💾 Archived View for spam.works › mirrors › textfiles › piracy › warezwars.txt captured on 2023-06-16 at 19:54:29.
-=-=-=-=-=-=-
----------------------------------------------------------- WAREZ WARS: For the Inner Circle, cracking software is a challenge. For the wannabe underground, collecting it is an obsession. For the software industry, it's a billion-dollar nightmare. ----------------------------------------------------------- By David McCandless Sunday morning, 7 a.m., somewhere in US Eastern Standard Time: Mad Hatter gets up, has a glass of Seagram's Ginger Ale and a cigarette, and checks his machine, which has been running automated scripts all night. He looks for errors and then reads his email. He has 30 messages from all over the world: some fan mail, a couple of flames, a few snippets of interesting information, three or four requests - some clear, some PGP-encoded. After a quick espresso and another cigarette, he surveys the contents of a few private FTP sites, filters through a bunch of new files, and then reroutes the good stuff to his newsreader. After breakfast with the family, another wave of automated scripts kicks in. The ISDN connection hums to life. A steady stream of bytes departs his machine 128 Kbps and vanishes into the ether. By the end of the day Mad Hatter, a ringleader of the software piracy group called the Inner Circle, will have poured 300 Mbytes of illegal "warez" onto the Internet. Monday morning, 9 a.m., Greenwich Mean Time: Phil arrives for work in Bracknell, England, in a suit and tie, just back from a few days in Switzerland. Inside Novell UK's glossy five-story headquarters, he lets himself into his office. It looks like a mad, bad bedroom - shiny desktops and derelict ones, disemboweled minitowers and battered servers, every last expansion slot distended with DAT machines, CD-ROM burners, extra hard drives. A metal shelf unit contains a rack of monitors, some video equipment, spare keyboards. Everything is wired insanely to a single ISDN line. After a coffee, Phil boots up and skims his email. Twenty minutes later he has ceased to be Phil. For the next week, he will pretend to be a trader, a courier, a cracker, a newbie, a lamer, a lurker, a leecher. He is an undercover Internet detective, a "technical investigator." He spends his days roving the Net, finding people like Mad Hatter - and busting them. This is a story about a universe with two parallel, overlapping worlds. One is the familiar, dull world of the software industry, with its development costs, marketing teams, profit, and loss. Phil's world, at least part of the day. And then there is warez world, the Mad Hatter's world, a strange place of IRC channels and Usenet groups, of thrills, prestige, and fear. A world of expert crackers who strip the protection from expensive new software and upload copies onto the Net within days of its release. A world of wannabes and collectors, whose hard drives are stuffed like stamp albums, with programs they'll never use. And a world of profit pirates, who do exactly what the software makers say: rip off other people's stuff and sell it for their own benefit. In Phil's world, software is a valuable tool that commands high prices - programs like QuarkXPress, Windows NT, and AutoCAD, costing thousands of dollars a shot. But in Mad Hatter's world, those sticker prices means nothing - except inasmuch as more expensive programs are harder to crack, and that makes them the most desirable, spectacular trophies of all. In Phil's world, warez are a menace. In warez world, Phil is. ------------ Filthy lucre ------------ Phil's world is full of nasty numbers. Antipiracy organizations like the Software Publishers Association and Business Software Alliance estimate that more than US$5 million worth of software is cracked and uploaded daily to the Net, where anyone can download it free of charge. A running scoreboard on the BSA Web site charts the industry's losses to piracy: $482 a second, $28,900 a minute, $1.7 million an hour, $41.6 million a day, $291.5 million a week. A lot of that is garden-variety unlicensed copying and Far East-style counterfeiting. But an estimated one-third leaks out through warez world, which can be anywhere there's a computer, a phone, and a modem. This is bad news for the business. Think of the lost revenue! The lost customers! "It's a frightening scenario out there," says Martin Smith, Novell's product-licensing manager for Europe, the Middle East, and Africa. "We are seeing a very, very rapid development of crime on the Internet." He's not being paranoid: look at the thousands of messages that pour through alt.binaries.warez.ibm-pc and the other Usenet sites that are the warez world's pulsing heart. In a typical week, you'll see Microsoft Office Pro and Visual C++, Autodesk 3D Studio MAX, SoftImage 3D, SoundForge, Cakewalk Pro Audio, WordPerfect, Adobe Photoshop 4.0 - virtually every high-end package in existence. All this plus impossibly early betas and alphas. Add a smattering of mundane Web tools, Net apps, registered shareware, games, and utilities, and you have everything for the forward-looking computer user. Warez world's volumes are impressive, too - a good 65 Mbytes a day of freshly cracked, quality new releases, chopped into disk-sized portions (to make it from one hop to the next without clogging the servers), compressed, and uploaded. Postings can vary from a few bytes (for a crack) to hundreds of megabytes. The nine main warez sites alone account for 30 to 40 percent of the traffic on Usenet, an average of more than 500 Mbytes in downloads every 24 hours, according to OpNet. Bad news indeed for Phil and his friends, gazing at those endless dollar signs. But warez world's leading citizens say that filthy lucre is beside the point - at least for them and the hungry collectors they supply. "No money ever exchanges hands in our forum," says California Red, one of a half dozen of the Mad Hatter's Inner Circle colleagues gathered for an IRC chat. "We're on the nonprofit side of the warez feeding chain," insists another, TAG (The Analog Guy). "It's a trade. You give what you have, get something you need. No money needed," adds Clickety. "We're not in it for the money. I would never sell something I got from warez," California Red reiterates. "Never made a dime," says Mad Hatter. Even Phil admits these are not the people responsible - not directly, anyhow - for the 500-Mbyte, $50 bundled software CD-ROMs from Asia that are the industry's most prominent nightmare. Warez crackers, traders, and collectors don't pirate software to make a living: they pirate software because they can. The more the manufacturers harden a product, with tricky serial numbers and anticopy systems, the more fun it becomes to break. Theft? No: it's a game, a pissing contest; a bunch of dicks and a ruler. It's a hobby, an act of bloodless terrorism. It's "Fuck you, Microsoft." It's about having something the other guy doesn't. It's about telling him that you have something he doesn't and forcing him to trade something he has for something you don't. In other words, it's an addiction. Listen to a typical dialog on an IRC warez trading channel: "What you got?" "Cubase three." "What's that?" "A music program." "I got it. What else?" "No, but it's Cubase three-oh-three - the latest bugfix." "Shit. Gimme." "It's not a patch. It's another seven meg download." "Don't care. I want it." Warez traders scour the newsgroups every night, planting requests, downloading file parts they don't need. Warezheads feel unfulfilled unless they've swelled their coffers by at least one application a day. They don't need this Java Development Kit tool, or that Photoshop plug-in - the thrill is in creating the new subdirectory and placing the tightly packed and zipped file cleanly, reverently, into the collection. They may even install it. Then toy absentmindedly with its toolbars and palettes before tucking it away and never running it again. Look at Michael, an 18-year-old warez junkie who's also into weight lifting. In the evenings, while his friends pursue women, he's either at the gym or home at his machine, combing the planet for the latest dot releases of 3D Studio MAX. "I bought a Zip drive so I could store it all. The SoftImage rip is 20 disks. It took me three months to get the entire set." A directory called WAREZ on his D:/ drive has $50,000 worth of cracked software, more than any one person could ever use, ludicrous amounts of applications. The more high-end and toolbar-tastic the app, the better. Without technical support or manuals, he hasn't a clue how to use most of it. But it's there and will stay there. "Warez give you a weird kind of feeling," he says. "You end up collecting programs you don't need and never use. Just so you can say, 'I've got this or I've got that.' Or 'My version of Photoshop is higher than yours.'" Mad Hatter knows the feeling. "It's an obsessive game. We see it every day - people begging for something to 'finish their collection.'" He's not much better himself. "When I was out of work on disability, I was totally motivated by the thrill of massive uploads, uploading at least 40 Mbytes a day for four months straight." Fellow Inner Circle member Clickety used to spend 12 hours a day online until college got "awful heavy." Another, Abraxas, spends 6 to 10 hours online on weekdays, 12 to 16 on weekends. But Mad Hatter - who runs the semi-tongue-in-cheek, semi-poker-faced discussion group alt.support.warez.recovery - is making progress: he's down to 30 Mbytes a day. "My computer is online 24 hours a day," he says. "A warez pirate is always online." ------- As gods ------- For Joe Warez Addict at the end of the cracked software food chain, membership in a group like the Inner Circle is the ultimate collectible. A way to legitimize their addiction, work for the common good, and, of course, get a nice fresh supply of warez. The drug addict becomes dealer. A sizable chunk of Mad Hatter's daily mail is begging letters. "I hope that if I ask this question, you will not be offended in any way. But can I join the Inner Circle? I mean, I respect the Inner Circle ... but never got a chance to join it. I was just wondering, can I? Please mail me back ASAP." Needless to say, this lone obsessive didn't get his chance. Joining the Inner Circle is nigh on impossible. Reaching its members, though, is easy enough. They keep a high profile, both in posting files on Usenet and flaming lamers. When I first tried to contact them I thought that they weren't so good at answering email, but it turned out their provider had just been taken offline for illegal spamming. They relocated en masse, and my mail had been lost in transit. So I posted a message to one of their newsgroups, made sure it was correctly labeled, politely worded, and not crossposted (a cardinal sin anywhere on Usenet). A reply arrived within eight hours. Mad Hatter was more than happy to talk, but not on the phone, not in person, and not on conventional IRC. "It has a bit of a habit of advertising my IP address," he said. He and six other Inner Circle members set up their own IRC server, configured a secret channel, and arranged a mutually convenient time for a live interview. We met and talked for nine hours, in the bizarre overlapping conversational style of IRC. They were frank and open, friendly and articulate - and, like any new start-up, flattered by the attention. A 17-strong force, the Inner Circle has its own iconography and its own ideals. Its members are warez gods. They preach, police, advise, flame. Their commandments? Good manners, good use of bandwidth, and good warez. Give unto others as you would have them give unto you. When the Inner Circle is not sourcing warez from secret sites, its members are hunting and gathering from more conventional sources. Clickety borrows fresh stuff from his clients. A few have attended Microsoft Solution seminars. "Some of us are actual beta testers, too," says Mad Hatter. "That's got to be scary for the developers." One way or another, they help maintain the steady flow of warez onto Usenet. From there, various wannabes, lamers, and aspirants copy their work to countless BBSes, FTP sites, and Web pages. These are not pimply teenagers devoid of social life and graces, little ferrets who talk in bIFF text and make napalm out of soap and lightbulbs; they're not downloading porn or being careful not to wake their parents or spelling "cool" as "kewl." According to the interviews I conducted, not one member is younger than 20; Clickety-Clack is the youngest at 23. Most are 30-plus. Champion uploader Digital has been happily married for 22 of his 46 years. Most are well-adjusted white males with day jobs and thoroughly nuclear families. Founding member Abraxas has three kids, one over 18. Mad Hatter runs a small business from home. Technical guru TAG is a computer animator. Irrelevant maintains commercial real estate. They're spread all over the United States. A few are concentrated around Orlando, Florida. Two or three others are California-based. For obvious reasons, that's as precise as they like to get. The Inner Circle was born of a sense of outrage that their beloved pirate-wares newsgroups were going to pot. Warez had been around for more than a decade, but the growth of the Internet was bringing clueless newbies onto the boards. Warez needed a code of ethics and a group of leaders to set some examples. The leaders would be the best crackers - some of whom became the Inner Circle. "We took over alt.binaries.pictures.leek in early '96," explains Abraxas, "and then leaked the first Nashville [Windows 97] beta. The groups were being overrun by clueless people. They needed help. They were wasting Internet resources. Perhaps if we could encourage responsible use of the available bandwidth, the whole Usenet warez 'scene' might last a while longer. Warez was around before we were, and will be after, but we wanted to help people and preserve resources using common sense." As enforcers of the warez code, the Inner Circle can be swift and sure. In April 1996, a pirate gang called Nomad, convinced that posts to warez groups were being suppressed, decided to get themselves some unsupervised elbow room. They selected an antiwork newsgroup - alt.binaries.slack, relatively empty and off the beaten track - where software could be slipped past news providers who had firewalled the usual warez forums. Within 24 hours, the forum was flooded with the latest releases. The slackers bestirred themselves from their apathy and fought back, posting files that told the pirates politely to push off. The warez kept coming. Then the Inner Circle waded in on the slackers' side and castigated the invaders for their poor manners. The pirates left meekly - though as a parting gift, one of them posted Microsoft NT, Beta 3, all 48 Mbytes of it, in 5,734 parts. The slackers' newsfeed was clogged for days. A slightly disturbing revelation came out of the slacker invasion. "After the first attempted takeover, we discovered just how scary search engines like Deja News and AltaVista were," explains TAG. "You could dig up real email addresses pretty easy on about 75 percent of people posting warez." A worried TAG hacked into the code of Forte Agent, an industry standard newsreader already cracked to bypass the shareware cripples, and stripped away the X-newsreader header, giving posters far greater anonymity. As a side effect, the patch also reduced email spams by two-thirds. "The hack went over so well with even nonwarez people that Forte eventually incorporated it into Agent as a feature," TAG says proudly, "although I don't think they'll be giving us credit." By mid-'96, Mad Hatter decided that police work was getting to be too much of a chore. The newsfeed was being clogged by lamers, requesters, and partials posters with "room-temperature IQs." Those genuinely into warez were seeing less and less complete software uploaded; in its place were hundreds of stray disks and clammy begging posts. In a rare fit of pique, Mad Hatter took his revenge. "If I continue to see the 'here's what I have' threads," he wrote, "I will stop uploading here. I will not help and will laugh my ass off that everyone is suffering. If for some reason you doubt that I make a difference, it's your loss, as I personally have uploaded 85 percent of all the shit that's getting posted now when it was zero day or still fresh. Keep fighting over stale shit - I like to watch; keep posting partials, and I'll stop upping my 100 to 300 Mbytes a week. In fact, I think I'll stop now." And stop the Inner Circle did. "We became burnt out on educating the masses," Mad Hatter says. Instead, a range of guaranteed lamer-free encrypted newsgroups was created for posting PGP-encoded warez, for Inner Circle-approved members only. Those on the select interested-parties list are given the codes to unlock the software, and anyone can apply to join. Requirement: a reasonable knowledge of PGP. "Hopefully this is a sign you won't be totally incompetent if you choose to post," says TAG. At the last count, the IPL had 500 subscribers, happily trading warez under the protection of the latest in antilamer technology. ----------- New economy ----------- Warez on Usenet are basically gifts - testimony to the power and stature of the giver. Files are posted for all to download, free. Just fire up your newsreader, point it at an appropriate forum, and a list like a home-shopping catalog of the latest software spills down your screen. There is no pressure, but if you download and you like the vibe, you are expected to join the community and contribute uploads whenever possible. On the freewheeling IRC chat forums, warez are no longer gifts - they're trade goods. The rewards are greater, but you've got to work for them. The IRC channels are 24-hour stock exchanges cum street markets: FreeWarez, Warez96, Warez4Free, WarezSitez, WarezAppz, and WarezGamez. There are private channels, hidden areas, and invite-only piracy parties. And there are no free lunches - every piece of software has to be paid for, in software. The more recent the application, the higher its value. The ultimate bartering tools are zero-day warez - software released by a commercial house in the last 24 hours, cracked if necessary and uploaded. The prizes for good zero-day warez vary; you may get instant download status on a particular server, logins and passwords for exclusive FTP sites, or admission to the ranks of a powerful cartel like the Inner Circle. "Zero-day sites are very ?lite stuff," explains paid-up ?litist TAG. "People can get access only if they can move a few hundred Mbytes a day. Most are invite only. The average IRC warez trader doesn't get that kind of access unless he puts a lot of effort into it." Zero-day warez trading is a fraught business; competition between groups often leads to malpractice. "You get a lot of first releases with bad cracks," says TAG, "just so someone can say they released first. Then two days later, you get a working crack. We get most of our freshest stuff from private FTP and courier drop sites." If your software collection is more mundane, you can trade one piece directly for another. But with so many unpoliced egos in one place, this can be risky. People will often welsh on deals, allowing you to pass them a file and then disappearing into the ether. Cunning traders will barter with "trojans" - zipped-up files of gunk, realistic enough to carry out half the transaction. In extreme cases, someone may feed you a virus. A step down from zero-day warez are drop sites, where fresh cracks can be found for the cost of a download. Some drop sites run on the trader's own machine; others piggyback on government or corporate mainframes, shareware mirrors, and university networks. Often they're only in existence for 24 hours, or on weekends when the sysops are at home. Wherever you end up, you'll be struck by the extreme politesse and measured courtesy, united by a common language. "Greets m8. Have appz, gamez and crackz on 129.102.1.3. Looking for Pshop 4.0 beta. L8ter." "Have 1.5 gigs of warez on anonymous T1. Upload for leech access. / me for more info. No lamers." ---------- Real money ---------- Back in Phil's world, they can't quite cope with the idea of this ferocious brag-driven barter economy cloaked in courtesy. The SPA and the BSA just don't believe it. "Considering the amount of time they dedicate, they must be making a return to justify it," says Phil. Casual observers of the BSA's Web site may well be convinced, if only because they're stunned by the money that's involved - or seems to be. Fifteen point five billion dollars a year! But those figures are based on the assumption that if piracy were stopped, someone would be willing to pay for every pirated copy in circulation. "Billions of dollars?" scoffs East London BBS operator Time Bandit. "I know guys who have thousands and thousands of pounds worth of software, but the values are meaningless. Win95 may cost, like, ?75 in the shops, but in warez, it's worthless. It's just another file that you might swap for another program, which might cost four grand. How much it costs in real money is meaningless." How do you ram home sales figures and quarterly losses to a bunch of teenagers who see warez trading as their passport to acceptance on the scurrilous side of a brave new world? How do you convince middle-aged men who see incandescently expensive software as monopoly money in a vast, global boardgame that what they're doing is "harmful"? In the software industry's latest campaign, you scare them - or try. The BSA's mandate used to be "not to capture pirates, but to eradicate piracy." Now exemplary punishment is the big thing. To do that, the BSA and the SPA are willing to push the law to its limits. Prosecuting clear offenders - warez-vending BBS operators and FTP-site pirates, for instance - is one thing; suing ISPs for carrying Web pages containing pirate links and cracks is another. A typical case was against C2Net, a Buffalo, New York-based ISP that the SPA sued for doing just that. In what smacked of a token prosecution - or, in the words of C2Net's president, Sameer Parekh, "legal terrorism" - the action by Adobe, Claris, and Traveling Software, under the aegis of the SPA, held the provider responsible as "publishers" for the contents of its server, and for the activities of individual account holders. The SPA eventually backed off but threatens to revive the suit if C2Net and other ISPs don't agree to monitor their users for copyright infringement. C2Net says it will not give in to litigious "bullying." And then there are straightforward busts. On January 12, 1996, Microsoft and Novell jointly announced a settlement with Scott W. Morris, who was "doing business as the Assassin's Guild BBS ... billed ... as the worldwide headquarters for two large pirate groups, Pirates With Attitude (PWA) and Razor 1911." According to the statement, "marshals seized 13 computers, 11 modems, a satellite dish, 9 gigabytes of online data, and over 40 gigabytes of offline data storage dating back to 1992.... Mr. Morris agrees to assist Microsoft and Novell in their continuing BBS investigations." Phil, our undercover Internet detective, wasn't responsible for that particular drama, but he's been integral to others. His latest victory was in Z?rich - "a landmark case against individuals and organizations distributing unlicensed software on the Internet," he calls it. A 27-year-old computer technician who helpfully called himself "The Pirate" was running an FTP site filled to the brim with warez, including US$60,000 worth of unlicensed Novell software. Phil, impersonating a trader, infiltrated the site (admittedly no great feat), collected evidence, then handed it over to the Swiss police. He accompanied them on the raid to ensure no evidence was damaged. "He was one of a new breed who advertise on the Internet," says Phil. "He made his files available via email requests and telnet." Swiss police also raided the home of a BBS called M-E-M-O, run by "The Shadow," a friend of The Pirate. Unfortunately, The Shadow was on holiday with his parents. The family returned two weeks later to find their front door broken down; the son was arrested. If convicted, the young pirates face up to three years in jail and possible $80,000 fines. The Pirate's mistake - aside from his suicidal choice of nickname - was to plant himself geographically. Phil, a former corporate network manager, was able to trace him through his FTP site's IP address. Phil knows his networks; this makes him the perfect undercover agent - and one of Novell UK's most envied employees. "I play on the Net all day," he says, "and get paid for it." There's a bit more to it than that. Phil and his counterparts in Asia and the US are deployed to infiltrate pirate groups; to study IRC; to get under the skin of the lamers, the dabblers, and the professionals; to chat, seduce, charm, and interact with the denizens of this bizarre over-underworld. Phil talks to traders in their own language, understands the tricks and traps. After busting The Pirate, he says, "we were talking and he was moaning about the sluggishness of his network. I pointed out that, aside from using LANtastic, he was using a 75-ohm terminator on the back of his file server, slowing the whole thing down." Now that he's back from Z?rich, Phil will be getting some new toys: the spoils of war. In many jurisdictions, any hardware deemed to be part of an illegal setup can be taken by investigators and - if part of a civil prosecution - can be worked in as part of the settlement. Once sucked dry of evidence and incriminating data, the cannibalized machines are moved to Bracknell and hooked up to the network. But despite the resources at his disposal and his status as a network ninja, Phil doesn't always get his man. "If there's a person out there who has a decent level of technological awareness of the ways he can be located, it's quite true to say he could successfully hide himself, or use a system where it would be impossible to track him. It's technically possible for them to bounce their messages all around the world and have us running around like blue-arsed flies." It's a reluctant admission, but then Phil is one person pitted against thousands. Successful prosecutions aren't always that easy either. Take David LaMacchia, an MIT engineering student who turned two of the school's servers into drop sites and downloaded an estimated $1 million worth of pirated software. LaMacchia was arrested in 1995, only to have the case thrown out by a judge who ruled that no "commercial motive" was involved. Prosecutors tried charging him with wire fraud, but this was ruled an unacceptable stretching of the law. LaMacchia walked free. "Bringing Internet cases through the judicial system is a nightmare," says Novell's Martin Smith. "Try talking to a judge about 'dynamically allocated IP addresses.' We don't have a chance." Tell that to the former warez traders of America Online, which had a meteoric history as a pirate mecca. For years, instructions on how to crack AOL's security and obtain free accounts were a Usenet staple. Online, "freewarez" chat rooms were packed with traders, 24 hours a day. Megabytes of warez were kept in permanent circulation. Then came the crackdown of 1996, a dark period in warez history. Goaded by software-industry watchdogs, AOL introduced countermeasures to disinfect its system; alt.binaries.warez was removed from the Internet newsfeed. CATwatch automated sentinels were placed on AOL's warez chat channels, logging off anyone who entered. "Free" accounts were traced and nuked. Michael, the weight-lifting trader and also an AOL veteran, says everyone thought that "the FBI had infiltrated the warez groups, and we were all going to get busted." On the cusp of the big time - a top pirate outfit named Hybrid had a position open - Michael had been hoping to prove himself by doing a CD rip of the soccer game Euro 96. "I was halfway through removing the FMV and CD audio. I reckon I could've got it down from 58 disks to 9. But then everything went haywire." Profit-driven crackers are actually the easiest to catch: they have links to the real world, starting with the money trail from credit cards. And the easiest prey of all are BBSes, with their telltale telephone connections. In January, FBI agents led by the bureau's San Francisco-based International Computer Crime Squad raided homes and businesses in California and half a dozen other states. They seized computers, hard drives, and modems, though no arrests were made. Along with Adobe, Autodesk, and other BSA stalwarts, the list of software companies involved included Sega and Sony - a hint that the targets included gold-disk dupers who counterfeit mass-market videogames. Mad Hatter was not impressed. "Wow, I'm in hiding," he cracked the day after the raids. But "Cyber Strike" was, as BSA vice president Bob Kruger said later in a statement, "the most ambitious law enforcement action to date against Internet piracy" - specifically, the first US case in which the FBI, rather than local police, took the lead. And that can't help but augment the BSA's number-one antipiracy tactic for 1997: creating the "perception of threat." And even warez gods don't necessarily want the FBI on their case. But bluster aside, people like Mad Hatter are intrinsically - and deliberately - much harder to catch. The most prestigious pirate groups - Razor 1911, DOD, Pirates With Attitude, the Inner Circle - are tightly knit clubs whose members have known each other for years and call each other "good friends" - though they rarely, if ever, meet. Joining is no easy task. Positions become vacant only when members quit or are busted, or a vote is taken to expand operations. Kudos and reputation are everything. Unofficial homepages can be found here and there, constructed by acolytes who celebrate the groups' best releases and victories. These are often padded out with cryptic biographies and obituaries for those busted by the cops ("We feel for ya!"). Despite the boasting, and the draping of their releases with corporate motifs - logos, front ends, graphics, even signature tunes and Java applets - crackers' true identities typically remain secret, even to one another. The anonymity, however, works both ways. Cloaked in his own secret identity, Phil says he has managed to get deep within several major groups in the past 18 months and is skimming the surface of several others. He can convincingly portray himself as a caring, sharing warez god. "You make some good friends," he says with a smile. And, it seems, you can end up pretty impressed. "Some of these people are incredibly talented. The logic and programming behind their setups are just amazing." Or maybe he's just bluffing? ------------------ Warez and whyfores ------------------ In Phil's world, warez dealers are thieves. In warez world, the software companies are the criminals. "Most products you buy from a store can be returned if you are unsatisfied," reads the beautifully crafted Warez FAQ, on the Inner Circle's Web site. "Software cannot." The Inner Circle thus can claim to have a practical motivation - providing "a place to find something you might want to evaluate before purchasing." All right. "I personally have bought progs that I demo'd first from warez," declares Clickety. "I have more warez than I could ever hope to install on my poor drives. Tested a lot of crap also that I was glad I didn't pay for - deleted it right off the bat. I have recommended software to clients based upon using a pirate version at home." "Software developers have families, and should be able to support them," reads the Warez FAQ. "We do advocate buying your own software if you really like it and use it heavily," adds Mad Hatter. As Phil and his friends are well aware, the line between piracy and ownership is very blurred. For example, it's commonplace for 3-D animators and modelers to use pirated, cracked, or at least unlicensed copies of their office software at home, for overtime or experimentation. In some minds, it's even a "necessary evil," a slightly arcane marketing strategy, a rather reckless approach to branding - look at Netscape. Indeed, many software executives privately acknowledge that piracy - especially the attention it brings to new releases - can be a valuable way to develop markets. Novell's Martin Smith might disagree. He spends "99.9 percent" of his time fighting piracy, and he worries that the next generation of browsers will seamlessly marry the Web with Usenet. "The newsgroups will be a lot more accessible," he says, with something close to resignation, "which is going to make the whole thing a lot more widespread and give these guys a much bigger market. There's not much we can do, other than encourage ISPs not to take them." The difficulty is that, once it's up, a Usenet post can generally be canceled only by the author or a sysop from the post's point of origin, "server zero." Even if a cancel is issued, it takes time to ripple across the network. A warez regular would be able to grab the file before it was vaped. Some servers refuse on principle to honor cancels. "Even the most diehard warez hater in news.admin.hierarchy would defend your right to be safe from cancels," claims TAG. Many commercial ISPs have taken the industry's encouragement and dropped the warez groups, but lots of free servers are carrying on. And things aren't helped by the lack of a clear legal framework. Imagine the scenario: a program that belongs to a UScompany is uploaded via a router in Canada to a server in South Africa, where it is downloaded by a Norwegian operating out of Germany using a US-based anonymous remailer, then burnt onto a CD in the UK and sold in Bulgaria. "How would you prosecute that mess?" asks Smith. "It's a jurisdictional nightmare." And the profit pirates are getting more creative. Smith cites the Web page of one warez guru, offering a premium-line phone number: for $3 a minute, you can listen to details about the best warez FTP sites, their addresses, and their login passwords. "Updated every three days for your convenience," it declares. It also makes provisions for those dialing from outside the US. The selling of information that leads to illegal use of information - a difficult case to prosecute. "Our strategy is to bring a critical mass of prosecutions," says Smith. "We'll take out some people who're downloading this material - the gnats - and then we'll take out some of the larger, more organized guys. The people who are packaging it up and zipping it onto CD-ROMs." Which might work in a world where software was always bought on CD-ROM. But in pushing ever deeper into electronic commerce, where more and more real commercial software (browsers, little applets) is being given out for free, where the Internet is the ultimate distribution network, this looks a little ropey. Friction-free markets and friction-free piracy run in tandem. The Inner Circle already has its PGP-encoded giveaway mall in place. Smith knows all this. There's just not much he can do about it. "All it needs is one server in one country where there are no laws to counter copyright theft, and there are plenty who will - the likes of Libya, Bulgaria, and Iran. One country with a decent enough telephone infrastructure is enough to undo a hundred busts in the West." Even if laws are constitutional or enforced, larger biases come into play. "Try asking a Saudi policeman to arrest a Saudi software pirate on behalf of an American company. Forget it." ---------------- Dingle my dongle ---------------- The alternative to policing is burglar-proofing: making things harder to crack. In principle, you might think that the gazillion-dollar software industry would be able to produce uncrackable software. In practice, it can't, although it certainly keeps trying. Take the dongle, for example. It is the summit of copy protection, an explicit melding of software and hardware. Without the right hardware key - the dongle - plugged into the machine's parallel port, the software won't run. And without the right software, the dongle is a mindless doorstop. Calls to the dongle are woven into the code at the lowest level. "The program may call the dongle every 150 mouseclicks, or every time you print, or every time you select flesh tones as your desktop color scheme," says one dongle expert. If the response to the call is false or not forthcoming, the program shuts down. All communications between the two are encrypted by uncrackable algorithms. Internal security fuses ensure that any attempt to hack the dongle mechanically will cause it to self-destruct. "Nothing short of an electron microscope," says the expert, "could extract the algorithm from that mess." The biggest player in the dongle market is Rainbow Technologies, whose Sentinel hardware keys are used by 55 percent of all protected software. There are 8 million Sentinel keys attached to 8 million printer ports the world over. The company calls it "the world's most effective way to stop piracy" - a clarion call to crackers if ever there was. The logical approach to cracking a hardware key is to create a "pseudodongle" - a chunk of code that sits in memory, giving the correct answers to any query. To do this, a cracker would have to monitor and trap traffic to-ing and fro-ing across the parallel port, then use this information to build an infallible query/ table. Unfortunately, if the query is, say, six characters long, it can have more than 280 trillion responses (281,474,976,710,700 to be exact). With the speed of modern machines, this would take approximately 44,627 years to collate. With the SentinelSuperPro dongle ("the most secure and flexible protection available") the query length can be 56 characters - requiring a mere 10 125 years (in theory) for a complete table. However, the dongle in SentinelSuperPro for Autodesk 3D Studio MAX was cracked in just under seven days of its retail release - substantially less than the 44 millennia emblazoned on the sales brochures. Other expensive high-end applications that use Sentinel - including NewTek's LightWave 5 and Microsoft's SoftImage - have ended up the same way: cracked, repackaged, and redistributed to every corner of the Internet within weeks of their release. How? Instead of attempting to simulate the dongle, expert crackers simply remove its tendrils from the program code, unraveling the relationship skein by skein, function by function, call by call, until the application ceases to need the dongle to function. Then it's ready for anyone and everyone to use - or, more likely, gawk at. Nobody says this is easy. There may be only three or four crackers in the world who could manage such an opus. But with the Internet to transmit the result, only one needs to succeed. With the latest wave of dongles, warez world looked to Russia to get the job done - and a shadowy group called DOD "won" the contract. The self-styled "Warez Bearz of Russia and Beyond," DOD appears to have arms throughout Europe, Asia, and the US. It undid Microsoft SoftImage's dongle protection in two weeks, which wasn't easy. The crew riotously celebrated in their "NFO" file: "Totally awesome work of glorious DOD cracker - Replicator after five other crackers gave up! We decided not a do a crack patch 'coz it will take too much time to code it ... you ask why? 'Coz there are only 72 (!!!) EXEs patched. All options now work 100%!" NFO files do more than brag or supply installation instructions; they testify that the ware is a bona fide release, guaranteed to work. And this is more than just posturing; a group's reputation is paramount. Each release is painstakingly beta-tested. These are their products now, their labors of love. Nobody wants to find a "bad crack" in his hands after a seven-hour download. Nobody wants to be accused of being "unprofessional." Nobody wants the ignominy of anything like the bad crack for Autodesk's 3D Studio that made the rounds in 1992. For all intents and purposes it ran correctly, all features seemed 100 percent functional. Except that the dedongled program slowly and subtly corrupted any 3-D model built with it. After a few hours of use, a mesh would become a crumpled mass of broken triangles, irrevocably damaged. Cleverly, Autodesk had used the dongle to create a dynamic vector table within the program. Without the table, the program struggled to create mathematically accurate geometry - and eventually failed. Many a dodgy CAD house saw its cost-cutting measures end in ruin. Autodesk support forums and newsgroups were flooded with strangely unregistered users moaning about the "bug in their version of 3D Studio." A rectified "100 percent cracked" version appeared soon after, but the damage was done. The Myth of the Bad Crack was born, and the pirate groups' reputations tarnished. But the pirates bounced back. They always do. And there's no reason to think that there's any way to stop them. Software security people are at an intrinsic disadvantage. Compare their job to that of securing something in the real world that's valuable and under threat - a bank, say. Typically, only one set of armed robbers will hold up a bank at a time, and they'll get only one crack at it. Imagine an army of robbers, all in different parts of the world, all attacking the same bank at the same time. And in the comfort of their own homes. Not just once, but over and over again. Imagine that each set of robbers is competing against every other, racing to be first in. Imagine, too, that some of the robbers are so technically adept that they could have built the alarms, the safe, and even the jewels themselves. And that they have cracked more than 30 banks with the same protection system. And that they're learning from all their failures, because they're never caught. No security could realistically resist such an onslaught. It may be that the only way to avoid having your software cracked is to put no protection whatsoever on it. No challenge, no crack. Popularity only feeds the frenzy. Doom is a good example. In 1993, id Software distributed the original shareware version of its nasty-guns-in-nasty-dungeons masterpiece on bulletin boards, CompuServe, and a then-little-known system called the Internet. Downloaded by more than 6 million people worldwide, Doom was a trailblazer in the world of modem marketing. The shareware gave you a third of the game: if you liked it, you had to buy the rest on disks. Millions did. Doom and its makers became a dream target. Weeks before Doom II's release, the sequel was available on the Internet - not as shareware, but warez. And not just as a teaser, but the whole damn thing. "Yeah, that was leaked," says Mike Wilson, id's then-vice president of marketing, now CEO at Ion Storm. "Can't tell you how much that hurt." The leaked copy was rapidly traced - rumors abounded that the version was a review copy fingerprinted to a British PC games magazine - but too late. It was already on Usenet, doing the rounds on IRC, filling up FTP sites. The pirates were in ecstasy and id was left with recoding the final retail release, to ensure future patches and upgrades would not work on the pirated version. Then they shut the stable door. No more external beta testing; no more prelaunch reviews. "We assured ourselves it would never happen again," says Wilson. "No copy of our games would leave the building." Nice try. Quake, Doom's much-anticipated follow-up, turned up on an FTP server in Finland three days before the shareware come-on was due to be released. The pirate version was a final beta of the full game - complete with eerily empty unfinished levels and bare, unartworked walls. Within hours, it had been funneled to sites all over the globe. IRC was swamped with traders and couriers desperate to download. "Somebody actually broke into our then poorly secured network and started to download it right before our eyes," Wilson recalls. "We managed to stop the transfer before he got all of it. We traced the call, got his name and address. He was pretty scared, but, of course, it was some kid. We didn't pursue that one. It hurt, but not enough to put some little kid in jail." When the legitimate Quake hit the stores last year, it was initially in the form of an encrypted CD, which let you play a shareware version for free but would only unlock the rest on receipt of a password, available for purchase by phone. The encryption scheme, an industry standard called TestDrive, was eventually cracked by a lone European pirate called Agony. And id's crown jewel was now available, courtesy a 29K program. "In order to unlock the full version, you are supposed to call 1-800-IDGAMES," Agony gloated in a posting. "Hahahahahah." "We knew it was going to be hacked," says Wilson. "We of all people knew. But we thought it was safe enough, certainly safer than Doom II." And, truth to tell, it didn't matter too much. The gap between the game's release and the warez version becoming widespread was enough for id to sell the copies they expected. "Copy-protection schemes are just speed bumps," laments Wilson. Nobody really knows how much actual damage cracking does to the software companies. But as the industry rolls apprehensively toward the uncertain future of an ever-more frictionless electronic marketplace, almost everyone thinks piracy will increase. "The level of activity out there is overwhelming. We know that we have to take action to take control of it. We will continue to bring a critical mass of prosecutions," says Novell UK's Smith. He doesn't sound all that convinced. Somewhere back on the US East Coast, Mad Hatter has a final swig of ginger ale and settles down to bed with his wife, White Rabbit. She thinks his obsession is a wasted resource, but didn't complain when he installed the latest version of Quicken on her computer - a cracked copy, of course. "We are all family men, married with children, day jobs, dedicated accounts, and multiple phone lines," Mad Hatter says. "Our kids have been looking over our shoulders for years. They will be the next couriers, the next warez gods." __________________ David McCandless (dmacca@cix.compulink.co.uk), a London-based writer, musician, and film editor, is still bitter about being dethroned as UK Doom champion.