how the automobile responds to input from the user.
|
||
How fast it goes, how durable it is, etc., these are the qualities by how
|
||
an automobile is selected for purchase, and not by the fact that it has
|
||
a steering wheel. One may take this analogy further by comparing automatic
|
||
transmissions against stick-shifts. Neither changes the performance of the
|
||
car in a radical way. A purchaser selects automatic or manual as a matter
|
||
of either aesthetic preference or familiarity. If the buyer prefers stick
|
||
over automatic, but the car with the stick is way behind the automatic
|
||
in terms of performance, he would generally choose the automatic since he
|
||
is buying the car to perform a task. The way the car performs the task
|
||
is more important than how he tells the car to perform the task as long as
|
||
both are equally intelligible to the car.
|
||
|
||
Can you see the point I am trying to make? A program can work either through
|
||
a command line interface, a key-stroke interface, or a GUI (Graphic User
|
||
Interface). None of these change the performance of the program to any
|
||
great extent. They merely change the aesthetics and the ease of use. The
|
||
interface should not be allowed to be protected under law. To do so would
|
||
interfere with innovation and progress without conclusively affecting the
|
||
profits of a company. If company A holds the rights to the best interface,
|
||
but their program is worthless, then company B will still make more profit.
|
||
If it is truly the best interface possible, then progress would be slowed
|
||
since people would have to learn many different types of interfaces to go
|
||
from one program to another. Clearly, it would be in the interest of all
|
||
concerned to leave the interface open for public usage and only protect
|
||
the code behind the interface.
|
||
|
||
Algorithms
|
||
==========
|
||
|
||
To protect an algorithm is to, in effect, copyright a mathematical equation.
|
||
Since all algorithms reduce down to a mathematical model, that model would
|
||
not be able to be implemented except by whoever holds the rights. This
|
||
would greatly reduce the productivity of mathematicians. Imagine if
|
||
someone patented Integral Calculus. Don't laugh. IC is an algorithm
|
||
like any other. It is a solution to a problem. Or what if someone
|
||
patented the internal combustion engine? Most of us would be walking.
|
||
But like the engine, it is not the algorithm of the engine that is important,
|
||
but how it is implemented. All engines work on the same basic principle, but
|
||
they do so differently. This is why one engine works better than the other.
|
||
This is why a buyer would choose one engine over another.
|
||
|
||
|
||
Source Code
|
||
===========
|
||
|
||
While source code should generally be protected, there are times when it
|
||
may be more profitable to a company to release either the source code or
|
||
important information pertaining to it. A prime example is IBM and Apple.
|
||
Apple chose to keep their operating system under close wraps. IBM, in their
|
||
usual wisdom, chose to let some of it fly. This caused the market to be
|
||
flooded with "clone" PC's. Given a choice, most people bought PC's or
|
||
PC-compatibles. This generated more third-party support and even higher
|
||
sales. What is the best selling computer today? You got it. Who
|
||
practically sets the standard for every computer that comes out today? Good
|
||
guess. While some may say that IBM could have made more money if they
|
||
had not released the information, I grant you that. But, IBM has something
|
||
that Apple does not: insured existance. There is no way that IBM could
|
||
be jettisoned from the marketplace. IBM has insured that they will exist
|
||
long after Apple closes its doors. All they have to do is keep putting
|
||
out downward compatible products and people will continue to buy PC's.
|
||
|
||
|
||
The Hacker Ethic Vs. The Business Ethic
|
||
=======================================
|
||
|
||
Hackers (including programmers) view computer programs different than
|
||
businessmen do. Bits and pieces of programs are meant to be shared in order
|
||
to further innovation and increase productivity. Programmers have always
|
||
shared algorithms, traded libraries, and swapped subroutines. They do this
|
||
so that they do not have to "reinvent the wheel" every time they write a
|
||
program. If something is very basic and can be used over and over in
|
||
many programs, then programmers share it with others.
|
||
|
||
Businessmen, on the other hand, are not motivated by sharing but by making
|
||
a dollar. There is nothing wrong with this at all. The problem is that
|
||
sometimes making a dollar in the short run can be detrimental to the overall
|
||
market in the long run. Being misers with algorithms will force everyone
|
||
to spend a lot of time and MONEY to develop new products. If something
|
||
is so basic and so useful, then it should be allowed the freedom to be
|
||
developed to its fullest. Only then will the real bucks come rolling in.
|
||
|
||
The solution to this paradox is that hackers have to learn that companies
|
||
need money to keep going, and businessmen have to learn that computers
|
||
cannot be treated like most products. A compromise needs to be reached so
|
||
that both profits and innovation are protected without destroying each. Not
|
||
everything should be given away, and not everything should be kept secret.
|
||
Both should collaborate on deciding what to release and what to keep.
|
||
Lately, it has been more of a business decision than a programmer's, and
|
||
the imbalance is not good.
|
||
|
||
|
||
Conclusion
|
||
==========
|
||
|
||
There are more things to consider when protecting something in a computer
|
||
program than next quarter's profits. In the long run, it may be more
|
||
profitable to let the competition use some of your ideas. The more people
|
||
who are able to easily access computers, the bigger the market, and the
|
||
more profit. If only one company has a good interface and the price is
|
||
high, the market will be small. Obviously, not everything should be
|
||
allowed to be used freely, but the decision-making process should include
|
||
more than looking at the bottom line.
|
||
|
||
|
||
A fond farewell.....
|
||
====================
|
||
|
||
This is the last in my series of articles for CuD. I have tried to show
|
||
another side of the Underground than the one that is commonplace. There
|
||
is much more to the Underground than hacking and phreaking. It is composed
|
||
of many intelligent people who can make a valuable contribution to the
|
||
computer industry. They should not be thrown to the wayside as they have
|
||
been. While I am not a spokesman for anyone down here, and I am certainly
|
||
long-winded and less intelligent than many, I sincerely hope that these
|
||
articles have made an impact on someone somewhere.
|
||
|
||
I would also hope that I have inspired other members of the Underground
|
||
to show that they are more than people who break into systems. This
|
||
is your chance: start showing people what you really are, and then they
|
||
will take you seriously. You can do a better job than I did; I know you
|
||
can! Go out there and do it!!!
|
||
|
||
I would especially like to thank CuD and Jim Thomas for allowing me to
|
||
espouse my drivel in their fine digest. A finer and fairer publication
|
||
could not be found anywhere. I would also like to thank Dr. Ripco since
|
||
it was his BBS that first connected me to Underground when I was a mere
|
||
pup of 15, 6 years ago. I have yet to see a BBS that compares in quality
|
||
in all my years down here.
|
||
|
||
As for my future plans, I will be taking a sabbatical from being active in
|
||
the Underground for a while. I have many things to reflect over and much
|
||
to plan for my life. I have a few projects that may or may not include
|
||
programming, writing, and editing a tech journal that will contain
|
||
articles from members of the Underground of a technical nature. This
|
||
journal would be sent throughout the computer industry as a means of
|
||
communication.
|
||
|
||
I know these articles probably sucked, but I gave it my best shot.
|
||
|
||
|
||
In the words of the Darkest Adept the world has ever known:
|
||
|
||
Do what thou Wilt shall be the whole of the Law;
|
||
Love is the Law, Love under Will.
|
||
|
||
|
||
Thanks for the memories....
|
||
|
||
As always, I remain...
|
||
|
||
The Dark Adept
|
||
Email: Ripco BBS (312)-528-5020
|
||
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #2.18**
|
||
|
||
|