home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.18 (December 28, 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith
- PERIPATETIC GADFLY: Brendan Kehoe
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission.
- It is assumed that non-personal mail to the moderators may be reprinted
- unless otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: Computers Under Attack
- File 4: CU Resources in Germany
- File 5: Trade Secrets; When are they Bad?
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #2.18: File 1 of 5: Moderator's corner ***
- ********************************************************************
-
- From: Moderators
- Subject: Moderators' Corner
- Date: December 28, 1990
-
- ++++++++++
- In this file:
- 1. FTP FILES
- 2. RESOURCES OF CU INTEREST
- ++++++++++
-
- +++++++++++++++++++++
- FTP Files
- +++++++++++++++++++++
-
- The FTP archives are steadily growing. They include Network Information
- Access (NIA), a few new CU magazines, and a variety of computer crime
- statutes (state, federal, foreign), and a few new papers written by law
- students and attorneys. Thanks to all those who send material along. If you
- submit a long paper (20 pages or more), please be sure the format is
- complete (biblio and footnotes not excluded if cited in the text) and line
- length is not over 80 characters per line. Papers should be of publishable
- quality and not simply stream-of-consciousness opinion. If you're not sure
- if your paper is appropriate, send it along anyway. Papers should be timely
- or of historical/archival value, and not something you happened across on a
- BBS somewhere that is dated.
-
- --------------------
- Resources Worth Looking At
- --------------------
-
- There are a number of first-rate resources available on the nets for
- computerists of all stripes. Among those of particular value include:
-
- 1. TAP MAGAZINE: TAP contains a variety of information and can be obtained
- for only a postage stamp for each issue from:
- TAP
- PO Box 20264
- Louisville, KY 40250
-
- 2. 2600 Magazine: 2600 covers a broad range of topics, ranging from
- technical material to political analysis. It is published quarterly in
- hardcopy format. It also holds periodic meetings and is an excellent
- resource for information of relevance to a variety of interests. 2600
- Magazine can be reached at:
-
- 2600@well.sf.ca.us OR
- 2600 EDITORIAL DEPARTMENT
- P.O. BOX 99,
- MIDDLE ISLAND, NY 11953
-
- 3. EFF DIGEST: The Electronic Frontier Foundation's first issue of EFF
- Digest is out, and it is essential reading for those keeping up with the
- the specifics of EFF activity as well as for following legal cases and
- other issues affecting the computer world. The first issue provides a
- detailed summary of the EFF goals and activities to date.
- E-mail subscription requests: effnews-request@eff.org
- Editorial submissions: effnews@eff.org
- Or:
- Electronic Frontier Foundation
- 155 Second St.
- Cambridge, MA 02141
- (617) 864-0665
- (617) 864-0866 (fax)
-
- 4. BMUG (Berkeley Macintosh Users' Group) Magazine: Don't be deceived by
- the name. BMUG contains a variety of articles relevant to all computerists
- and is well worth reading. The Fall/Winter 1990 issue of the BMUG
- newsletter will be available as of February, 1991. Cost is $25 (comes with
- 6 month BMUG membership). To subscribe, call BMUG at (415) 549-BMUG.
-
- 5. PHRACK CLASSIC: What can we say? Contact them at pc@well.sf.ca.us
-
- 6. TELECOM DIGEST: TCD, edited by Pat Townson, focuses primarily on telecom
- issues of all kinds (technical, legal, rumor, facts, news articles). During
- a period of hot topics, several issues can come out in a day. Pat chases
- down rumors, keeps posts relevant, and has established TCD as the premier
- e-mail source for telecom information. There is also an ftp site for back
- issues. To subscribe, contact:
- telecom@eecs.nwu.edu
-
- 7. NIA: Network Information Access, although fairly new, has published 68
- issues to date. The first issues were relative short, but, beginning with
- #68, the issues will be longer and provide a variety of detailed technical
- and other information. For more information, drop a note to:
- elisem@nuchcat.sccsi.com
-
- 8. NEWSBYTES: The Newsbytes News Network is an electronic news service
- dealing solely with technology issues. It is published daily on GEnie and
- is available in a semi-weekly format on Dialog, America On-Line, NewsNet
- and a Japanese newsnetwork. Excerpts are also downloaded for publication
- by Newspapers throughout the country (such as Computer Currents). The
- service is international and has bureaus from Moscow to Sydney, Australia.
- For more information, contact: mcmullen@well.sf.ca.us; CompuServe -
- 70210,172; GEnie - nb.nyc; AppleLink -- x1888 and MCI - 316-9687 with any
- comments or additions.
-
- There are other good resources out there, and we will include them in
- future issues. There are also a number of good BBSs with extensive
- collections of text files or discussion sections (Ripco, The Well, The
- Works, Face-to-Face), and we will list a few of them next month. If you
- know of exceptional boards worth mentioning, pass the names and numbers
- along.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Various
- Subject: From the Mailbag
- Date: December 28, 1990
-
- ********************************************************************
- *** CuD #2.18: File 2 of 5: From the Mailbag ***
- ********************************************************************
-
- From: Carrier Wave <MERCURY@LCC.EDU>
- Subject: Operation Sun Devil and Ayn Rand
- To: TK0JUT1%NIU.BITNET@UICVM.UIC.EDU
- Date: Fri, 21 Dec 90 09:15 EST
-
- Operation Sun Devil and
- Ayn Rand's Theory of "The Sanction of the Victim"
- by Michael E. Marotta, mercury@well.sf.ca.us
-
- Arthur Koestler's novel, Darkness at Noon, tells of the downfall of a
- Bolshevik. He is purged by the party, charged with conspiring to
- assassinate Stalin. Of course, he did no such thing, but he soon comes
- to understand the needs of his captors. As a Bolshevik, he knows the
- theory of the centralized democracy and he comes to understand that
- merely questioning authority is no different than a physical assault on
- the Leader. The operant theory in this true-to-life example was later
- enunciated by Ayn Rand in her novel, Atlas Shrugged. She called it
- "The Sanction of the Victim."
-
- In Atlas Shrugged, the heroes are engineers and investors who learn to
- reject mysticism, altruism and collectivism. They learn to be proud of
- their own achievements. They identify and reconcile the contradictions
- that tore them apart and allowed them to be regulated, ruled, taxed and
- vilified. One of the highlights of this novel is the trial of Hank
- Rearden, a steel industrialist who violated an equalization of opportunity
- law. He tells the court that it can sentence him to anything and he is
- powerless to prevent that but he will not help them by participating. He
- does not recognize their right to try him and he will not help them pretend
- that the trial is just. He is acquitted.
-
- If this seems too unreal, consider the case of Craig Neidorf in Chicago and
- compare it to the trials of the Legion of Doom in Atlanta. Neidorf stood
- his ground, prepared a First Amendment defense and asked for help from the
- pioneers on the electronic frontier. The government dropped its charges.
- In Atlanta, the hackers co-operated with the government, informed on each
- other and even testified against Craig Neidorf and they were sentenced to
- prison. Neidorf incurred legal expenses near $250,000. This is also about
- the size of the fines to be paid by each of the LoD hackers in Atlanta.
- The difference, of course, is that Neidorf is free and they are in jail.
-
- The decision to go to trial rested on the premise that Right makes Might.
- Niedorf prepared a First Amendment argument. In point of fact, victory
- hinged on the demolition of the government's evidence. A suitable defense
- could have been created from any perspective. The First Amendment is a
- broad shield that protects religion, speech and assembly in addition to
- writing. The Tenth Amendment guarantees all those necessary and proper
- rights enjoyed by the people that are not specifically enumerated in the
- Bill of Rights. Niedorf could have claimed that he was performing a
- challenge commanded of him by the Gods of Olympus. What counted most is
- that he felt that his accusers were morally wrong.
-
- The Legion of Doom went down the drain in Atlanta because they granted the
- moral high ground to the government. They were wrong in their own eyes and
- they deserved punishment by their own standards. Their viewpoint and their
- standards were the same as the government's.
-
- The question then becomes: Is hacking right? Unless you want to go to
- jail, you better find a lot of reasons to believe that it is.
-
- +++++++++++++++++++++++++
-
- From: gnu@TOAD.COM
- Subject: Re: "strangers probing for security flaws" -- another view
- Date: Fri, 21 Dec 90 13:11:14 -0800
-
- Given the existing state of computer security (i.e. it requires excessive
- care by a system administrator to make a system more than nominally
- secure), I think that whatever automation we can bring to bear on security
- testing is welcome.
-
- Suppose there was a free program, available in source code and scrutinized
- by wizards all over the net, that you could run to test your security. If
- you had the time, you might run it and fix up the things it found. If you
- didn't have the time, those things would probably go unfixed.
-
- If someone at a remote site (Italy?) volunteers to run such a program and
- mail you the results as they pertain to your site, are they performing you
- a service or a disservice? I don't know about you, but when a stranger
- knocks at my door to tell me that I left my garage door gaping wide open
- and the neighborhood hoods are eyeing my bicycles, I usually thank her
- rather than knocking her down and calling the police. Then I go and fix
- the garage door.
-
- If the stranger had taken a few bicycles before coming and telling me about
- the problem, that would be different. But even that is preferable to their
- stealing the bicycles and not even telling me I had a problem.
-
- Sites all over the Internet *are* being probed by people who want to do
- them harm. We know this as a fact. I would prefer if we had some
- volunteer "cop on the beat"s who would walk by periodically and rattle the
- door to make sure it's locked.
-
- John
-
- ++++++++++++++++++++++++++
-
- From: snowgoose!@UUNET.UU.NET
- Date: Mon, 17 Dec 90 16:16:00 -0500
- Subject: Is Technology Beyond the Law?
-
- Is Technology Beyond the Law?
-
- There are many factors which shape events like Operation Sun Devil.
- Certainly mission, political mandate, public perception, and human frailty
- are forces which shaped the behavior of the Secret Service. But, the
- juxtaposition of technology and the law may well be the most significant
- factor.
-
- Law is (or at least, is supposed to be) a reflection of the needs of
- society for definition of and protection of its interests. Technology
- presents rapidly changing circumstances with which the law, because the
- people, cannot keep abreast. Technology is, and will always be, beyond the
- law?
-
- Now, I'm not a lawyer, and I haven't got a clue of how to conceptualize
- this under the law, but consider the following:
-
- One day, the Secret Service shows up at my door with a search warrant to
- seize and search my computer for incriminating evidence. They get my
- computer back to their lab and discover that the entire hard disk is
- encrypted, (probably block by block). Upon further examination, they find
- either an encryption card or a software encryption routine in the disk
- driver. I'm not going to give them the key. I have used a sufficiently
- difficult encryption technique as to frustrate even the NSA. Where does
- that leave their investigation? Where does that leave my computer?
-
- Is there a concept in the law which requires that a law must be
- enforceable? If so, isn't investigation an enforcement procedure? If so,
- and if the law isn't enforceable, what happens to my computer with its
- encrypted disk?
-
- I have intentionally exaggerated the technical circumstances to raise the
- question, but it seems to me that the same situation exists today. The
- Secret Service has had 40+ computers and 23,000? disks since their seizure
- on May 8th, 1990. If we assume that the Secret Service has procedures
- (methods and techniques) for using the seized property in their
- investigation, then is there a time limit on how long the investigation
- can continue? If it could be demonstrated that there were *no* procedures
- for using the seized property in furtherance of the investigation, would
- they have a right to have seized it?
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: Thu, 6 Dec 90 15:00:32 PST
- From: Peter Denning <pjd@riacs.edu>
- Subject: Computers Under Attack
-
- ********************************************************************
- *** CuD #2.18: File 3 of 5: Computers Under Attack ***
- ********************************************************************
-
- COMPUTERS UNDER ATTACK
- Intruders, Worms, and Viruses
- Edited by Peter J. Denning
- ACM Press and Addison-Wesley, 1990, 554pp
- $18.50 ACM members, $20.50 others
-
- On behalf of ACM Press and the authors of the 38 articles brought together
- in this edition, I am proud to announce that our book on the subject of
- attacks on computers is now available.
-
- This subject continues to receive ongoing attention in the national press
- --for example, the recent discovery of $12M of toll fraud at the NASA
- Johnson Space Center, Operation Sun Devil, an Esquire article about
- computer pirates breaking in to the Bell System, and the recent splashy
- appearance of the NRC report, "Computers at Risk".
-
- The purpose of this book is to tell the story of attacks on computers in
- the words of those who are making the story and who see the broad
- perspective in which it is taking place. We have painstakingly selected
- the articles and have provided connective material to bring out the global
- context and show that the problem is not purely technology, not purely
- people, but a product of the interaction between people and computers in a
- growing worldwide network.
-
- After and introduction and preface by me, the articles are arranged in six
- parts. Most of these have been previously published, but there are a few
- new pieces specifically commissioned for this volume.
-
- PART I: THE WORLDWIDE NETWORK OF COMPUTERS
-
- Worldnet and ARPANET by Denning, overview of networks by Quarterman,
- reflections by Thompson, survey of computer insecurities by Witten.
-
- PART II: INTRUDERS
-
- Reflections by Reid, Wily hacker story by Stoll, a followup commentary by
- Mandel, and a business perspective by Wilkes.
-
- PART III: WORMS
-
- Internet worm overview by Denning, perspectives on the Morris worm by MIT's
- Rochlis et al, Purdue's Spafford, and Utah's Seeley, executive summary of
- Cornell Report, Morris indictment and trial summary by Montz, original worm
- paper by Shoch and Hupp.
-
- PART IV: VIRUSES
-
- Virus overview by Denning, BRAIN and other virus operation by Highland,
- virus primer by Spafford et al, viral protection in MS/DOS by Brothers, and
- a perspective on viruses by Cohen.
-
- PART V: COUNTERCULTURES
-
- Computer property rights by Stallman, cyberspace literature by Paul Saffo,
- a dialog on hacking and security by Dorothy Denning and Frank Drake.
-
- PART VI: SOCIAL, LEGAL, AND ETHICAL IMPLICATIONS
-
- A spectrum of commentaries: moral clarity and sending a signal by Denning,
- global city by Morris, virus bills in congress by Crawford, GAO report
- summary, legal issues by Samuelson and by Gemingani, computer emergency
- response by Scherlis et al, ethics statements by various organizations, ACM
- President's letters by Kocher, ACM forum letters, law and order for the PC
- by Director, RISKS perspectives by Neumann, crimoids by Parker.
-
- To order the book, run to your local bookstore or call ACM Press Order
- Department. For credit card orders only call 800-342-6626 or in
- Maryland and outside the continental US call 301-528-4261 and for mail
- orders ACM Order Department, P. O. Box 64145, Baltimore, MD 21264. The
- price for ACM members is $18.50 and for nonmembers $20.50. Shipping is
- extra unless you send a check to the order department. BE SURE TO INCLUDE
- YOUR ACM MEMBER NUMBER AND THE BOOK ORDER NUMBER (706900).
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: "Martin Huber" <martin@EE.UNI-SB.DE>
- Subject: CU Resources in Germany
- Date: Fri, 14 Dec 90 04:29:59 +0100
-
- ********************************************************************
- *** CuD #2.18: File 4 of 5: CU Resources in Germany ***
- ********************************************************************
-
- %Moderators' note: We in the U.S. tend to be rather insular and often think
- of the CU world as limited to the 48 contiguous states. We are constantly
- reminded by cybernauts elsewhere that we should be more aggressive in
- recognizing that cyberspace is non-territorial. There are numerous articles
- and newsbits out there that we don't often see because of language
- barriers. We *STRONGLY ENCOURAGE* readers fluent in other languages to
- either send over translations or send summaries of various news stories.
- In addition to their general interest, we are finding that scholars, law
- students, and others find this information quite helpful. Thanks to Martin
- for sending the following over. When we spoke with him, he indicated that
- there is considerable activity in Europe that we neglect here in the U.S.,
- and he uses a comment in Pat Townson's Telecom Digest to segue into the
- discussion%.
-
- *******************
-
- In article <15334@accuvax.nwu.edu> (of Telecom Digest the
- moderator writes):
- >
- >Len Rose is beginning to prepare for his defense in Baltimore in
- >February. He is looking for Unix experts/gurus who would be willing to
- >provide general technical testimony about Unix. If anybody is willing
- >to consider it, or can provide the names of others who might be
- >willing, call Len at: (708) 527-xxxx.
- >
- >
- >Jim Thomas
- >Computer Underground Digest
- >
- >
- >[Moderator's Note: Poor Len. He's a great subject-candidate for the
- >old negro spiritual song, "Nobody Knows the Trouble I've Seen". PAT]
-
- I'll side with PAT and Len (although i didn't notice what he did, but today
- a seemingly funny hack can become a ghostly nightmare real fast). Please
- understand that i do not side my criminal activities, but IMHO mostly the
- wrong people get caught. The real criminals nearly get away with it.
-
- Me, i can't give him help (other than moral one). But there are some guys
- here in Germany who should be able to help with real expertise on any kinds
- of hacks (phone, modem, nets, UNIX boxes, other). They are called CCC
- (Chaos Computer Club). Their head has been charged with breaking into some
- kind of NATO network (can't remember details, ask them how it went out). I
- think they won or got a vote of confidence and a slight punishment because
- of having alerted security people about the possibility of the hack. Again,
- to state my opinion: They don't inquire into secrets in order to steal
- something/rob some bank/whatever, but merely want to enwiden their
- knowledge and try to pass information to others. (See below). Oh sh..... .
- Can't find any of their documents in my bureau. Let me try to squeeze my
- brain:
-
- Organization: "Chaos Computer Club"
- Contact: ??????? - they all have lots of nicknames
- City: "DW-2000 Hamburg"
- Country: "Germany"
-
- Check like 1-3 year old infos on the famous NATO hack. Names should appear
- there. I'll be searching back home and try to come up with more info ASAP.
-
- Maybe a secondary contact in Hannover will help: This is a german computer
- magazine called "c't". It is a full-fledged computer magazine for mostly
- small computers and UNIX systems. The spectrum of articles ranges from
- problems in information theory over product reviews, hard- und software
- tests, source code listings in different languages to science-fiction
- stories. They regularly feature editorials on hacking, law problems and
- such and are at the approximate level of expertise as BYTE is in the US (in
- fact, the magazines cooperate). [Of course, professional level in germany
- is in general not as high as in the US (the states are much larger and thus
- have more experts), but in science Germany is competitive.] In their
- January 1991 issue (no kidding, it appears in the mid of December!) they
- published a report on a sociological study on computer freaks which was
- carried out by a german university (Univ. of Trier). In the following,
- i'll give some quotations (transliterated to English):
- [Note that this is done with no regard to copyright issues, i don't know
- what position c't has regarding such matters, but i think it is perfectly
- o.k. to translate something while crediting it to the original author. As
- for publishing, you have my allowance to publish the english summary as
- long as c't or the author is not affected by this move]
-
- ARTICLE: "c't, Jan. 1990, p.44-46"
- AUTHOR: "Claudia Schmidt" [Can't find her listed on the
- publisher staff, seems to be an invited article, i bet she is
- from the research group]
- TITLE: Viele Vorurteile - Computerfreaks im Licht der Soziologie
- [ premonitions abound - computer freaks seen from a sociologist's
- point of view ]
-
- The article starts:
- "In a study sponsored by the Department of the Interior of the FRG
- a group of scientists from the University of Trier tried to find
- access to the world of computer freaks. The sociologists wanted
- to gain a fundamental platform for the assessment of computer
- technology und to unemotionalize the discussion on it.
- Wherever computing centers are, young alert people with rugged
- hair and deep-set eyes can be seen in front of computer consoles;
- their arms are bent und their hands seem to be waiting for hitting
- the buttons of their keyboards which they watch with the same inten-
- sity a gambler watches the rooling dices. Seemingly more relaxed
- they sit at desks loaded with computer listings and meditate like
- scientists over cabalistic treats ....
- This statement dating back to 1977 clearly demonstrates the
- premonitions which usually are ascribed to computer freaks[1].
- 'Pseudo-empirical criticism on culture, mythos-conserving hearsay!'
- it is termed by the authors of a 300-page report of the University
- of Trier[2]. People are adopting fancy images [of freaks] all too
- eagerly: most of the statements suffer from a pseudo-scientific
- method of 'associative reasoning', the scientists claim ...
- The sociologists visited the Chaos Communication Congress 1989
- in Hamburg, ..., 'in order to get a lasting impression of the
- productivity aspects of computer social life' and tested personal
- attitudes of [computer] freaks in meetings with several [computer]
- clubs. After field work, 62 interviews of 1 - 2 hours duration
- complimented by 15 interviews gained from interviews on a BBS
- were to be evaluated.
-
- [A description of a typical freak's school and college time follows
- (boring classrooms for under-rated geniuses), including the treat-
- ment of the early attraction of a typical freak towards technology.
- An interesting bynote states that women tend to exclude the computer
- of their private live and they are said to 'be afraid to destroy
- something'.
- The next paragraph follows the growth of a juvenile freak to
- a competent and professional specialist: ]
- Evolution:
- ... [freaks], according to the scientists can be separated into
- the classes of 'hackers', 'players', 'programmers', 'crackers' and
- 'crashers'.
- Freaks want to use all capabilities of their machines. A high
- degree of professionalism and competence, in general specialist's
- knowledge, gives the benefits of good standing, being recognized
- and admired among fellow professionals.
- The research group noticed that the rapid evolution of technology
- posed a problem. Social sciences always lag behind in assessment
- of new technologies and hust helplessly see a new wave of technology
- coming just as they finished evaluating it's predecessors.
- Lots of questions:
- The only solution to this problem is to tend towards dampening
- critical opinions: Of course the freak is working all alone ...
- in front of his computer, but - does he not communicate with
- fellow freaks over [computer] nets?
- A computer demands clear and concise commands, it cannot handle
- ambiguous statements found in everyday's speech. Under the assumption
- that a broad knowledge of speech is correlated with intellectual
- capabilities, a person who has to adopt his syntactical capability
- to abbreviations fitting a machine is in danger! ... the programming
- paradigm could influence life style towards thinking in rational
- terms only.
- Lone guys:
- On the other hand, there is a thesis that computerization is
- not the reason but the effect of a culture adoring reasoning, and
- that the computer is only fulfilling the wishes of men leaning
- towards a technical zivilisation. ...
- With the impact of lots of new media at home and at work, can
- we see an 'impersonalization of learning', will the real world
- be substituted by a made-up world, which is a secure place to flee
- to? ... Or is this world of synthetic images the expression of a
- desire to create new and singular scenarios, stimulating creativity
- and emotionality in the freaks? Is not today's world by a much
- higher degree plagued by rationalism and lack of emotions compared
- to the computerist's world?
- Summa summarum:
- For public discussion, the scientists drew the following
- conclusions: Since the computer is a well-known part of today's
- work, it is useful for several different specialisations. To the
- freak, it has become a natural part of his live and he spends a
- substantial amount of time and money on it.
- Only people with adequate knowledge can use a computer. A
- broad knowledge of information science is indispensable for a
- freak. His main method of learning is autodidactic. ... The
- 'process of auto-professionalisation' is found across all
- social and professional levels.
- Those activities do not tend to neglect leisure-time acti-
- vities. Electronic media are very important, whereas books
- are not so important (with the exception of cs books). Data
- nets created a renaissance of the art of writing letters.
- Computer freaks are not biased towards technology. From
- their intimate knowledge of systems and their limitations,
- their [the freaks] opinions are well balanced and often two-
- sided. Dangers are seen mainly in big uncontrollable systems.
- Contours of the information age of tomorrow are seen as changing
- and not subject to forecast or planning in a deterministic way.
- Methods of learning und practical work show a high degree
- of personal autonomy. New forms of self-controlled and self-
- confident use of communication medias are evolving hand in hand
- with a culture which does not need federal regulations
- (e.g. in form of laws). [because they are self-regulating, i
- can't resist to make my point here]
- The authors close with a proposal to the ministry of the
- interior to inquire into the usefulness of computerclubs and
- groups of hackers as critics of media, similar to the
- function of ecologist's associations in environment.
- [ The article closes with the perfectly natural observation
- that the degree of weirdness and fanaticism does not vary
- between philanthropists, hobby astrologicians and computer
- freaks ]
-
- [1] J. Weizenbaum, Die Macht der Computer und die Ohnmacht der Vernunft,
- Frankfurt/a.M., 1977, p.160
- [The power of computers and the impotence of common sense]
-
- [2] R. Eckert et al., Im Schatten der Computer-Mythen. Zur kulturellen
- Praxis und den Spezialkulturen von Hackern, Programmierern,
- Crackern und Spielern. Eine ethnografische Untersuchung, Trier,
- [In the twilight of computer myths. On the cultural praxis and the
- specialized cultures of hackers, programmers, crackers and players.
- An ethnografical study]
-
- In the following some more citations from "c't", quoted from the
- indices:
- - c't,October 1990,Rechtliche Rahmenbedingungen fuer die Mailbox
- [ Juristical Framework for BBS ]
-
- - c't,February 1990,Es geht um Milliarden - Niederlage der Post in einem
- Modem-Prozess
- [ billions on stake - telco looses lawsuit concerning modems ]
-
- - c't,May 1989,Hackordnung - Wann wird das Strafrecht fuer Datenreisende
- zur Falle?
- [ hacker's laws - when do hackers get trapped in penal law? ]
- * This is written by a lawyer and treates the relationship *
- * between german penal law and hacker's activities. - excellent. *
-
- - c't,July 1988,Latente Bedrohung - Ueber die Verletzlichkeit der
- Informationsgesellschaft
- [ sleeping danger - about the vulnerability of information culture ]
- * This is an interview with Prof. Dr. Klaus Brunnstein, Univ. of
- * Hamburg, Inst. for applied computer science. He is specialising
- * in the field of computer crimes and the security of computer systems
- * Maybe a candidate for expert opinion?
-
- The publishing company is:
- "Verlag Heinz Heise GmbH"
- "Postfach 610407"
- "DW-3000 Hannover 61"
- Tel. ++49/511/54747-10 (PBX with direct)
- Fax ++49/511/54747-33 (call extensions)
- The editor is:
- "Christian Persson" extension -10
- The vice editors are:
- "Andreas Burgwitz" extension -12
- "Detlef Grell", MSEE extension -13
- They are reachable on "CosmoNet":
- T. ++49/511/555398 300 Baud [ In fact, i think it is *their* BBS
- T. ++49/511/555392 300 Baud ask PAT or other netlanders for
- T. ++49/511/555686 1200 Baud more info. CosmoNet is well used in
- T. ++49/511/555630 1200 Baud Germany, maybe even Europe ]
- T. ++49/511/555302 2400 Baud
- Datex-P NUA: 45511090835 [ This is the german packet switching
- network. I have no idea of how to
- access it from overseas, but a friend of mine working in CA, USA
- should know it. If you need an european mail feed for this, i have
- access (in principle) to internet, bitnet, uucp and thus should be
- able to reach every german host. However, the transition from
- %internet,bitnet,uucp% to e.g. CosmoNet is newland for me. ]
-
- I'll stop here. I have all of the cited articles in my bookshelf.
- I have a FAX and a copier around. So if Len wants to have some, he
- should phone / FAX / mail me. Of course, translations are better to
- be done by somebody which is a native english speaker. I can help
- with nasty german sentences, no problem (with lightspeed communication?
- - never!). Anyway, i'll help what i can, sticking to the old prin-
- ciple: in dubio pro reo.
- --
- /---------------------------------
- Martin / Martin Huber %
- %----------------------------/ Univ. of Saarland %
- %email: mahu@ee.uni-sb.de Dept. of Electr. Eng. %
- %Tel: ++49/681/302-3574 D-66 Saarbruecken 11 %
- %FAX: ++49/681/302-2678 Germany %
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Dark Adept (Ripco-312-528-5020)
- Subject: Trade Secrets; When are they Bad?
- Date: Sat, 1 Dec 90 1:38:06 CST
-
- ********************************************************************
- *** CuD #2.18: File 5 of 5: Trade Secrets: When are they Bad? ***
- ********************************************************************
-
- Trade Secrets: When are they bad?
-
- by
-
- The Dark Adept
-
-
- A trade secret is a method or procedure or information used by a company to
- obtain profit. The law protects trade secrets through copyrighting and
- patenting and various other laws. The main reason a company protects this
- type of information is to stop competitors from producing the same product
- thereby taking away from its profits. The main reason the government
- protects the rights of the company to protect this information is to
- promote innovation and progress (at least according to the U.S.
- Constitution). But, there are times when copyrighting and patenting reduce
- profits and restrict progress and innovation.
-
-
- The User Interface
- ==================
-
- One of the most important aspects of a computer program is the user
- interface (the way in which the user is allowed to interact with the
- computer). Ideally, a program should be able to perform complex tasks and
- remain user-friendly. However, the user interface does not affect the way
- in which the program completes its task. Two different programs with the
- same user interface can perform the same task in two different ways. One
- might be better or faster at the task than the other. Conversely, two
- programs that perform different tasks may have the same user interface.
- The point is that the user interface is generic. It can be applied to many
- different programs without changing the value of the program. It merely
- enhances or detracts from the program.
-
- In the same way, the user interface of any product does not change the
- integral operation of the product. Take the automobile, for example.
- In all automobiles the user interface is the same. There is a wheel you
- turn for direction. There are pedals on the floor to control speed, etc.
- The quality of the automobiles are not judged for value by the user
- interface, but by how the automobile responds to input from the user.
- How fast it goes, how durable it is, etc., these are the qualities by how
- an automobile is selected for purchase, and not by the fact that it has
- a steering wheel. One may take this analogy further by comparing automatic
- transmissions against stick-shifts. Neither changes the performance of the
- car in a radical way. A purchaser selects automatic or manual as a matter
- of either aesthetic preference or familiarity. If the buyer prefers stick
- over automatic, but the car with the stick is way behind the automatic
- in terms of performance, he would generally choose the automatic since he
- is buying the car to perform a task. The way the car performs the task
- is more important than how he tells the car to perform the task as long as
- both are equally intelligible to the car.
-
- Can you see the point I am trying to make? A program can work either through
- a command line interface, a key-stroke interface, or a GUI (Graphic User
- Interface). None of these change the performance of the program to any
- great extent. They merely change the aesthetics and the ease of use. The
- interface should not be allowed to be protected under law. To do so would
- interfere with innovation and progress without conclusively affecting the
- profits of a company. If company A holds the rights to the best interface,
- but their program is worthless, then company B will still make more profit.
- If it is truly the best interface possible, then progress would be slowed
- since people would have to learn many different types of interfaces to go
- from one program to another. Clearly, it would be in the interest of all
- concerned to leave the interface open for public usage and only protect
- the code behind the interface.
-
- Algorithms
- ==========
-
- To protect an algorithm is to, in effect, copyright a mathematical equation.
- Since all algorithms reduce down to a mathematical model, that model would
- not be able to be implemented except by whoever holds the rights. This
- would greatly reduce the productivity of mathematicians. Imagine if
- someone patented Integral Calculus. Don't laugh. IC is an algorithm
- like any other. It is a solution to a problem. Or what if someone
- patented the internal combustion engine? Most of us would be walking.
- But like the engine, it is not the algorithm of the engine that is important,
- but how it is implemented. All engines work on the same basic principle, but
- they do so differently. This is why one engine works better than the other.
- This is why a buyer would choose one engine over another.
-
-
- Source Code
- ===========
-
- While source code should generally be protected, there are times when it
- may be more profitable to a company to release either the source code or
- important information pertaining to it. A prime example is IBM and Apple.
- Apple chose to keep their operating system under close wraps. IBM, in their
- usual wisdom, chose to let some of it fly. This caused the market to be
- flooded with "clone" PC's. Given a choice, most people bought PC's or
- PC-compatibles. This generated more third-party support and even higher
- sales. What is the best selling computer today? You got it. Who
- practically sets the standard for every computer that comes out today? Good
- guess. While some may say that IBM could have made more money if they
- had not released the information, I grant you that. But, IBM has something
- that Apple does not: insured existance. There is no way that IBM could
- be jettisoned from the marketplace. IBM has insured that they will exist
- long after Apple closes its doors. All they have to do is keep putting
- out downward compatible products and people will continue to buy PC's.
-
-
- The Hacker Ethic Vs. The Business Ethic
- =======================================
-
- Hackers (including programmers) view computer programs different than
- businessmen do. Bits and pieces of programs are meant to be shared in order
- to further innovation and increase productivity. Programmers have always
- shared algorithms, traded libraries, and swapped subroutines. They do this
- so that they do not have to "reinvent the wheel" every time they write a
- program. If something is very basic and can be used over and over in
- many programs, then programmers share it with others.
-
- Businessmen, on the other hand, are not motivated by sharing but by making
- a dollar. There is nothing wrong with this at all. The problem is that
- sometimes making a dollar in the short run can be detrimental to the overall
- market in the long run. Being misers with algorithms will force everyone
- to spend a lot of time and MONEY to develop new products. If something
- is so basic and so useful, then it should be allowed the freedom to be
- developed to its fullest. Only then will the real bucks come rolling in.
-
- The solution to this paradox is that hackers have to learn that companies
- need money to keep going, and businessmen have to learn that computers
- cannot be treated like most products. A compromise needs to be reached so
- that both profits and innovation are protected without destroying each. Not
- everything should be given away, and not everything should be kept secret.
- Both should collaborate on deciding what to release and what to keep.
- Lately, it has been more of a business decision than a programmer's, and
- the imbalance is not good.
-
-
- Conclusion
- ==========
-
- There are more things to consider when protecting something in a computer
- program than next quarter's profits. In the long run, it may be more
- profitable to let the competition use some of your ideas. The more people
- who are able to easily access computers, the bigger the market, and the
- more profit. If only one company has a good interface and the price is
- high, the market will be small. Obviously, not everything should be
- allowed to be used freely, but the decision-making process should include
- more than looking at the bottom line.
-
-
- A fond farewell.....
- ====================
-
- This is the last in my series of articles for CuD. I have tried to show
- another side of the Underground than the one that is commonplace. There
- is much more to the Underground than hacking and phreaking. It is composed
- of many intelligent people who can make a valuable contribution to the
- computer industry. They should not be thrown to the wayside as they have
- been. While I am not a spokesman for anyone down here, and I am certainly
- long-winded and less intelligent than many, I sincerely hope that these
- articles have made an impact on someone somewhere.
-
- I would also hope that I have inspired other members of the Underground
- to show that they are more than people who break into systems. This
- is your chance: start showing people what you really are, and then they
- will take you seriously. You can do a better job than I did; I know you
- can! Go out there and do it!!!
-
- I would especially like to thank CuD and Jim Thomas for allowing me to
- espouse my drivel in their fine digest. A finer and fairer publication
- could not be found anywhere. I would also like to thank Dr. Ripco since
- it was his BBS that first connected me to Underground when I was a mere
- pup of 15, 6 years ago. I have yet to see a BBS that compares in quality
- in all my years down here.
-
- As for my future plans, I will be taking a sabbatical from being active in
- the Underground for a while. I have many things to reflect over and much
- to plan for my life. I have a few projects that may or may not include
- programming, writing, and editing a tech journal that will contain
- articles from members of the Underground of a technical nature. This
- journal would be sent throughout the computer industry as a means of
- communication.
-
- I know these articles probably sucked, but I gave it my best shot.
-
-
- In the words of the Darkest Adept the world has ever known:
-
- Do what thou Wilt shall be the whole of the Law;
- Love is the Law, Love under Will.
-
-
- Thanks for the memories....
-
- As always, I remain...
-
- The Dark Adept
- Email: Ripco BBS (312)-528-5020
-
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.18**
-