textfiles/reports/ACE/undergrd.txt

1832 lines
105 KiB
Plaintext

ÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜ ÜÜÜÜ
ÜÛÛÛÛÛÛÛÛßÛßßßßßÛÛÜ ÜÜßßßßÜÜÜÜ ÜÛÜ ÜÛÛÛÛÛÛÛÛÜÜÜÜÜÛßß ßÛÛ
ßÛÛÛÛÛÛÛÛÛÛÛÛÛÛÜ ßÛÛ ÜÛÛÛÜÛÛÜÜÜ ßÛÛÛÛÜ ßÛÛÛÛÛÛÛÜÛÛÜÜÜÛÛÝ Ûß
ßßßÛÛÛÛÛÛÛÛÛÛÜ ÞÝ ÛÛÛÛÛÛÛÛÛÛÛßßÛÜÞÛÛÛ ÛÛÛÛÛÜ ßßÛÛÛÞß
Mo.iMP ÜÛÛÜ ßÛÛÛÛÛÛÛÝÛ ÞÛÛÛÛÛÛÛÛÛ ÞÛÛÛÛ ÞÛÛÛÛÛÝ ßÛß
ÜÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÝ ÞÛÛÛÛÛÛÛÛÝ ÛÛÛ ÛÛÛÛÛÛ
ÜÛÛÛÛÛÛÛÝ ÞÛÛÛÛÛÛÛÛ ÞÛÛÛÛÛÛÛÛ ß ÞÛÛÛÛÛÛÜ ÜÛ
ÜÛÛÛÛÛÛÛÝ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÝ ÞÞÛÛÛÛÛÛÛÛÛß
ÜÛßÛÛÛÛÛÛ ÜÜ ÛÛÛÛÛÛÛÛÝ ÛÛÞÛÛÛÛÛÝ ÞÛÛÛÛÛÛßß
ÜÛßÛÛÛÛÛÛÜÛÛÛÛÜÞÛÛÛÛÛÛÛÛ ÞÛ ßÛÛÛÛÛ Ü ÛÝÛÛÛÛÛ Ü
ÜÛ ÞÛÛÛÛÛÛÛÛÛÛß ÛÛÛÛÛÛÛÛÛ ßÛÜ ßÛÛÛÜÜ ÜÜÛÛÛß ÞÛ ÞÛÛÛÝ ÜÜÛÛ
ÛÛ ÛÛÛÛÛÛÛÛß ÛÛÛÛÛÛÛÛÛÛÜ ßÛÜ ßßÛÛÛÛÛÛÛÛÛß ÜÜÜß ÛÛÛÛÜÜÜÜÜÜÜÛÛÛÛÛß
ßÛÜ ÜÛÛÛß ßÛÛÛÛÛÛÛÛÛÛÜ ßßÜÜ ßßÜÛÛßß ßÛÛÜ ßßßÛßÛÛÛÛÛÛÛßß
ßßßßß ßßÛÛß ßßßßß ßßßßßßßßßßßßß
ARRoGANT CoURiERS WiTH ESSaYS
Grade Level: Type of Work Subject/Topic is on:
[ ]6-8 [ ]Class Notes [College report on the ]
[ ]9-10 [ ]Cliff Notes [computer underground. ]
[ ]11-12 [x]Essay/Report [ ]
[ ]College [ ]Misc [ ]
Dizzed: 07/94 # of Words:16314 School:Public State:NY
ÄÄÄÄÄÄÄÄÄ>ÄÄÄÄÄÄÄÄÄ>ÄÄÄÄÄÄÄÄÄ>Chop Here>ÄÄÄÄÄÄÄÄÄ>ÄÄÄÄÄÄÄÄÄ>ÄÄÄÄÄÄÄÄÄ>ÄÄÄÄÄÄÄÄÄ
NORTHERN ILLINOIS UNIVERSITY
THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND
A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL
FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE
MASTER OF ARTS
DEPARTMENT OF SOCIOLOGY
BY
GORDON R. MEYER
%CompuServe: 72307,1502% %GEnie: GRMEYER%
DEKALB, ILLINOIS
AUGUST 1989
ABSTRACT
Mame: Gordon R. Meyer Department: Sociology
Title: The Social Organization of the Computer Underground
Major: Criminology Degree: M.A.
Aproved by: Date:
_____________________________________ ___________
Tesis Director
NORTHERN ILLINOIS UNIVERSITY
ABSTRACT
This paper examines the social organization of the "computer underground"
(CU). The CU is composed of actors in three roles, "computer hackers,"
"phone phreaks," and "software pirates." These roles have frequently been
ignored or confused in media and other accounts of CU activity. By
utilizing a data set culled from CU channels of communication this paper
provides an ethnographic account of computer underground organization. It
is concluded that despite the widespread social network of the computer
underground, it is organized primarily on the level of colleagues, with
only small groups approaching peer relationships.
Certification: In accordance with departmental and Graduate
School policies, this thesis
is accepted in partial fulfillment of degree
requirements.
______________________
Thesis Director
______________________
Date
ACKNOWLEDGMENTS
FOR CRITIQUE, ADVICE, AND COMMENTS:
DR. JAMES L. MASSEY
DR. JIM THOMAS
DR. DAVID F. LUCKENBILL
FOR SUPPORT AND ENCOURAGEMENT:
GALE GREINKE
SPECIAL THANKS TO:
D.C., T.M., T.K., K.L., D.P.,
M.H., AND G.Z.
THIS WORK IS DEDICATED TO:
GEORGE HAYDUKE
AND
BARRY FREED
Introduction
The proliferation of home computers has been accompanied by a
corresponding social problem involving the activities of so-called
"computer hackers." "Hackers" are computer aficionados who "break in" to
corporate and government computer systems using their home computer and a
telephone modem. The prevalence of the problem has been dramatized by the
media and enforcement agents, and evidenced by the rise of specialized
private security firms to confront the "hackers." But despite this flurry
of attention, little research has examined the social world of the
"computer hacker." Our current knowledge in this regard derives from
hackers who have been caught, from enforcement agents, and from computer
security specialists. The everyday world and activities of the "computer
hacker" remain largely unknown.
This study examines the way actors in the "computer underground" (CU)
organize to perform their acts. The computer underground, as it is called
by those who participate in it, is composed of actors adhering to one of
three roles: "hackers," "phreakers," or "pirates." To further understanding
this growing "social problem," this project will isolate and clarify these
roles, and examine how each contributes to the culture as a whole. By doing
so the sociological question of how the "underground" is organized will be
answered, rather than the technical question of how CU participants perform
their acts.
Best and Luckenbill (1982) describe three basic approaches to the
study of "deviant" groups. The first approach is from a social
psychological level, where analysis focuses on the needs, motives, and
individual characteristics of the actors involved. Secondly, deviant
groups can be studied at a socio-structural level. Here the emphasis is on
the distribution and consequences of deviance within the society as a
whole. The third approach, the one adopted by this work, forms a middle
ground between the former two by addressing the social organization of
deviant groups. Focusing upon neither the individual nor societal
structures entirely, social organization refers to the network of social
relations between individuals involved in a common activity (pp. 13-14).
Assessing the degree and manner in which the underground is organized
provides the opportunity to also examine the culture, roles, and channels
of communication used by the computer underground. The focus here is on the
day to day experience of persons whose activities have been criminalized
over the past several years. Hackers, and the "danger" that they present
in our computer dependent society, have often received attention from the
legal community and the media. Since 1980, every state and the federal
government has criminalized "theft by browsing" of computerized information
(Hollinger and Lanza-Kaduce, 1988, pp.101- 102). In the media, hackers have
been portrayed as maladjusted losers, forming "high-tech street gangs"
(Chicago Tribune, 1989) that are dangerous to society. My research will
show that the computer underground consists of a more sophisticated level
of social organization than has been generally recognized. The very fact
that CU participants are to some extent "networked" has implications for
social control policies that may have been Implemented based on an in-
complete understanding of the activity. This project not only offers
sociological insight into the organ- ization of deviant associations, but
may be helpful to policy makers as well.
I begin with a discussion of the definitional problems that inhibit
the sociological analysis of the computer underground. The emergence of the
computer underground is a recent phenomenon, and the lack of empirical
research on the topic has created an area where few "standard" definitions
and categories exist. This work will show that terms such as "hacker,"
"phreaker," and "pirate" have different meanings for those who have written
about the computer underground and those who participate in it. This work
bridges these inconsistencies by providing definitions that focus on the
intentions and goals of the participants, rather than the legality or
morality of their actions.
Following the definition of CU activities is a discussion of the
structure of the underground. Utilizing a typology for understanding the
social organization of deviant associations, developed by Best and
Luckenbill (1982), the organization of the computer underground is examined
in depth.
The analysis begins by examining the structure of mutual association.
This provides insight into how CU activity is organized, the ways in which
information is obtained and disseminated, and explores the subcultural
facets of the computer underground. More importantly, it clearly
illustrates that the computer underground is primarily a social network of
individuals that perform their acts separately, yet support each other by
sharing information and other resources.
After describing mutual association within the underground community,
evidence of mutual participation is presented. Although the CU is a social
network, the ties developed at the social level encourage the formation of
small "work groups." At this level, some members of the CU work in
cooperation to perform their acts. The organization and purposes of these
groups are examined, as well as their relationship to the CU as a whole.
However, because only limited numbers of individuals join these short-lived
associations, it is concluded that the CU is organized as colleagues.
Those who do join "work groups" display the characteristics of peers, but
most CU activity takes place at a fairly low level of sophistication.
Methodology
Adopting an ethnographic approach, data have been gathered by
participating in, monitoring, and cata- loging channels of communication
used by active members of the computer underground. These channels, which
will be examined in detail later, include electronic bulletin board
systems (BBS), voice mail boxes, bridges, loops, e-mail, and telephone
conversations. These sources provide a window through which to observe
interactions, language, and cultural meanings without intruding upon the
situation or violating the privacy of the participants. Because these
communication centers are the "back stage" area of the computer
underground, they provided insight into organizational (and other) issues
that CU participants face, and the methods they use to resolve them.
As with any ethnographic research, steps have been taken to protect
the identity of informants. The culture of the computer underground aids
the researcher in this task since phreakers, hackers, and pirates regularly
adopt pseudonyms to mask their identity. However to further ensure
confidentiality, all of the pseudonyms cited in this research have been
changed by the author. Additionally, any information that is potentially
incriminating has been removed or altered.
The data set used for this study consists primarily of messages, or
"logs," which are the primary form of communication between users. These
logs were "captured" (recorded using the computer to save the messages)
from several hundred computer bulletin boards1 located across the United
States. The bulk of the data were gathered over a seventeen month period
(12/87 to 4/89) and will reflect the characteristics of the computer
underground during that time span. However, some data, provided to the
researcher by cooperative subjects, dates as far back as 1984. The logged
data were supplemented by referring to several CU "publications." The
members of the computer underground produce and distribute several
technical and tutorial newsletters and "journals." Since these
"publications" are not widely available outside of CU circles I have given
a brief description of each below.
Legion of Doom/Hackers Technical Journal. This 1 Computer Bulletin
Boards (BBS) are personal computers that have been equipped with a
telephone modem and special software. Users can connect with a BBS by
dialing, with their own computer and modem, the phone number to which the
BBS is connected. After "logging in" by supplying a valid user name and
pass- word, the user can leave messages to other users of the system.
These messages are not private and anyone calling the BBS can freely read
and respond to them. publication is written and distributed by a group
known as "The Legion of Doom/Legion of Hackers" (LoD/H). It is available
in electronic format (a computer text file) and contains highly technical
information on computer operating systems. As of this writing, three issues
have been published.
PHRACK Inc.: Phrack Inc is a newsletter that contains various
articles, written by different authors, and "published" under one banner.
Phrack Inc's first issue was released in 1985, making it the oldest of the
electronically distributed underground publications. CU participants are
invited to submit articles to the editors, who release a new issue when a
sufficient number (about nine) of acceptable pieces have been gathered.
Phrack also features a lengthy "World News" with stories about hackers who
have been apprehended and interviews with various members of the
underground. As of this writing twenty-seven issues of Phrack, have been
published.
Phreakers/Hackers Underground Network (P/Hun): Like Phrack, P/Hun
collects articles from various authors and releases them as one issue.
Three issues have been published to date.
Activist Times, Incorporated (ATI): Unlike the other electronically
distributed publications, ATI does not limit itself to strictly
computer/telephone news. Articles normally include commentary on world and
government events, and other "general interest" topics. ATI issues are
generally small and consist of articles written by a core group of four to
seven people. Unlike the publications discussed thus far, ATI is available
in printed "hard copy" form by sending postage reimbursement to the editor.
ATI is currently on their 38th issue.
2600 Magazine: Published in a traditional (printed) magazine format,
2600 (named for the frequency tone used to make free long distance phone
calls) is arguably an "underground" publication as it is available on some
newsstands and at some libraries. Begun in 1987 as a monthly magazine, it
is now published quarterly. Subscription rates are $25.00 a year with a
complete back-issue selection available. The magazine specializes in
publishing technical information on telephone switching systems, satellite
descrambling codes, and news about the computer underground.
TAP/YIPL: First established in 1972 as YIPL (Youth International Party
Line), this publication soon changed its name to TAP (Technical Assistance
Party). Co-founded by Abbie Hoffman, it is generally recognized as the
grandfather of computer underground publications. Publication of the 2-4
page newsletter has been very sporadic over the years, and currently two
different versions of TAP, each published in different areas of the
country, are in circulation.
Utilizing a data set that consists of current message logs, old
messages logs, and various CU publications yields a reasonably rich
collection from which to draw the analysis. Examination of the older logs
and publications shows that while the actors have changed over the years,
cultural norms and characteristics have remained consistent over time.
What is the Computer Underground? Defining the "computer underground"
can be difficult. The sociologist soon finds that there are several
competing definitions of computer underground activity. Those who have
written on the subject, the media, criminologists, computer programmers,
social control agents, and CU participants themselves, have adopted
definitions consistent with their own social positions and perspectives.
Not surprisingly, these definitions rarely correspond. Therefore, before
discussing the organization of the computer underground, it is necessary to
discuss and compare the various definitions. This will illustrate the
range of beliefs about CU activity, and provide a springboard for the
discussion of types of roles and activities found in the underground.
We begin with a discussion of the media image of computer hackers. The
media's concept of "hackers" is important because the criminalization of
the activity has largely occurred as the result of media drama-tization of
the "problem" (Hollinger and Lanza-Kaduce, 1988). In fact, it was a
collection of newspaper and film clips that was presented to the United
States Congress during legislative debates as evidence of the computer
hacking problem (Hollinger and Lanza-Kaduce, 1988, p.107). Unfortunately,
the media assessment of the computer underground displays a naive
understanding of CU activity.
The media generally makes little distinction between different types
of CU activity. Most any computer-related crime activity can be attributed
to "hackers." Everything from embezzlement to computer viruses have, at
one time or another, been attributed to them. Additionally, hackers are
often described as being sociopathic or malicious, creating a media image
of the computer underground that may exaggerate their propensity for doing
damage.
The labeling of hackers as being "evil" is well illustrated by two
recent media examples. The first is from Eddie Schwartz, a WGN-Radio talk
show host. Here Schwartz is addressing "Anna," a self-identified hacker
that has phoned into the show:
You know what Anna, you know what disturbs me? You don't sound like a
stupid person but you represent a . . . a . . . a . . . lack of
morality that disturbs me greatly. You really do. I think you
represent a certain way of thinking that is morally bankrupt. And I'm
not trying to offend you, but I . . . I'm offended by you! (WGN
Radio, 1988) Just two months later, NBC-TV's "Hour Magazine"
featured a segment on "computer crime." In this example, Jay Bloombecker,
director of the National
Center for Computer Crime Data, discusses the "hacker problem" with the
host of the show, Gary Collins. Collins: . . .
are they %hackers% malicious in intent, or are they simply
out to prove, ah, a certain machismo amongst their peers?
Bloombecker: I think so. I've talked about "modem macho" as one
explanation for what's being done. And a lot of the cases seem to
involve %proving% %sic% that he . . . can do something really spiffy
with computers. But, some of the cases are so evil, like causing so
many computers to break, they can't look at that as just trying to
prove that you're better than other people.
GC: So that's just some of it, some kind of "bet" against the computer
industry, or against the company.
JB: No, I think it's more than just rottenness. And like someone who
uses graffiti doesn't care too much whose building it is, they just
want to be destructive.
GC: You're talking about a sociopath in control of a computer!
JB: Ah, lots of computers, because there's thousands, or tens of
thousands %of hackers% (NBC-TV, 1988).
The media image of computer hackers, and thus all Members of the
computer underground, is burdened with value-laden assumptions about their
psychological makeup, and focuses almost entirely upon the morality of
their actions. Additionally, since media stories are taken from the
accounts of police blotters, security personnel, and hackers who have been
caught, each of whom have different perspectives and definitions of their
own, the media definition, if not inherently biased, is at best
inconsistent. Criminologists, by way of contrast, have done little to
define the computer underground from a sociological perspective. Those
criminological definitions that do exist are less judgmental than the media
image, but no more precise. Labels of "electronic trespassers" (Parker,
1983), and "electronic vandals" (Bequai, 1987) have both been applied to
hackers. Both terms, while acknowledging that "hacking" is deviant, shy
away from labeling it as "criminal" or sociopathic behavior. Yet despite
this seemingly non-judgmental approach to the computer underground, both
Parker and Bequai have testified before Congress, on behalf of the computer
security in- dustry, on the "danger" of computer hackers. Unfortunately,
their "expert" testimony was largely based on information culled from
newspaper stories, the objectiveness of which has been seriously questioned
(Hollinger and Lanza-Kaduce 1988 p.105).
Computer security specialists, on the other hand, are often quick to
identify CU participants as part of the criminal element. Correspondingly,
some reject the notion that there are different roles and motivations among
computer underground participants and thereby refuse to define just what it
is that a "hacker" or "phreaker" does. John Maxfield, a "hacker expert,"
suggests that differentiating between "hackers" and "phone phreaks" is a
moot point, preferring instead that they all just be called "criminals"
(WGN-Radio. Sept 28, 1988).
The reluctance or inability to differentiate between roles and
activities in the computer underground, as exhibited in the media and
computer security firms, creates an ambiguous definition of "hacker" that
possesses two extremes: the modern-day bank robber at one end, the
trespassing teenager at the other. Thus, most any criminal or mischievous
act that involves computers can be attributed to "hackers,"2 regardless of
the nature of the crime.
Further compounding the inconsistent use of "hacker" is the evolution
of meaning that the word has undergone. "Hacker" was first applied to
computer related activities when it was used by programmers in the late
1950's. At that time it referred to the pioneering researchers, such as
those at M.I.T., who
2 During the WGN-Radio show on computer crime one caller, who was
experiencing a malfunctioning phone that would "chirp" occasionally while
hung up, believed that "computer hackers" were responsible for the problem.
The panel assured her that it was unrelated to CU activity. were constantly
adjusting and experimenting with the new technology (Levy, 1984. p.7). A
"hacker" in this context refers to an unorthodox, yet talented,
professional programmer. This use of the term still exits today, though it
is largely limited to professional computing circles.
Another definition of "hacker" refers to one who obtains unauthorized,
if not illegal, access to computer systems and networks. This definition
was popularized by the movie War Games and, generally speaking, is the one
used by the media.3 It is also the definition favored by the computer
underground. Both the members of the computer underground and computer
programmers claim ownership of "hacker," and each defend the "proper" use
of term. The computer professionals maintain that using "hackers" (or
"hacking") to refer to any illegal or illicit activity is a corruption of
the "true" meaning of the word. Bob Bickford, a professional programmer
who has organized several programmer conferences, explains:
3 This is not always true of course. The AP Stylebook has yet to
specify how "hacker" should be used. A recent Associated Press story
featured a computer professional explaining that a "real hacker" would
never do anything illegal. Yet just a few weeks later Associated Press
distributed stories proclaiming that West German "hackers" had broken into
US Defense Department computer systems.
At the most recent conference %called "Hackers 4.0"% we had 200 of the
most brilliant computer professionals in the world together for one
weekend; this crowd included several PhD's, several presidents of companies
(including large companies, such as Pixar), and various artists, writers,
engineers, and programmers. These people all consider themselves Hackers:
all derive great joy from their work, from finding ways around problems and
limits, from creating rather than destroying. It would be a great
disservice to these people, and the thousands of professionals like them,
to let some pathetic teenaged criminals destroy the one word which captures
their style of interaction with the universe: Hackers (Bickford, 1988).
Participants in the computer underground also object to the "misuse" of the
term. Their objection centers around the indiscriminate use of the word to
refer to computer related crime in general and not, specifically, the
activities of the computer underground: Whenever the slightest little thing
happens involving computer security, or the breach thereof, the media goes
fucking bat shit and points all their fingers at us 'nasty hackers.'
They're so damned ignorant it's sick (EN, message log, 1988). . . .
whenever the media happens upon anything that involves malicious computer
use it's the "HACKERS." The word is a catch phrase it makes mom drop the
dishes and watch the TV. They use the word because not only they don't
really know the meaning but they have lack of a word to describe the
perpetrator. That's why hacker has such a bad name, its always associated
with evil things and such (PA, message log, 1988). I never seen a phreaker
called a phreaker when caught and he's printed in the newspaper. You always
see them "Hacker caught in telephone fraud." "Hacker defrauds old man with
phone calling card." What someone should do is tell the fucken (sic) media
to get it straight (TP2, message log, 1988). Obviously the CU and computer
professional definitions of "hacker" refer to different social groups. As
Best and Luckenbill (1982, p. 39) observe:
"Every social group modifies the basic language to fit its own
circumstance, creating new words or using ordinary words in special ways."
Which definition, if either, will come into widespread use remains to be
seen. However, since computer break-ins are likely to receive more media
attention than clever feats of programming, the CU definition is likely to
dominate simply by being used more often.4 But as long as the two
definitions do exist there will be confusion unless writers and researchers
adequately specify the group under discussion. For this reason, I suggest
that sociologists, and criminologists in particular, adopt the
"underground" definition for consistency and
4 Another factor may be the adoption of a close proximity to the
underground definition being included in the 1986 edition of Webster's New
World dictionary:
hack.er n. 1. a person who hacks 2. an unskilled golfer, tennis
player, etc. 3. a talented amateur user of computers, specif. one who
attempts to gain unauthorized access to files.
accuracy when speaking of the actions of CU participants.
While it is recognized that computer hacking is a relatively new
phenomenon, the indiscriminant use of the term to refer to many different
forms of unorthodox computer use has been counterproductive to
understanding the extent of the activity. To avoid this a "computer hacker"
should be defined as an individual, associated with the computer
underground, who specializes in obtaining unauthorized access to computer
systems. A "phone phreak" in an individual, associated with the computer
underground, who specializes in obtaining unauthorized information about
the phone system. A "software pirate" is an individual, associated with
the computer underground, who distributes or collects copyrighted computer
software. These definitions have been derived from the data, instead of
relying upon those who defend the "integrity" of the original meanings, or
those who are unfamiliar with the culture.
Topography of the Computer Underground Having defined the three main
roles in the computer underground, it is necessary to examine each activity
separately in order to provide a general typology of the computer
underground. In doing so, the ways in which each contributes to the
culture as a whole will be illustrated, and the divisions between them that
affect the overall organization will be developed. Analysis of these roles
and divisions is crucial to understanding identity, access, and mobility
within the culture. Hacking
In the vernacular of the computer underground, "hacking" refers to
gaining access and exploring computer systems and networks. "Hacking"
encompasses both the act and the methods used to obtain valid user accounts
on computer systems.
"Hacking" also refers to the activity that occurs once access to
another computer has been obtained. Since the system is being used without
authorization, the hacker does not, generally speaking, have access to the
usual operating manuals and other resources that are available to
legitimate users.
Therefore, the hacker must experiment with commands and explore
various files in order to understand and effectively use the system. The
goal here is to explore and experiment with the system that has been
entered. By examining files and, perhaps, by a little clever programming,
the hacker may be able to obtain protected information or more powerful
access privileges.5 Phreaking
Another role in the computer underground is that of the "phone
phreak." Phone phreaking, usually called just "phreaking," was widely
publicized when the exploits of John "Cap'n Crunch" Draper, the "father of
phreaking," were publicized in a 1971 Esquire magazine article. The term
"phreaking" encompasses several different means of circumventing the
billing mechanisms of telephone companies. By using these methods, long-
5 Contrary to the image sometimes perpetuated by computer security
consultants, the data indicate that hackers refrain from deliberately
destroying data or otherwise damaging the system. Doing so would conflict
with their instrumental goal of blending in with the average user so as not
to attract undue attention to their presence and cause the account to be
deleted. After spending what may be a substantial amount of time obtaining
a high access account, the hacker places a high priority on not being
discovered using it. distance phone calls can be placed without cost. In
many cases the methods also prevent, or at least inhibit, the possibility
of calls being traced to their source thereby helping the phreaker to avoid
being caught.
Early phreaking methods involved electro-mechanical devices that
generated key tones, or altered line voltages in certain ways as to trick
the mechanical switches of the phone company into connecting calls without
charging. However the advent of computerized telephone-switching systems
largely made these devices obsolete. In order to continue their practice
the phreaks have had to learn hacking skills:6
Phreaking and hacking have just recently merged, because now, the
telephone companies are using computers to operate their network. So, in
order to learn more about these computers in relation to the network,
phreaks have learned hacking skills, and can now program, and get around
inside the machines (AF, message log, 1988). For most members of the
computer underground, phreaking is simply a tool that allows them to call
long distance without amassing enormous phone bills.
6 Because the two activities are so closely related, with phreakers
learning hacking skills and hackers breaking into "telco" computers,
reference is usually made to phreak/hacking or "p/hackers." This paper
follows this convention.
Those who have a deeper and more technically oriented interest in
the "telco" (telephone company) are known as phreakers. They, like the
hackers discussed earlier, desire to master and explore a system that few
outsiders really understand:
The phone system is the most interesting, fascinating thing that I
know of. There is so much to know. Even phreaks have their own areas
of knowledge. There is so much to know that one phreak could know
something fairly important and the next phreak not. The next phreak
might know ten things that the first phreak doesn't though. It all
depends upon where and how they get their info. I myself %sic% would
like to work for the telco, doing something interesting, like
programming a switch. Something that isn't slave labor bullshit.
Something that you enjoy, but have to take risks in order to
participate unless you are lucky enough to work for the telco. To
have access to telco things, manuals, etc would be great (DP, message
log, 1988). Phreaking involves having the dedication to commit
yourself to learning as much about the phone system/network as
possible. Since most of this information is not made public, phreaks
have to resort to legally questionable means to obtain the knowledge
they want (TP2, message log, 1988).
Most members of the underground do not approach the telephone system
with such passion. Many hackers are interested in the phone system solely
to the extent that they can exploit its weaknesses and pursue other goals.
In this case, phreaking becomes a means and not a pursuit unto itself.
Another individual, one who identifies himself as a hacker, explains:
I know very little about phones . . . I just hack. See, I can't
exactly call these numbers direct. A lot of people are in the same
boat. In my case, phreaking is a tool, an often used one, but
nonetheless a tool (TU, message log, 1988).
In the world of the computer underground, the ability to "phreak a
call" is taken for granted. The invention of the telephone credit card has
opened the door to wide-scale phreaking. With these cards, no special
knowledge or equipment is required to phreak a call, only valid credit card
numbers, known as "codez," are needed to call any location in the world.
This easy access to free long-distance service is instrumental for
maintaining contact with CU participants scattered across the nation.
Pirating
The third major role in the computer underground is that of the
software pirate. Software piracy refers to the unauthorized copying and
distribution of copy- righted software. This activity centers around
computer bulletin board systems that specialize in "warez."7 There
pirates can contribute and share
7 "Warez" is a common underground term that refers to pirated
software. copies of commercial software. Having access to these systems
(usually obtained by contributing a copyrighted program via a telephone
modem) allows the pirate to copy, or "download," between two to six
programs that others have contributed.
Software piracy is a growing concern among software publishing
companies. Some contend that the illegal copying of software programs costs
the industry billions of dollars in lost revenues. Pirates challenge this,
and claim that in many ways pirating is a hobby, much like collecting
stamps or baseball cards, and their participation actually induces them to
spend more on software than they would otherwise, even to the point of
buying software they don't truly need: There's a certain sense of, ahh,
satisfaction in having the latest program, or being the first to upload a
program on the "want list." I just like to play around with them, see what
they can do. If I like something, I'll buy it, or try out several programs
like it, then buy one. In fact, if I wasn't pirating, I wouldn't buy any
warez, because some of these I buy I do for uploading or just for the fun
of it. So I figure the software companies are making money off me, and this
is pretty much the same for all the really elite boards, the ones that have
the best and most programs. . . . I just bought a $117. program, an
accounting program, and I have absolutely no use for it. It's for small
businesses. I thought maybe it would auto- write checks, but it's really a
bit too high powered for me. I thought it would be fun to trade to some
other boards, but I learned a lot from just looking at it (JX, field notes,
1989).
Pirates and phreak/hackers do not necessarily support the activities
of each other, and there is distrust and misunderstanding between the two
groups. At least part of this distrust lies in the phreak/hacker perception
that piracy is an unskilled activity.8 While p/hackers probably don't
disapprove of piracy as an activity, they nevertheless tend to avoid pirate
bulletin board systems --partly because there is little pertinent
phreak/hack information contained on them, and partly because of the belief
that pirates indiscriminately abuse the telephone network in pursuit of the
latest computer game. One hacker illustrates this belief by theorizing
that pirates are responsible for a large part of telephone credit card
fraud.
The media claims that it is solely hackers who are responsible for
losses pertaining to large telecommunication companies and long distance
services. This is not the case. We are %hackers% but a small portion of
these losses. The rest are caused by pirates and thieves who sell these
codes to people on the street (AF, message log, 1988). Other hackers
complained that uploading large
8 A possible exception to this are those pirates that have the
programming skills needed to remove copy protection from software. By
removing the program code that inhibits duplicate copies from being made
these individuals, known as "crackers," contribute greatly to the easy
distribution of "warez." programs frequently takes several hours to
complete, and it is pirate calls, not the ones placed by "tele-
communications enthusiasts" (a popular euphemism for phreakers and hackers)
that cost the telephone industry large sums of money. However, the data do
not support the assertation that all pirates phreak their calls. Phreaking
is considered "very tacky" among elite pirates, and system operators
(Sysops) of pirate bulletin boards discourage phreaked calls because it
draws attention to the system when the call is discovered by the telephone
company.
Regardless of whether it is the lack of phreak/ hack skills, the
reputation for abusing the network, or some other reason, there is indeed a
certain amount of division between the world of phreakers and hackers and
that of pirates. The two communities co-exist and share resources and
methods, but function separately.
Social Organization and Deviant Associations Having outlined and
defined the activities of the computer underground, the question of social
organization can be addressed. Joel Best and David Luckenbill (1982) have
developed a typology for identifying the social organization of deviant
associations. Essentially they state that deviant organizations,
regardless of their actual type of deviance, will vary in the complexity of
their division of labor, coordination among organization roles, and the
purposiveness with which they attempt to achieve their goals. Those
organizations which display high levels in each of these categories are
more sophisticated than those with lower levels. Deviants relations with
one another can be arrayed along the dimension of organizational
sophistication. Beginning with the least sophisticated form, %we% discuss
five forms of the social organization of deviants: loners, colleagues,
peers, mobs, and formal organizations. These organization forms are
defined in terms of four variables: whether the deviants associate with one
another; whether they participate in deviance together; whether their
deviance requires an elaborate division of labor; and whether their
organization's activities extend over time and space (Best and Luckenbill,
1982, p.24). These four variables, also known as mutual association, mutual
participation, elaborate division of labor, and extended organization, are
indicators of the social organization of deviant groups. The following,
taken
from Best and Luckenbill, illustrates:
FORM OF MUTUAL MUTUAL DIVISION EXTENDED
ORGAN- ASSOCIA- PARTICIPA-OF
ORGAN-
IZATION TION TION LABOR
IZATION
--------------------------------------
Loners no no no no
Colleagues yes no no no
Peers yes yes no no
Mobs yes yes yes no Formal
Organizations yes yes yes yes
_____________________________________ _
(1982, p.25)
Loners do not associate with other deviants, participate in shared
deviance, have a division of labor, or maintain their deviance over
extended time and space. Colleagues differ from loners because they
associate with fellow deviants. Peers not only associate with one another,
but also participate in deviance together. In mobs, this shared
participation requires an elaborate division of labor. Finally, formal
organizations involve mutual association, mutual participation, an
elaborate division of labor, and deviant activities extended over time and
space (Best and Luckenbill, 1982, pp.24-25).
The five forms of organizations are presented as ideal types, and
"organizational sophistication" should be regarded as forming a continuum
with groups located at various points along the range (Best and Luckenbill,
1982, p.25). With these two caveats in mind, we begin to examine the
computer underground in terms of each of the four organizational variables.
The first level, mutual association, is addressed in the following section.
Mutual Association
Mutual association is an indicator of organizational sophistication in
deviant associations. Its presence in the computer underground indicates
that on a social organization level phreak/hackers act as "colleagues."
Best and Luckenbill discuss the advantages of mutual association for
unconventional groups:
The more sophisticated the form of organization, the more likely the
deviants can help one another with their problems. Deviants help one
another in many ways: by teaching each other deviant skills and a
deviant ideology; by working together to carry out complicated tasks;
by giving each other sociable contacts and moral support; by supplying
one another with deviant equipment; by protecting each other from the
authorities; and so forth. Just as %others% rely on one another in
the course of everyday life, deviants find it easier to cope with
practical problems when they have the help of deviant associates
(1982,pp.27-28).
Hackers, phreakers, and pirates face practical problems. For example,
in order to pursue their activities they require equipment9 and knowledge.
The 9 The basic equipment consists of a modem, phone
line, and a computer -- all items that are available through legitimate
channels. It is the way the equipment is used, and the associated
knowledge that is required, that distinguishes hackers from other computer
users.
The problem of acquiring the latter must be solved and, additionally, they
must devise ways to prevent discovery , apprehension and sanctioning by
social control agents.10
One method of solving these problems is to turn to other CU members
for help and support. Various means of communication have been established
that allow individuals to interact regardless of their location. As might
be expected, the communication channels used by the CU reflect their
interest and ability in high- technology, but the technical aspects of
these methods should not overshadow the mutual association that they
support. This section examines the structure of mutual association within
the computer underground.
10 Telephone company security personnel, local law enforcement, FBI,
and Secret Service agents have all been involved in apprehending hackers.
The Structure of the Computer Underground Both computer underground
communities, the p/hackers and the pirates, depend on communications
technology to provide meeting places for social and "occupational"
exchanges. However, phreakers, hackers, and pirates are widely dispersed
across the country and, in many cases, the globe. In order for the
communication to be organized and available to participants in many time
zones and "working" under different schedules, centralized points of
information distribution are required. Several existing technologies --
computer bulletin boards, voice mail boxes, "chat" lines, and telephone
bridges/loops -- have been adopted by the CU for use as communication
points. Each of these technologies will be addressed in turn, giving
cultural insight into CU activities, and illustrating mutual association
among CU participants. Bulletin Board Systems
Communication in the computer underground takes place largely at
night, and primarily through Bulletin Board Systems (BBS). By calling
these systems and "logging on" with an account and password individuals can
leave messages to each other, download files and programs, and, depending
on the number of phone lines into the system, type messages to other users
that may be logged on at the same time.
Computer Bulletin Board Systems, or "boards," are quite common in this
computerized age. Nearly every medium-sized city or town has at least one.
But not all BBS are part of the computer underground culture. In fact,
many systems prohibit users from discussing CU related activity. However,
since all bulletin boards systems essentially function alike it is only the
content, users, and CU culture that distinguish an "underground" from a
"legitimate" bulletin board. Computer Underground BBS are generally owned
and operated by a single person (known as the "system operator" or
"sysop"). Typically setup in a spare bedroom, the costs of running the
system are paid by the sysop, though some boards solicit donations from
users. The sysop maintains the board and allocates accounts to people who
call the system.
It is difficult to assess the number of underground bulletin boards in
operation at any one time. BBS in general are transitory in nature, and CU
boards are no exception to this. Since they are operated by private
individuals, they are often set up and closed down at the whim of the
operator. A week that sees two new boards come online may also see another
close down. A "lifetime" of anywhere from 1 month to 1-1/2 years is common
for pirate and phreak/hack boards.11 One BBS, claimed to be the "busiest
phreak/hack board in the country" at the time,12 operated for less than one
year and was suddenly closed when the operator was laid off work.
Further compounding the difficulty of estimating the number of CU
boards is their "underground" status. CU systems do not typically publicize
their existence. However, once access to one has been achieved, it is easy
to learn of other systems by asking users for the phone numbers.
Additionally, most BBS maintain lists of other boards that users can
download or read. So it is possible, despite the difficulties, to get a
feel for the number of CU boards in operation. boards are the most common
of "underground" BBS. While there is no national "directory" of pirate
boards, there are several listings of numbers for specific
11 While some non-CU BBS' have been operating since 1981, the longest
operating phreak/hack board has only been in operation since 1984. 12 At
it's peak this p/h board was receiving 1000 calls a month and supported a
community of 167 users (TP BBS, message log, 1989). computer brands.13 One
list of Apple pirate boards has 700 entries. Another, for IBM boards, lists
just over 500. While there is no way of determining if these lists are
comprehensive, they provide a minimum estimate. Pirate boards for systems
other than IBM or Apple seem to exhibit similar numbers. David Small, a
software developer that has taken an aggressive stance in closing down
pirate boards, estimates that there are two thousand in existence at any
one time (1988). Based on the boards discovered in the course of this
research, and working from an assumption that each of the four major brands
of microcomputers have equal numbers of pirate boards, two thousand is a
reasonable estimate.
The phreak/hack BBS community is not divided by differing brands of
micro-computers. The applicability of phreak/hack information to a wide
range of systems does not require the specialization that pirate boards
exhibit. This makes it easier to estimate the number of systems in this
category.
John Maxfield, a computer security consultant, has asserted that there
are "thousands" of phreak/hack 13 Pirate boards are normally "system
specific" in that they only support one brand or model of microcomputer.
boards in existence (WGN-Radio, November 1988). The data, however, do not
confirm this. A list of phreak/hack boards compiled by asking active
p/hackers and downloading BBS lists from known phreak/hack boards,
indicates that there are probably no more than one hundred. Experienced
phreak/hackers say that the quality of these boards varies greatly, and of
those that are in operation today only a few (less than ten) attract the
active and knowledgeable user.
Right after "War Games" came out there must have been hundreds of
hacker bulletin boards spring up. But 99% of those were lame. Just a
bunch of dumb kids that saw the movie and spent all there %sic% time
asking "anyone got any k00l numberz?" instead of actually hacking on
anything. But for a while there was %sic% maybe ten systems worth
calling . . . where you could actually learn something and talk to
people who knew what was going Nowadays %sic% there are maybe three
that I consider good . . . and about four or five others that are
okay. The problem is that anybody can set up a board with a k-rad
name and call it a hacker board and the media/feds will consider it
one if it gets busted. But it never really was worth a shit from the
beginning.(TP2, field notes, 1989)
Towards a BBS Culture. Defining and identifying CU boards can be
problematic. The lack of an ideal type undoubtedly contributes to the
varying estimates of the number of CU bulletin board systems. While
developing such a typology is not the intent of this work, it is
appropriate to examine the activities and characteristics exhibited by BBS
supporting the pirate and phreak/hack communities. While much of the
culture of pirate and phreak/hack worlds overlap, there are some
differences in terms of how the BBS medium is used to serve their
interests. We begin with a short discussion of the differences between the
two communities, then discuss cultural characteristics common to all CU BBS
systems.
All BBS feature a "files area" where programs and text files are
available for downloading by users. Initially these programs/files are
supplied by the system operator, but as the board grows they are
contributed (called "uploading") by callers. The content and size of the
files area differs according to whether the board supports the pirate or
phreak/hack community.
The files area on a pirate board consists primarily of programs and
program documentation. Normally these programs are for only one brand of
micro-computer (usually the same as the system is being run on). Text files
on general or non-computer topics are uncommon. A "files area" menu from a
pirate BBS illustrates the emphasis on software:
%1% Documentation %2% Telecommunications
%3% Misc Applications %4% Word Processing
%5% Graphics %6% Utilities
%7% Games 1 %8% Games 2
%9% XXX Rated %10% Elite_1
%11% Elite_2 %12% Super_Elite
(IN BBS, message log, 1988) The "files area" on a phreak/hack BBS is
noticeably smaller than it is on pirate systems. It consists primarily of
instructional files (known as "g- files" for "general files") and copies of
phreak/hack newsletters and journals. Pirated commercial software is very
rare; any programs that are available are usually non- copyrighted
specialized programs used to automate the more mundane aspects of phreaking
or hacking. It is not uncommon to find them in forms usable by different
brands of computers. A "files area" list from a phreak/hack BBS is listed
here (edited for size):
Misc Stuff
-------------
BRR2 .TXT: Bell Research Report Volume II
BRR1 .TXT: Bell Research Report Volume I CONFIDE .ARC:
Confide v1.0 DES EnCryption/DeCryption
CNA .TXT: A bunch of CNA numbers
CLIPS .ARC: newsclippings/articles on hackers
and busts
ESS1 .TXT: FILE DESCRIBING THE ESS1 CHIP TELEPHON.TXT: NY
Times Article on hackers/phreaks
HP-3000 .TXT: This tells a little info about hp
VIRUS .TXT: Digest of PC anti-viral programs.
Hack/Phreak Programs
-----------------------
THIEF .ARC: Code Thief for IBM! PC-LOK11.ARC: IBM Hard
Disk Lock Utility-fairly good.
PHONELIS.COM: Do a PHONE DIR command on VAX from DCL.
XMO .FOR: VAX Xmodem Package in FORTRAN
PASSWORD.ARC: IBM Password on bootup. Not too bad.
Archived Gfiles
----------------------
PHRACK15.ARC: Phrack #15
PHRACK10.ARC: Phrack #10
PHRACK20.ARC: Phrack #20
ATI1_6.ARC : ATI issues one thru six
PHRACK5.ARC : Phrack #5
PHRACK25.ARC: Phrack #25
PHUN1.ARC : P/Hun first issue
TCSJ.ARC : Telecom Security Journal
ATI31.ARC : Activist Times Inc number 31 LODTECH3.ARC: LoD
Tech Journal three
(TPP BBS, message log, 1988)
The difference in files area size is consistent with the activities of
pirates and phreak/hackers. The main commodity of exchange between pirates
is, as discussed earlier, copyrighted software thus accounting for the
heavy use of that area of the board that permits exchange of programs. The
phreak/hackers, on the other hand, primarily exchange information about
outside systems and techniques. Their interests are better served by the
"message bases" of BBS.
The "message bases" (areas where callers leave messages to other
users) are heavily used on phreak/hack systems. The messages are not
specific to one brand of micro-computer due to the fact that not all users
own the same equipment. Rather than focus on the equipment owned by the
phreak/hacker, the messages deal with their "targets." Everything from
phreak/hacking techniques to CU gossip is discussed. On some boards all
the messages, regardless of topic, are strung together in one area. But on
others there are separate areas dealing with specific networks and
mainframe computers:
Message Boards available:
1 : General
2 : Telecommunications
3 : Electronics
4 : Packet Switched Nets
5 : VAX/DEC
6 : Unix
7 : Primos
8 : HP-x000
9 : Engineering
10 : Programming & Theory
11 : Phrack Inc.
12 : Sociological Inquiries
13 : Security Personnel & Discussion
14 : Upper Deck
15 : Instructors
(TPP BBS, message log, 1988)
The pirate community, on the other hand, makes little use of the
"message bases." Most users prefer to spend their time (which may be
limited by the system operator on a per day or per call basis) uploading
and/or downloading files rather than leaving messages for others. Those
messages that do exist are usually specific to the pirating enterprise such
as help with programs on the board, requests for specific programs ("want
lists"), and notices about other pirate bulletin boards that users may want
to call. Occasional discussion of phreaking may occur, but the emphasis is
on techniques used to make free calls, not technical network discussions as
often occurs on phreak/hack systems. A list of message areas from a large
pirate BBS illustrates the emphasis on the pirating enterprise. A message
area for general discussions has been created, but those areas devoted to
pirating display more use:
Area %1% General Discussion 15 messages
Area %2% Pirating Only!! 75 messages
Area %3% Warez Wants 31 messages
Area %4% **private messages** 10 messages (TL BBS, message log, 1988)
In addition to the differences between files and message use on pirate
and phreak/hack boards, they differ in degree of community cohesiveness.
Every BBS has a group of "users" --the people who have accounts on the
system. The group of users that call a specific BBS can be considered to be
a "community" of loosely associated individuals by virtue of their
"membership" in the BBS.
Additionally, the system itself, serving either pirates or
phreak/hackers, exists within a loose network of other bulletin boards that
serve these same interests. It is within this larger community where pirate
and phreak/hack boards seem to differ.
Due to the brand-specific nature of pirate boards, there is not a
strong network between pirate BBS that operate on other systems. This is
understandable as a pirate that owned an Apple computer would have little
use for the programs found on an IBM board. However, this creates separate
communities of active pirates, each loosely associated with other users of
their computer type, but with little or no contact with pirate communities
on other systems.
There is, however, a degree of cohesiveness among pirate boards that
support the same micro-computers. While the users may be different on
systems, the data shows that some pirate boards are "networked" with each
other via special software that allows messages and files to be
automatically shared between different boards. Thus a message posted on a
west coast pirate board will be automatically copied on an east coast BBS
later that night. In a like manner, software programs can be sent between
"networked" boards. The extent of this network is unknown.
The pirate BBS community also exhibits cohesiveness in the form of
"co-sysops." As discussed earlier, sysops are the system operators and
usually owners of BBS. On some pirate boards, "co-sysop" distinction is
given to an operator of another board, often located in another state. This
forms a loose network of "sister boards" where the sysop of one has
co-sysop privileges on the other. However, this cooperative effort appears
to be limited mainly to the system operators as comparing user lists from
sister boards shows little overlap between the regular callers. How co-
sysop positions are utilized is unknown, and it is suspected that they are
largely honorary. But nonetheless it is indicative of mutual association
between a small number of boards.
The phreak/hack board community does not exhibit the same
brand-specific division as the pirate community. Unlike the divided
community of pirates, phreak/hackers appear to maintain contacts throughout
the country. Obtaining and comparing user lists from several phreak/hack
BBS reveals largely the same group of people using several different boards
across the country.14 While phreak/hack boards have yet to adopt the
"networking" software used by pirate boards, an active group of
phreak/hackers is known to use the sophisticated university mainframe
computer network, called Bitnet, to exchange phreak/hack newsletters and
gossip.
Despite the operational differences between pirate 14 In fact, users
lists from phreak/hack BBSs located in Europe and Australia show that many
U.S. p/hackers utilize these systems as well. and phreak/hack boards, their
cultures are remarkably similar. Any discussion of the computer underground
must include both communities. Additionally, a formulation of the culture
of CU BBS must address the means in which access to the board, and thus
deviant associates, is obtained.
For a caller to successfully enter the CU BBS community, he must
display an awareness of CU culture and technical skill in the CU
enterprise. If the caller fails to exhibit cultural knowledge, then access
to the board is unlikely to be granted. The ways in which this cultural
knowledge is obtained and displayed illustrates the social nature of the CU
and further displays some of the subcultural norms of behavior.
On most "licit" (non-underground) boards, obtaining permission to use
the system is accomplished by logging on and providing a name and home
phone number to the system operator (sysop). Sysop's normally do not check
the validity of the information, and once a caller has provided it he or
she is granted full access to the system. There is normally one level of
access for all users, with only the sysop having more "powerful" access.
Obtaining access to underground bulletin boards is more complicated
and requires more steps to complete. In an attempt to prevent law
enforcement agents ("feds") from obtaining accounts on systems where
pirates or p/hackers are vulnerable, if not to actual arrest, then at least
to exposing their latest act- ivities and methods, sysop's of illicit
boards attempt to limit access to the system.
One method of doing this is to restrict publicizing the existence of
the board. Computer underground BBS are not normally included in BBS
listings found in computer books and magazines, and there is a norm,
particularly strong on p/hack systems, that the boards are not to be
mentioned on non-CU systems. There are, however, some "entry-level" CU BBS
that are fairly well known. These systems are known as "anarchist" boards.
"Anarchist" boards, while exhibiting many of the same characteristics
as pirate and phreak/hack boards, are really a cross between the two and
serve primarily as social outlets for both pirates and phreak/hackers. The
message areas on "anarchist" boards are quite active, "chatty" messages are
not discouraged. Indeed there are normally several different message
areas devoted to a wide range of topics including everything from "skipping
school" to "punk rock." The files area contains both warez (but normally
only the newest games, and specific to the computer system that the board
runs on) and phreak/hack text files. Neither collection is as extensive as
it would be on pirate- only or p/hack-only systems.
The data suggest that one function of "anarchist" boards is to
introduce newcomers to the culture of the computer underground. By acting
as "feeder boards," they can provide preliminary socialization and
instruction for CU behavior and techniques. Additionally, "anarchist"
boards frequently provide areas where phone numbers to pirate and p/hack
systems can be traded, thus providing systems where more in- depth
information, and other contacts, can be found. A phreak/hacker describes
how an "anarchist" board was instrumental in introducing him to the
computer underground:
I've been phreaking and hacking for about four years now. I
discovered phreaking on my own at this place I used to work. We had
this small LD %long distance% provider that used codez so I started
hacking them out and calling places myself . . . but I didn't know no
other phreaks at that time. Then I started using the codez to call
boards from home on my computer. Somebody gave me the number to Jack
Black's Whore House %an "anarchy board"% and I started learning about
hacking and shit from the people and philes they had there. Then one
day this guy, King Hammer, sent me some e-mail %a private message% and
told me to call his system. That's where I really learned my way
around the nets and shit. You could ask questions and people would
help you out and stuff. If I hadn't found out some of the tricks that
I did I probably would have got busted by now. (TP2, field notes,
1989)
Once an individual has obtained the telephone number to a CU BBS,
through whatever channels, callers follow essentially the same procedure as
they do on licit systems . . . that of calling and logging on. However,
since "underground" boards are not truly underground (that is, totally
secret) first-time callers are not given access to the board itself. When
a user is unable to provide an already valid username/password, the system
will automatically begin its registration procedure. First, the caller is
asked to enter a "username" (the name used by the system to distinguish
between callers) and "phone number." These first system requests, normally
seen only as "Enter Your Name and Phone Number," serve as partial screens
to keep out non-underground callers that may have happened across the
board. The way that a user responds to these questions indicates if they
have cultural knowledge of the CU. The norm is to enter a pseudonym and a
fake phone number.15 If a ___________________
15 A functional reason for this norm is that usernames and telephone
numbers are stored on the computer as part of the BBS system files. Should
the BBS ever be seized in legal proceedings, this list of names and numbers
(and on some systems addresses . . . which are also normally false) could
be used to identify the users of the system. caller enters his or her real
name (or at least a name that does not appear to be a pseudonym) the system
operator will be put on guard that the caller may not be aware of the type
of board that he has called, for the pseudonym is the most visible of CU
cultural traits.
All members of the underground adopt "handles" to protect their
identity. The pseudonyms become second identities and are used to log onto
bulletin boards, and as "signatures" on messages and instructional text
files.16 They are not unlike those adopted by citizens-band radio users,
and reflect both the humor and technical orientation of computer
underground participants. A review of handles used by phreakers, hackers,
and pirates finds that they fall into three broad categories: figures from
literature, films, and entertainment (often science fiction); names that
play upon computers and related technologies; and nouns/descriptive names.
(See Appendix A for fictional examples of each.)
After providing a user name and entering a ____________________ 16
The data suggest that, on the whole, individuals retain their handles over
time.
A password to be used for future calls, the caller is asked several
more questions designed to screen users and determine initial access
privileges. Unlike licit boards, underground BBS may have several
different levels of access with only the most trusted users being able to
read messages and get files in "elite" or "high access" areas that are
unknown and unavailable to other callers. In many cases, pirate boards are
able to operate "above ground" and appear to be open-public access systems
unless callers have the proper privileges to access the areas where the
"good stuff" is located. The answers given to access questionnaires
determine whether a caller will receive access to some, all, or none of the
higher levels. These questionnaires frequently ask for "personal
references" and a list of other boards the caller has "high access" on. The
question is vague, and random callers are unlikely to answer it correctly.
However, if the caller lists pseudonyms of other CU members that are known
and trustworthy to the sysop, as well as some other boards that are known
to have "good users" and "good security" access will usually be granted.17
If all the answers are relevant and indicative of CU ____________________
17 The data suggest that personal references are only checked if something
seems unusual or suspicious. knowledge, then initial access is normally
granted.
Other methods of controlling access include presenting a "quiz" to
determine if the technical knowledge of the user is up to par with the
expertise expected on the boards.18 Some systems, instead of a quiz, ask
the user to write a short statement (100 words or less) about why they want
access, where they got the phone number to the system, and what they can
provide to other users. Some pirate boards come right out and ask the user
to supply a list of the good "warez" that they can upload and what they are
looking to download. If the caller fails to list recent copyrighted
programs then it is evident that they are unaware of the nature of the BBS:
I had this one dude call up and he told me in his message
that he was looking for some "good games." So instead of
giving him access I just left him some e-mail %a private
message%. I asked what kind of games he was looking for.
Next time he called he wrote back and said "a public domain
Asteroids game." I couldn't believe it. Not only is
Asteroids so damn old it's lame, but this guy is looking for
pd %public domain% shit. No way was he going to get access.
He didn't even know what this board is. I left him a message
telling him that I didn't have one. He never called back
after that (CH, sysop of a pirate BBS, field notes, 1988).
____________________
18 One such quiz, from a p/h board, can be found in Appendix B.
Ironically, the pseudo-elaborate security methods of underground
boards, while they may be effective in keeping off random non-CU callers,
are not effective in screening out "feds." Data and media accounts show
that boards are regularly infiltrated by telephone security personnel and
software companies. Also, the adoption of handles to protect identities is
defeated by the consistent use of the same handle over time. But in order
to obtain and maintain status and prestige in the CU one must keep the same
pseudonym in order to (literally) "make a name for oneself." The fact that
CU communication is not face-to-face requires a consistent means of
identifying oneself to others. The handle fulfills this purpose but at the
same time becomes as attached to a single individual as a real name would.
The access rituals of the computer underground, which are contingent on
being a "known" pirate or phreak/hacker, make changing handles
unproductive. The life blood and center of the computer under- ground is
the bulletin board network. Acting as both the main trade center of
performance related tools and innovations and as a means of socialization,
the underground could not exist without the BBS network. They serve to
"recruit" and educate newcomers and provide a way to traffic in information
and software.
The pirating enterprise in particular is very dependent upon the
BBS as they are the very means by which "warez" are traded. For the
phreak/hacker community, BBS provide a means of trading the resources of
system numbers and passwords, as well as instructional texts on techniques.
The access process serves as evidence of mutual association amongst
phreakers, hackers, and pirates as cultural knowledge is needed as well as
personal references (evidence of acceptance and access to others).
The CU bulletin board systems are unique in that they provide a way to
exchange information with a large number of others. The other methods of
CU commun-ication are based on conversations rather than written texts and
thus are much less permanent. These methods, discussed next, are telephone
bridges/loops, voice mail boxes, and computer "chat" systems. Bridges,
Loops, and Voice Mail Boxes
Of the additional means of communication used by the CU, telephone
"bridges" and "loops" are most common. Unlike BBS, which require data
links provided by a computer and modem, bridges and loops are "old
fashioned" voice connections. Since they can not accommodate the transfer
of programs or files they are used primarily by phreakers and hackers, and
most often as a social/recreational outlet.
A "bridge" is a technical name for what is commonly known as a "chat
line" or "conference system." They are familiar to the public as the
pay-per-minute group conversation systems advertised on late night
television. Many bridge systems are owned by large corporations who
maintain them for business use during the day. While the numbers to these
systems is not public knowledge, many of them have been discovered by
phreaks who then utilize the systems during the night.
In addition to these pre-existing conference systems, phreakers have
become skilled at arranging for a temporary, private bridge to be created
via AT&T's conference calling facilities. This allows for conversations to
be held among a self-selected group of phreak/hackers:19
Bridges can be %sic% extremely useful means of distributing
information as long as the %phone% number is not known, and you don't
have a bunch of children online testing out
19 The data indicates that these private conference calls aren't
"scheduled" in any real sense. One p/hacker will initiate the conference
and call others at home to add them to the conference. As more people join
they suggest others to add. The initiator can temporarily jump out of the
conference, call the new person and solicit their attendance. If they don't
want to join or aren't home, the initiator simply returns to the conference
without adding them in.
their DTMF.20 The last great discussion I participated with over a
bridge occurred about 2 months ago on an AT&T Quorum where all we did
was engineer 3/way %calls% and restrict ourselves to purely technical
infor-mation. We could have convinced the Quorum operators that we
were AT&T technicians had the need occurred. Don't let the kids ruin
all the fun and convenience of bridges. Lameness is one thing,
practicality is another (DC, message log, 1988).
In addition to setting up "private" bridges, p/hackers can utilize
"loop lines" in a further attempt to limit the number of eavesdroppers on
their conversations. Unlike bridges, which connect a virtually unlimited
number of callers at once, "loops" are limited to just two people at a
time.
"Loop lines" are actually telephone company test lines installed for
internal use.21 A loop consists of two separate telephone numbers that
connect only to each other. Each end has a separate phone number, and when
each person calls one end, they are connected to each other automatically.
This allows for individuals 20 "Dual Tone Multi Frequency" or in laymen
terms, the touch tone sounds used to dial phone numbers.
These test lines are discovered by phreaks and hackers by programming
their home computer to dial numbers at random and "listen" for the
distinctive tone that an answering loop makes, by asking sympathetic
telephone company employees, or through information contained on internal
company computers. to hold private conversations without divulging their
location or identity by exchanging telephone numbers.
Finally, voice mail boxes ("VMB") are another means of communicating
with individual actors. There are several commercial voice mail box
systems located throughout the country. They function similar to a
telephone answering machine in that callers can call in, listen to a
recorded message, and then leave a message for the box owner. Many of these
systems are accessible via toll-free telephone numbers. The security of
some VMB systems is notoriously poor. Many phreaks have expertise in
"creating" boxes for themselves that are unknown (until discovered) by the
owner of the system. However, these boxes are usually short lived since
discovery by the system operator, and closure of the box, is only a matter
of time. But as long as the box is functioning, it can serve as a means of
communicating with others. VMB numbers are frequently posted on bulletin
boards with invitations to "call if you have any good stuff." They are
often used by pirates to exchange messages about new releases of software,
and by phreak/hackers to trade account and access numbers. Additionally,
some of the underground newsletters and journals obtain boxes so users can
call in news of arrests and other gossip.
Like bulletin boards, VMBs are systems that allow information to be
disseminated to a large number of associates, and unlike the live telephone
conversations of bridges and loops, they are available at any time of the
day. Additionally, VMB's don't require use of a computer and modem, only a
touch tone phone is needed to call the box. Their usefulness is limited
somewhat because they play only one "outgoing" message at a time, and their
transitory nature limits their reliability. Summary
Phreakers, hackers and pirates do not act as loners. They have
adopted existing methods of communication, consistent with their skills in
high technology, to form a social network that allows for the exchange of
information, the socialization of new members, socializing with others, and
in the case of pirates, performing the "deviant" act itself via these
means.
These communication points create and foster groups of loosely
associated individuals, with specific interests, coming together to
exchange information and/or software. It is impossible to be a part of the
social network of the computer underground and be a loner. Based upon the
Best and Luckenbill measure, actors in the computer underground, by
displaying mutual association, organize as colleagues.
The social network of the computer underground provides the
opportunity for colleagues to form cooperative working relationships with
others, thus moving the CU towards a more sophisticated form of social
organization. These "hacker groups" are addressed in the next section.
Mutual Participation
In the previous chapter the ways in which the structure of the
computer underground fosters mutual association were discussed. Their
social outlets and means for informational exchange bring the CU community
together as deviant colleagues. Their relationships fit quite well into
the Best and Luckenbill (1982) typology of collegial associations:
The relationship between deviant colleagues involves limited contact.
Like loners, colleagues perform their deviant acts alone. But unlike
loners colleagues associate with one another when they are not engaged
in deviance . . . In effect, there is a division between two
settings; onstage where individual performs alone; and backstage,
where colleagues meet (cf Goffman). In their backstage meetings,
colleagues discuss matters of common interest, including techniques
for performing effectively, common problems and how to deal with them,
and ways of coping with the outside world (1982 p.37). However,
despite the advantages of collegial association, ties between CU
participants are weak.
Loyalty between individuals seems rare, as the CU is replete with tales of
phreak/hackers who, when apprehended, expose identities or "trade secrets"
in order to avoid prosecution. These weak collegial ties may be fostered
by the anonymity of CU communication methods, and the fact that all CU
actors are, to some extent, in competition with each other. There are only
so many systems with weak security and once such a system is found, sharing
it with others will virtually ensure that the hole will be sealed when the
increased activity is noticed. Thus while p/hackers will share general
knowledge with each other, specific information is not disseminated
publicly.
As Best and Luckenbill have observed, in order to remain in a
collegial relationship individuals must be able to successfully carry out
operations alone (1982 p.45). In order to sustain a career in p/hacking one
must pursue and collect information independent of what is shared on the
communication channels. Despite the association with other phreakers and
hackers, the actual performance of the phreak/hacking act is a solitary
activity.22
That is not to say, however, that p/hackers never share specific
information with others. As discussed earlier, p/hack bulletin board
systems frequently have differentiated levels of access where only highly
regarded individuals are able to leave and read messages. These areas are
frequently used to keep ____________________
22 This does not hold true for pirates. By definition they must trade
programs with other individuals.
information from "unskilled" users at the lower levels. There are
strong social norms that some information should not be shared too widely,
as it may be either "abused" or fall into the hands of enforcement agents.
For example, when one p/hacker announced that he was going to release a
tutorial on how to infiltrate a new telephone company computer, he received
the following messages in reply:
Not smart, DT. %That computer% is a system which can be quite powerful
if used to its potential. I don't think that information on
programming the switches should be released to anyone. Do you realize
how destructive %that computer% could really be if used by someone who
is irresponsible and intends on destroying things? Don't even think
about releasing that file. If you do release that file, it will
disappear and will no longer remain in circulation. Believe me. Not
many have the right to know about %that computer%, or any other
delicate telco computers for that matter. Why do you think the fucking
New York Times published that big article on hackers screwing around
with telco machines? Not only will you get into a lot of trouble by
releasing that file on %computer%, you will be making telcos more
aware of what is actually happening, and soon no one will be able to
learn about their systems. Just think twice (EP, message log, 1988).
Why would you want normal people to have such knowledge? Any why would
you post about it? If you have knowledge that's fine but DON'T spread
that knowledge among others that may abuse it. It's not impressive! I
don't know why anyone would want to disperse that knowledge. Please
don't release any "in depth" files on such systems of great power.
Keep that to yourself it will just mess it up for others (UU, message
log, 1988).
The desire to share information with selected colleagues often leads
to the formation of cooperative "working groups." These partnerships are
easily formed, as the structure of mutual association in the CU creates a
means where "talent" can be judged on the basis of past interactions,
longevity in the field, and mutual interests. When allegiances are formed,
the CU actors begin "mutual participating" in their acts, thus becoming
"peers" in terms of social organization. Mutual participation, as defined
in the Best and Luckenbill typology, is exhibited by actors sharing in the
same deviant act, in the physical presence of one another (1982 p.45).
However, the measurement was "grounded" in studies of traditional deviant
associations (eg: street gangs, prostitutes, etc.) where "real-time"
interaction is common. The technology used by the CU negates this
requirement as actors can be located in different parts of the country.
Additionally, "hacking" on a system, by a group of peers, does not require
simultaneous participation by all members. However Best and Luckenbill's
typology is an ideal type, and the activities of peers in the computer
underground do not fall outside of the spirit or intention of their concept
of mutual participation. Their description of deviant peer associations is
presented here:
Deviant peers are distinguished from colleagues by their shared
participation in deviance. While colleagues carry out their deviant
operations alone, peers commit deviant acts in one another's presence.
Peers cooperate in carrying out deviant operations, but they have a
minimal division of labor, with each individual making roughly
comparable contribution. Peer relationships also tend to be
egalitarian and informal; some peers may be acknowledged leaders or
admired for their skill, but there is no set division of authority.
Like colleagues, peers share subcultural knowledge, but peer groups
typically provide their members with more support. In addition to
cooperating in deviant operations, peers may recruit and socialize
newcomers and supply one another with deviant equipment and social
support. Thus, the bonds between peers are stronger than those
linking colleagues (1982, p.45).
Peer associations in the CU are largely limited to small groups23
working on a specified goal. Both pirates and p/hackers organize
themselves in this regard, though their characteristics differ. We begin
with a discussion of mutual participation among pirates. Pirate Groups
In terms of the ideal type for deviant peers any two individuals
working in cooperation exhibit mutual participation. The discussion here
addresses groups that consist of three or more people that identify
themselves as a sort of "club." Short-lived interaction between two people
is not considered a "group" in the CU culture. members. Their primary
purpose is to obtain the latest software, remove any copy-protection from
it, and then distribute it to the pirate community. Often the "warez" that
they distribute will be adorned with the group name, so subsequent users
will be aware of the source of the software. Many pirate groups have
"home" BBS systems that act as key distribution points, and as places where
outsiders can communicate with members of the association. This researcher
was unable to obtain data about the internal organization of pirate groups,
but it appears that they are leaderless, with individual members working
alone but giving credit to the group as a whole. Phreak/hack groups The
existence of phreak/hacker groups is well documented in the data, and has
been heavily reported in the media. Two hacker groups in particular, The
414's (named for the Wisconsin area code in which they lived), and The
Inner Circle, received a large amount of press after being apprehended for
various computer break-ins. However, the "threat" that such groups
represent has probably been overstated as the data indicate that "hacker
gangs" vary greatly in organization and dedication to the CU enterprise.
Many hacker groups are short-lived associations of convenience, much like
the "no girls allowed!" clubs formed by young boys. They often consist of
four to nine beginning phreak/hackers who will assist each other in
obtaining telephone credit-card numbers. By pooling their resources, a
large number of illicit "codez" can be obtained and shared with others.
Distribution of the account numbers is not limited to the group, they are
often shared with the community at large, "courtesy of Codez Kidz Ltd."
Groups of this type are looked at with disdain by "elite" phreak/hackers
and are often criticized as being more interested in self-promotion then
they are with actually phreaking or hacking.
Some hacker groups are very proficient and dedicated to their craft,
however. These groups are characterized by smaller memberships, less
visibility to non-members, and commitment to the CU enterprise. They are
loosely organized, yet some have managed to exist six or more years despite
members dropping out or being arrested. These "elite" groups are selective
about membership, and cite trust and talent as the two leading requirements
for joining:
The group exists mainly for information trading. If you trust everyone
else in the group, it is very profitable to pool information on
systems . . . also it is nice to know someone that you can call if
you need help on operating system X and to have people feel free to
call you if they need help on operating system Y (AN, message log,
1988). Trust is a very important part of a group. I think that's
blatantly obvious. You have to be able to trust the other members of
the group with the information you are providing in order to be
productive, and have a secure situation (UU, message log, 1988). . . .
all groups serve the same purpose: to make their members feel better
about themselves (like, wow, I'm in a group) and to trade things,
whether it's wares, codes, or whatever. But the thing is that being in
a group is like saying "I trust you, so like, what can we do
together?" (NN, message log, 1988)
Indeed, hacker groups are formed primarily for the purpose of
information exchange. To this end, groups attempt to recruit members with
a wide variety of "specializations" in order to have a better support
network to turn to:
%Our group% has always been very selective about members (took me six
years to get in). The only reason the group exists is to bring
together a diverse group of talents. There is very little overlap in
%the group% these days. Everyone has one thing that they are the best
in the country at, and are conversant with just about any other form
of hacking. As an example, I got into a Primos computer this morning
around 9 am. Once I got in, I know enough about Primos to get around,
but that's it. So I call %PS% in New York, give him the info, and when
I get home tonight, he has gotten in and decrypted the entire
username/password file and uploaded it to me. But two weeks ago he
got into a VAX. He got the account to me, I called it up and set up
three backdoors into the system that we can get in if the account is
detected or deleted. Simple matter of communism. From each according
to his ability . . . etc. Also
it helps that everyone in the group is experienced enough that they
don't fuck up accounts you spend all day getting (TM, field notes,
1989).
Consistent with the Best and Luckenbill ideal type, hacker groups do
not exhibit a set division of authority or labor. Most groups are
leaderless, and every member is free to pursue their own interests,
involving other members of the group only when desired:
We just got our group together. We've got a guy that does VMB's and a
Sprinter %obtains "codez" from U.S. Sprint% and a couple of hackers.
Everybody's free to pursue whatever system they want but if they want
or need some help they can call on any of the other members if they
want to. Like if one guy is scanning and finds a VAX he might call
and give me the dialup. Then I might have to call our Sprinter to get
some codez so I can start hacking on it. Once I get through I'll give
the account to the other members. But if I found it myself I wouldn't
have to give it out but I probably would anyway 'cuz keeping it would
be bullshit (DC, field notes, 1988).
There isn't a leader really. The guy who starts the group sort of
acts like a contact point but everyone else has everyones' phone
number and you can call whoever you want to anytime. Usually when
you're putting a group together you just get everyone you want and you
all decide on a name. (DC, field notes, 1988).
Summary
By virtue of the extensive social network found in the CU, some
participants form work groups. The sophistication of these groups varies,
but in all cases it is evident that the groups exist to support what are
primarily individually performed activities. The groups exhibit many of
the ideal-type characteristics of peer associations, and it is clear that
in some cases the computer underground is socially organized as peers.
Conclusion
Phreakers, hackers, and pirates do not act as loners. Loners do not
associate with others, and are on their own in coping with the practical
problems presented by their activities (Best and Luckenbill 1982, p.28).
From the data presented here, it is evident that the computer underground
has established an extensive social network for the exchange of resources
and mutual support. The characteristics of the CU varies according to the
goals of the participants, but the presence of mutual association is
consistent. Contact between individuals is limited, with the acts of
phreaking or hacking being committed alone. Computer underground
participants do associate with one another in order to discuss matters of
common interest, such as performance techniques, news, and problem solving.
To facilitate this informational exchange, they have established a
technologically sophisticated network that utilizes computer bulletin
boards, voice mail boxes, telephone bridges, and telephone loops.
The collegial organization of the computer underground is further
evidenced by the establishment of a CU culture. The subcultural adaptation
of language, expectations of normative conduct, and status stratification
based on mastery of cultural knowledge and skill, all indicate that the
computer underground is, at the very least, a social organization of
colleagues (see Best and Luckenbill, 1982, p.37). The very structure that
permits mutual association among CU participants also encourages some to
form working relationships, thus acting as peers by mutually participating
in CU activities. Peers organized in this manner share in their deviance,
organizing informally with little division of labor or set division of
authority (Best and Luckenbill, 1982, p.45). These peer associations
provide support to members, and can provide socialization and recruitment
functions for newcomers. The establishment of work groups, through mutual
participation, indicates that though the computer underground is largely
organized as a network of colleagues, it is also, to some degree, a social
organization of peers.
Best and Luckenbill (1982) describe two additional forms of deviant
associations that are more organizationally sophisticated than peers:
"mobs" and "formal organizations." The computer underground, however, does
not display the requisite characteristics of these organizational types.
The primary characteristic of "mobs" is an elaborate division of labor
(Best and Luckenbill, 1982, p.25). While some CU groups do exhibit a
rudimentary division of labor based on individual members' specialization,
it is not by any means "elaborate." Any division of labor that does exist
is voluntary and arises on the basis of specialized knowledge, not a
specialized organizational role.
In much the same manner the lack of a designated leader or leadership
hierarchy prevents CU groups from being categorized as "formal
organizations" in the Best and Luckenbill typology. Deviant organizations
at this level are quite sophisticated and there is no empirical evidence
that the computer underground is organized in this manner.
This study of the computer underground has been a test of the Best and
Luckenbill typology of the social organization of deviants. As a test of
their organizational indicators, the CU has shown that the categories are
well constructed, with the possible exception of limiting "mutual
participation" to acts carried out in the presence of others. However, if
we modify this to include non-simultaneous, but cooperative, acts as found
in phreak/hacker groups, the category is otherwise robust. The flexibility
of the typology, which explicitly recognizes that not all deviant
associations will display all of the character- istics (Best and
Luckenbill, 1982, p.25), is a strength that allowed it to be easily used in
terms of the computer underground.
By addressing the CU from a social organizational viewpoint we have
seen that despite the high technology trappings of their craft, pirates,
phreakers, and hackers display organizational characteristics found in
other groups that have been criminalized. This may suggest that the
development of sophisticated tools to commit "crime" does not necessarily
affect the ways in which individuals organize their activities.
The implications of peer and collegial organization for the members of
the computer underground are vast. The level of sophistication has a
direct relationship to the types of resources on which individuals can draw
(Best and Luckenbill, 1982, p.54). Because CU members are mutually
associated, they are able to turn to colleagues for advice and support with
various problems. However, at the collegial level they are left to enact
the solutions independently. Whether or not they are successful in doing
so will determine if they choose to remain active in the computer
underground. The data show that involvement in the CU is short in
duration, unless success in early phreak/hack attempts is obtained. As
long as the CU remains organized as a collection of colleagues, this trend
will continue. Additionally, as the computer and telephone industries
become more sophisticated in preventing the unauthorized use of their
facilities, new phreak/hackers are unlikely to succeed in their initial
attempts at the act, thus dropping away from the activity and never
becoming acculturated to the point where peer relationships can be
developed.
At the peer level, a dimension of sophistication that some members of
the CU do display, the knowledge and resources to solve problems and obtain
resources is greater. However, even at this level the ties between peers
remain weak at best. Although their cooperative ties allow for more
sophisticated operations, and somewhat reduce the CU's vulnerability to
social control agents (Best and Luckenbill, 1982, p.53), it still does not
completely eliminate the need for individual success in order to sustain a
CU career. As long as the CU remains at the current level of
organizational sophistication, with weak ties and somewhat limited means of
support and resource attainment, it will continue to be a transitory and
limited "criminal" enterprise.
This realization should be considered by policy makers who desire to
further criminalize computer underground activities. Given the current
organization of the CU, the future social costs of their actions are not
likely to expand beyond the current level. There is no evidence to support
assertions that the CU is expanding, and the insight provided here shows
that it is not likely to do so on a large scale.
For sociologists, the computer underground is a field rich for insight
into several areas of concern. Future research into the career path of CU
members, and the relationships between individuals, could prove helpful to
those interested in applying theories of differential association and
career deviance. Additionally, the computer underground provides a unique
opportunity to study the process of criminalization, and its effect on
those who are engaged in the behavior.
REFERENCES
Best, Joel and David F. Luckenbill. 1982. Organizing
Deviance. Englewood Cliff, New Jersey: Prentice-Hall.
Bequai, August. 1987. Technocrimes. Lexington, Mass.:Lexington
Books.
Bickford, Robert. 1988. Personal communication to Gordon Meyer.
Chicago Tribune. 1989. "Computer hacker, 18, gets prison for
fraud." Feb. 15:2,1.
Field Notes. Interviews with phreakers, hackers, and
pirates. Conducted from 7/88 to 4/89 (confidential material in
authors files).
Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The
Process of Criminalization: The Case of Computer Crime
Laws." Criminology 26:101-126.
Levy, Steven. 1984. Hackers: Heroes of the Computer
Revolution. New York: Dell Publishing.
Message Logs from a variety of computer underground
bulletin board systems, (confidential material), 1988-
1989.
NBC-TV. 1988. Hour Magazine. November 23, 1988. Parker, Donn B.
1983. Fighting Computer Crime. New York: Charles Scribner's
Sons.
Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box."
Esquire October, pp. 116-125.
Small, David. 1988. Personal communication to Gordon
Meyer.
WGN-Radio. 1988. Ed Schwartz Show. September 27, 1988.
APPENDIX A
COMPUTER UNDERGROUND PSEUDONYMS
_____________________________________ _____
Literature, films,|Computers & |Nouns, titles & |
and Entertainment |related technology |Descriptive names|
------------------------------------------
Pink Floyd | Mrs. Teletype | The Professor |
Hatchet Molly | Baudy Bastard | Perfect Asshole |
Jedi Knight | Doctor Phreak | The Messiah |
King Richard | Lord FAX | Right Wing Fool |
Captain Hoga | CNA Office | Bed Bug |
Al Crowley | Sir Mac | Sleepy Head |
Doc Holiday | Busy Signal | Mean Underwear |
Mr. Big Dog | Silicon Student | Cockroach |
Robin Williams | Fiber Cables | Primo Bomber |
Big Bird | Phone Crasher | The Prisoner |
Cross-eyed Mary | Doc Cryptic | Night Lighting |
Capt. America | Apple Maniac | No Regrets |
Uncle Sam | Fuzzy Sector | Grounded Zero |
Thumpr | Cntrl. Alt. Del. | Spit Wad |
Little John | Byte Ripper | Shado Dove |
-------------------------------------------
APPENDIX B
NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS Welcome to Analog
Electronics Datum System. Please take this time to fill out a one-time
questionnaire that will allow us to determine your level of access on
Analog Electronics Datum System.
If any question is too difficult for you to answer, just answer with
your best guess or a simple "I don't know."
We basically have two different divisions or types of users on this
system:
(1) Apple (%%,Mac), and IBM software traders
(2) Telecommunication hobbyists -any/all computers
(networks, mainframes, engineering)
Your answers will help us decide which category you belong to and what
access you should get on our system.
* What type of computer & modem are you using to call this system?
* Where did you get the phone number to Analog Electronics Datum System?
* We'll need your first name and real phone # where you can be reached for
validation purposes only, this information is kept in a password encoded
file, on another computer (critical for higher validation):
First for the FILE TRANSFER AREA ACCESS
questions: (1) How many bits are in a nibble? (Assume 6502 micro
processor)
(2) Define WORM, RAM, ROM, VDT, CRT, BPS? (Pick any 3)
(3) What does 2400 baud mean in terms of bit transfer speed?
(4) What is PT,MT,AE,BIN2,Ymodem Batch,BLU? (Pick any 4)
(5) How many Megahertz does a standard Apple %%+ run at? (rounding OK)
Now for the TeleCommunication Questions:
(1) Describe the Voice Transmission Use of a Loop:
(2) If I gave you my phone #, how would you find my name and address?!
(3) Can you name any networking software operating systems or protocols?
(4) What is the highest frequency a twisted two wire pair can transmit at?
(5) We believe Phones and Computers Belong Together, what do you BELIEVE?
Ok, thanks for that info.
A MESSAGE FROM AL CAPONE (LOCAL) AND THE TRADER (LD) SYSTEM VALIDATORS
--------------------------------------
Welcome to ALDS! As a new user you have made a change for the
better in choosing this system as one of your places of telecommunication
exchange. In my opinion, this is one, if not the best, system in
telecommunications today as most of the good boards such as Shadowspawn,
Metal Shop Private, etc. do not exist anymore. Quality users exist on
this system that have established a reputation for themselves so questions
you ask will be answered thoroughly and precisely. We are a sponsor board
of the LOD/H Technical Journal, and accounts have been established
representing Phrack, Inc. and 2600 Magazine. (For our software trading
people, we also have an excellent file transfer area . . . consistent with
the rest of the nation . . . )
Due to the high quality of our system, we will need some additional
information about you. Maintenance of a high quality system requires high
quality users, so the first step in this process is keeping the low quality
users off of the system . . . so please cooperate with us . . . this is
for your benefit as well as ours. The information you give us will be
cross referenced with other systems for accuracy, and if you leave false
information, you may suffer low access or deletion.
All phone number information is stored outside of the housing of this
system inside of an encrypted, password locked file for your security. So
if you have left an invalid phone #, please leave one where you can be
reached, or someone's name and number (if possible) that will vouch for
you. Keep in mind this validation can take up to 1 week to complete due to
the high volume of new callers to our system. Note: Limited system access
will be granted within 24 Hrs if all of your info seems correct. Thanks in
advance . . . Bu gs y Ma lo ne
The Swapp er
SYSOP/SYSTEM VALIDATORS
% Bugsy Malone needs the following info: %
(1) Your references (sysops, other users on this system, other BBS).
(2) Your interests in having access to our system.
(3) How do you feel you can contribute to our system?
(4) How many years of telecommunication experience do you have?
(5) Do you have any special talents in programming, or operating systems?
If yes, then name the language(s) or operating system(s).
Enter message now, answering these questions: %after entering the message
the BBS hangs up and the caller will call back in 24 hours to see if
access has been granted.%