💾 Archived View for spam.works › mirrors › textfiles › hacking › hacker01.txt captured on 2023-11-04 at 13:20:56.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-









                            NORTHERN ILLINOIS UNIVERSITY








                 THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND








                      A THESIS SUBMITTED TO THE GRADUATE SCHOOL

                     IN PARTIAL FULFILLMENT OF THE REQUIREMENTS

                                   FOR THE DEGREE

                                   MASTER OF ARTS








                               DEPARTMENT OF SOCIOLOGY







                                         BY

                                   GORDON R. MEYER

                                   %CompuServe: 72307,1502%
                                   %GEnie: GRMEYER%


                                  DEKALB, ILLINOIS

                                     AUGUST 1989







                                      ABSTRACT







             Name: Gordon R. Meyer            Department: Sociology









             Title: The Social Organization of the Computer Underground









             Major: Criminology               Degree: M.A.











             Approved by:                     Date:



             __________________________       ________________________
             Thesis Director





                          NORTHERN ILLINOIS UNIVERSITY











                                      ABSTRACT



               This paper examines the social organization of the

               "computer underground" (CU).  The CU is composed of

               actors in three roles, "computer hackers," "phone

               phreaks," and "software pirates."  These roles have

               frequently been ignored or confused in media and other

               accounts of CU activity. By utilizing a data set culled

               from CU channels of communication this paper provides

               an ethnographic account of computer underground

               organization. It is concluded that despite the

               widespread social network of the computer underground,

               it is organized primarily on the level of colleagues,

               with only small groups approaching peer relationships.




























               Certification: In accordance with departmental and

                              Graduate School policies, this thesis

                              is accepted in partial fulfillment

                              of degree requirements.



                              _____________________________________
                              Thesis Director

                              _____________________________________
                              Date












                                   ACKNOWLEDGMENTS



                         FOR CRITIQUE, ADVICE, AND COMMENTS:

                                 DR. JAMES L. MASSEY

                                   DR. JIM THOMAS

                               DR. DAVID F. LUCKENBILL



                           FOR SUPPORT AND ENCOURAGEMENT:

                                    GALE GREINKE



                                 SPECIAL THANKS TO:

                            D.C., T.M., T.K., K.L., D.P.,

                                   M.H., AND G.Z.



                             THIS WORK IS DEDICATED TO:

                                   GEORGE HAYDUKE

                                         AND

                                     BARRY FREED





















                                  TABLE OF CONTENTS

               Introduction . . . . . . . . . . . . . . . . . . .    1

               Methodology  . . . . . . . . . . . . . . . . . . .    6

               What is the Computer Underground?  . . . . . . . .   11

               Topography of the Computer Underground . . . . . .   20
                    Hacking     . . . . . . . . . . . . . . . . .   20
                    Phreaking . . . . . . . . . . . . . . . . . .   21
                    Pirating    . . . . . . . . . . . . . . . . .   24

               Social Organization and Deviant Associations . . .   28

               Mutual Association . . . . . . . . . . . . . . . .   31

               The Structure of the Computer Underground  . . . .   33
                    Bulletin Board Systems    . . . . . . . . . .   33
                         Towards a BBS Culture  . . . . . . . . .   37
                    Bridges, Loops, and Voice Mail Boxes    . . .   53
                    Summary   . . . . . . . . . . . . . . . . . .   57

               Mutual Participation . . . . . . . . . . . . . . .   59
                    Pirate Groups   . . . . . . . . . . . . . . .   63
                    Phreak/hack groups    . . . . . . . . . . . .   64
                    Summary   . . . . . . . . . . . . . . . . . .   67

               Conclusion . . . . . . . . . . . . . . . . . . . .   69

               REFERENCES . . . . . . . . . . . . . . . . . . . .   75

               APPENDIX A. COMPUTER UNDERGROUND PSEUDONYMS  . . .   76

               APPENDIX B.
                 NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS  .   77











                                    Introduction

                    The proliferation of home computers has been

               accompanied by a corresponding social problem involving

               the activities of so-called "computer hackers."

               "Hackers" are computer aficionados who "break in" to

               corporate and government computer systems using their

               home computer and a telephone modem.  The prevalence of

               the problem has been dramatized by the media and

               enforcement agents, and evidenced by the rise of

               specialized private security firms to confront the

               "hackers."  But despite this flurry of attention,

               little research has examined the social world of the

               "computer hacker." Our current knowledge in this regard

               derives from hackers who have been caught, from

               enforcement agents, and from computer security

               specialists.  The everyday world and activities of the

               "computer hacker" remain largely unknown.

                    This study examines the way actors in the

               "computer underground" (CU) organize to perform their

               acts. The computer underground, as it is called by

               those who participate in it, is composed of actors

               adhering to one of three roles: "hackers," "phreakers,"

               or "pirates." To further understanding this growing

               "social problem," this project will isolate and clarify




                                                                     8

               these roles, and examine how each contributes to the

               culture as a whole. By doing so the sociological

               question of how the "underground" is organized will be

               answered, rather than the technical question of how CU

               participants perform their acts.

                    Best and Luckenbill (1982) describe three basic

               approaches to the study of "deviant" groups.  The first

               approach is from a social psychological level, where

               analysis focuses on the needs, motives, and individual

               characteristics of the actors involved.  Secondly,

               deviant groups can be studied at a socio-structural

               level.  Here the emphasis is on the distribution and

               consequences of deviance within the society as a whole.

               The third approach, the one adopted by this work, forms

               a middle ground between the former two by addressing

               the social organization of deviant groups.   Focusing

               upon neither the individual nor societal structures

               entirely, social organization refers to the network of

               social relations between individuals involved in a

               common activity (pp. 13-14).  Assessing the degree and

               manner in which the underground is organized provides

               the opportunity to also examine the culture, roles, and

               channels of communication used by the computer

               underground. The focus here is on the day to day

               experience of persons whose activities have been




                                                                     9

               criminalized over the past several years.

                    Hackers, and the "danger" that they present in our

               computer dependent society, have often received

               attention from the legal community and the media. Since

               1980, every state and the federal government has

               criminalized  "theft by browsing" of computerized

               information (Hollinger and Lanza-Kaduce, 1988, pp.101-

               102). In the media, hackers have been portrayed as

               maladjusted losers, forming "high-tech street gangs"

               (Chicago Tribune, 1989) that are dangerous to society.

               My research will show that the computer underground

               consists of a more sophisticated level of social

               organization than has been generally recognized. The

               very fact that CU participants are to some extent

               "networked" has implications for social control

               policies that may have been implemented based on an in-

               complete understanding of the activity. This project

               not only offers sociological insight into the organ-

               ization of deviant associations, but may be helpful to

               policy makers as well.

                    I begin with a discussion of the definitional

               problems that inhibit the sociological analysis of the

               computer underground. The emergence of the computer

               underground is a recent phenomenon, and the lack of

               empirical research on the topic has created an area




                                                                    10

               where few "standard" definitions and categories exist.

               This work will show that terms such as "hacker,"

               "phreaker," and "pirate" have different meanings for

               those who have written about the computer underground

               and those who participate in it. This work bridges

               these inconsistencies by providing definitions that

               focus on the intentions and goals of the participants,

               rather than the legality or morality of their actions.

                    Following the definition of CU activities is a

               discussion of the structure of the underground.

               Utilizing a typology for understanding the social

               organization of deviant associations, developed by Best

               and Luckenbill (1982), the organization of the

               computer underground is examined in depth.

                    The analysis begins by examining the structure of

               mutual association. This provides insight into how CU

               activity is organized, the ways in which information is

               obtained and disseminated, and explores the subcultural

               facets of the computer underground.  More importantly,

               it clearly illustrates that the computer underground is

               primarily a social network of individuals that perform

               their acts separately, yet support each other by

               sharing information and other resources.

                    After describing mutual association within the

               underground community, evidence of mutual participation




                                                                    11

               is presented. Although the CU is a social network, the

               ties developed at the social level encourage the

               formation of small "work groups." At this level, some

               members of the CU work in cooperation to perform their

               acts. The organization and purposes of these groups are

               examined, as well as their relationship to the CU as a

               whole. However, because only limited numbers of

               individuals join these short-lived associations, it is

               concluded that the CU is organized as colleagues. Those

               who do join "work groups" display the characteristics

               of peers, but most CU activity takes place at a fairly

               low level of sophistication.




                                                                    12





                                    Methodology

                    Adopting an ethnographic approach, data have been

               gathered by participating in, monitoring, and cata-

               loging channels of communication used by active members

               of the computer underground. These channels, which will

               be examined in detail later,  include electronic

               bulletin board systems (BBS), voice mail boxes,

               bridges, loops, e-mail, and telephone conversations.

               These sources provide a window through which to observe

               interactions, language, and cultural meanings without

               intruding upon the situation or violating the privacy

               of the participants.  Because these communication

               centers are the "back stage" area of the computer

               underground, they provided insight into organizational

               (and other) issues that CU participants face, and the

               methods they use to resolve them.

                    As with any ethnographic research, steps have been

               taken to protect the identity of informants.  The

               culture of the computer underground aids the researcher

               in this task since phreakers, hackers, and pirates

               regularly adopt pseudonyms to mask their identity.

               However to further ensure confidentiality, all of the

               pseudonyms cited in this research have been changed by

               the author. Additionally, any information that is




                                                                    13

               potentially incriminating has been removed or altered.

                    The data set used for this study consists

               primarily of messages, or "logs," which are the primary

               form of communication between users.  These logs were

               "captured" (recorded using the computer to save the

               messages) from several hundred computer bulletin

               boards1 located across the United States.  The bulk of

               the data were gathered over a seventeen month period

               (12/87 to 4/89) and will reflect the characteristics of

               the computer underground during that time span.

               However, some data, provided to the researcher by

               cooperative subjects, dates as far back as 1984.

                    The logged data were supplemented by referring to

               several CU "publications."  The members of the computer

               underground produce and distribute several technical

               and tutorial newsletters and "journals."  Since these

               "publications" are not widely available outside of CU

               circles I have given a brief description of each below.

                    Legion of Doom/Hackers Technical Journal.  This

               ____________________

                    1 Computer Bulletin Boards (BBS) are personal
               computers that have been equipped with a telephone
               modem and special software. Users can connect with a
               BBS by dialing, with their own computer and modem, the
               phone number to which the BBS is connected. After
               "logging in" by supplying a valid user name and pass-
               word, the user can leave messages to other users of the
               system.  These messages are not private and anyone
               calling the BBS can freely read and respond to them.





                                                                    14

               publication is written and distributed by a group known

               as "The Legion of Doom/Legion of Hackers" (LoD/H).  It

               is available in electronic format (a computer text

               file) and contains highly technical information on

               computer operating systems. As of this writing, three

               issues have been published.

                    PHRACK Inc.:  Phrack Inc is a newsletter that

               contains various articles, written by different

               authors, and "published" under one banner.  Phrack

               Inc's first issue was released in 1985, making it the

               oldest of the electronically distributed underground

               publications.  CU participants are invited to submit

               articles to the editors, who release a new issue when a

               sufficient number (about nine) of acceptable pieces

               have been gathered. Phrack also features a lengthy

               "World News" with stories about hackers who have been

               apprehended and interviews with various members of the

               underground. As of this writing twenty-seven issues of

               Phrack, have been published.

                    Phreakers/Hackers Underground Network (P/Hun):

               Like Phrack, P/Hun collects articles from various

               authors and releases them as one issue.  Three issues

               have been published to date.

                    Activist Times, Incorporated (ATI): Unlike the

               other electronically distributed publications, ATI does




                                                                    15

               not limit itself to strictly computer/telephone news.

               Articles normally include commentary on world and

               government events, and other "general interest" topics.

               ATI issues are generally small and consist of articles

               written by a core group of four to seven people.

               Unlike the publications discussed thus far, ATI is

               available in printed "hard copy" form by sending

               postage reimbursement to the editor.  ATI is currently

               on their 38th issue.

                    2600 Magazine:  Published in a traditional

               (printed) magazine format, 2600 (named for the

               frequency tone used to make free long distance phone

               calls) is arguably an "underground" publication as it

               is available on some newsstands and at some libraries.

               Begun in 1987 as a monthly magazine, it is now

               published quarterly. Subscription rates are $25.00 a

               year with a complete back-issue selection available.

               The magazine specializes in publishing technical

               information on telephone switching systems, satellite

               descrambling codes, and news about the computer

               underground.

                    TAP/YIPL: First established in 1972 as YIPL (Youth

               International Party Line), this publication soon

               changed its name to TAP (Technical Assistance Party).

               Co-founded by Abbie Hoffman, it is generally recognized




                                                                    16

               as the grandfather of computer underground

               publications.  Publication of the 2-4 page newsletter

               has been very sporadic over the years, and currently

               two different versions of TAP, each published in

               different areas of the country, are in circulation.

                    Utilizing a data set that consists of current

               message logs, old messages logs, and various CU

               publications yields a reasonably rich collection from

               which to draw the analysis.  Examination of the older

               logs and publications shows that while the actors have

               changed over the years, cultural norms and

               characteristics have remained consistent over time.




                                                                    17





                          What is the Computer Underground?

                    Defining the "computer underground" can be

               difficult. The sociologist soon finds that there are

               several competing definitions of computer underground

               activity.  Those who have written on the subject, the

               media, criminologists, computer programmers, social

               control agents, and CU participants themselves, have

               adopted definitions consistent with their own social

               positions and perspectives. Not surprisingly, these

               definitions rarely correspond. Therefore, before

               discussing the organization of the computer

               underground, it is necessary to discuss and compare the

               various definitions.  This will illustrate the range of

               beliefs about CU activity, and provide a springboard

               for the discussion of types of roles and activities

               found in the underground.

                    We begin with a discussion of the media image of

               computer hackers. The media's concept of "hackers" is

               important because the criminalization of the activity

               has largely occurred as the result of media drama-

               tization of the "problem" (Hollinger and Lanza-Kaduce,

               1988). In fact, it was a collection of newspaper and

               film clips that was presented to the United States

               Congress during legislative debates as evidence of the




                                                                    18

               computer hacking problem (Hollinger and Lanza-Kaduce,

               1988, p.107).  Unfortunately, the media assessment of

               the computer underground displays a naive understanding

               of CU activity.

                    The media generally makes little distinction

               between different types of CU activity. Most any

               computer-related crime activity can be attributed to

               "hackers."  Everything from embezzlement to computer

               viruses have, at one time or another, been attributed

               to them. Additionally, hackers are often described as

               being sociopathic or malicious, creating a media image

               of the computer underground that may exaggerate their

               propensity for doing damage.

                    The labeling of hackers as being "evil" is well

               illustrated by two recent media examples. The first is

               from Eddie Schwartz, a WGN-Radio talk show host. Here

               Schwartz is addressing "Anna," a self-identified hacker

               that has phoned into the show:

                    You know what Anna, you know what disturbs
                    me? You don't sound like a stupid person but
                    you represent a . . . a . . . a . . . lack of
                    morality that disturbs me greatly. You really
                    do. I think you represent a certain way of
                    thinking that is morally bankrupt. And I'm
                    not trying to offend you, but I . . . I'm
                    offended by you! (WGN Radio, 1988)

                    Just two months later, NBC-TV's "Hour Magazine"

               featured a segment on "computer crime."  In this

               example, Jay Bloombecker, director of the National




                                                                    19

               Center for Computer Crime Data, discusses the "hacker

               problem" with the host of the show, Gary Collins.

                    Collins: . . . are they %hackers% malicious
                    in intent, or are they simply out to prove,
                    ah, a certain machismo amongst their peers?

                    Bloombecker: I think so. I've talked about
                    "modem macho" as one explanation for what's
                    being done. And a lot of the cases seem to
                    involve %proving% %sic% that he . . . can do
                    something really spiffy with computers. But,
                    some of the cases are so evil, like causing
                    so many computers to break, they can't look
                    at that as just trying to prove that you're
                    better than other people.

                    GC: So that's just some of it, some kind of
                    "bet" against the computer industry, or
                    against the company.

                    JB: No, I think it's more than just
                    rottenness. And like someone who uses
                    graffiti doesn't care too much whose building
                    it is, they just want to be destructive.

                    GC: You're talking about a sociopath in
                    control of a computer!

                    JB: Ah, lots of computers, because there's
                    thousands, or tens of thousands %of hackers%
                    (NBC-TV, 1988).


                    The media image of computer hackers, and thus all

               members of the computer underground, is burdened with

               value-laden assumptions about their psychological

               makeup, and focuses almost entirely upon the morality

               of their actions.  Additionally, since media stories

               are taken from the accounts of police blotters,

               security personnel, and hackers who have been caught,

               each of whom have different perspectives and




                                                                    20

               definitions of their own, the media definition, if not

               inherently biased, is at best inconsistent.

                    Criminologists, by way of contrast, have done

               little to define the computer underground from a

               sociological perspective.  Those criminological

               definitions that do exist are less judgmental than the

               media image, but no more precise. Labels of

               "electronic trespassers" (Parker, 1983), and

               "electronic vandals" (Bequai, 1987) have both been

               applied to hackers.  Both terms, while acknowledging

               that "hacking" is deviant, shy away from labeling it as

               "criminal" or sociopathic behavior.  Yet despite this

               seemingly non-judgmental approach to the computer

               underground, both Parker and Bequai have testified

               before Congress, on behalf of the computer security in-

               dustry, on the "danger" of computer hackers.

               Unfortunately, their "expert" testimony was largely

               based on information culled from newspaper stories, the

               objectiveness of which has been seriously questioned

               (Hollinger and Lanza-Kaduce 1988 p.105).

                    Computer security specialists, on the other hand,

               are often quick to identify CU participants as part of

               the criminal element. Correspondingly, some reject the

               notion that there are different roles and motivations

               among computer underground participants and thereby




                                                                    21

               refuse to define just what it is that a "hacker" or

               "phreaker" does.  John Maxfield, a "hacker expert,"

               suggests that differentiating between "hackers" and

               "phone phreaks" is a moot point, preferring instead

               that they all just be called "criminals" (WGN-Radio.

               Sept 28, 1988).

                    The reluctance or inability to differentiate

               between roles and activities in the computer

               underground, as exhibited in the media and computer

               security firms, creates an ambiguous definition of

               "hacker" that possesses  two extremes: the modern-day

               bank robber at one end, the trespassing teenager at the

               other.  Thus, most any criminal or mischievous act that

               involves computers can be attributed to "hackers,"2

               regardless of the nature of the crime.

                    Further compounding the inconsistent use of

               "hacker" is the evolution of meaning that the word has

               undergone.   "Hacker" was first  applied to computer

               related activities when it was used by programmers in

               the late 1950's.  At that time it referred to the

               pioneering researchers, such as those at M.I.T., who
               ____________________

                    2 During the WGN-Radio show on computer crime one
               caller, who was experiencing a malfunctioning phone
               that would "chirp" occasionally while hung up, believed
               that "computer hackers" were responsible for the
               problem.  The panel assured her that it was unrelated
               to CU activity.





                                                                    22

               were constantly adjusting and experimenting with the

               new technology (Levy, 1984. p.7).  A "hacker" in this

               context refers to an unorthodox, yet talented,

               professional programmer. This use of the term still

               exits today, though it is largely limited to

               professional computing circles.

                    Another definition of "hacker" refers to one who

               obtains unauthorized, if not illegal, access to

               computer systems and networks.  This definition was

               popularized by the movie War Games and, generally

               speaking, is the one used by the media.3 It is also the

               definition favored by the computer underground.

                    Both the members of the computer underground and

               computer programmers claim ownership of "hacker," and

               each defend the "proper" use of term.  The computer

               professionals maintain that using "hackers" (or

               "hacking") to refer to any illegal or illicit activity

               is a corruption of the "true" meaning of the word.  Bob

               Bickford, a professional programmer who has organized

               several programmer conferences, explains:
               ____________________

                    3 This is not always true of course.  The AP
               Stylebook has yet to specify how "hacker" should be
               used.  A recent  Associated Press story featured a
               computer professional explaining that a "real hacker"
               would never do anything illegal.  Yet just a few weeks
               later Associated Press distributed stories proclaiming
               that West German "hackers" had broken into US Defense
               Department computer systems.





                                                                    23

                    At the most recent conference %called
                    "Hackers 4.0"% we had 200 of the most
                    brilliant computer professionals in the world
                    together for one weekend; this crowd included
                    several PhD's, several presidents of
                    companies (including large companies, such as
                    Pixar), and various artists, writers,
                    engineers, and programmers.  These people all
                    consider themselves Hackers: all derive great
                    joy from their work, from finding ways around
                    problems and limits, from creating rather
                    than destroying.  It would be a great
                    disservice to these people, and the thousands
                    of professionals like them, to let some
                    pathetic teenaged criminals destroy the one
                    word which captures their style of
                    interaction with the universe: Hackers
                    (Bickford, 1988).

                    Participants in the computer underground also

               object to the "misuse" of the term. Their objection

               centers around the indiscriminate use of the word to

               refer to computer related crime in general and not,

               specifically, the activities of the computer

               underground:

                    Whenever the slightest little thing happens
                    involving computer security, or the breach
                    thereof, the media goes fucking bat shit and
                    points all their fingers at us 'nasty
                    hackers.' They're so damned ignorant it's
                    sick (EN, message log, 1988).

                    . . . whenever the media happens upon
                    anything that involves malicious computer use
                    it's the "HACKERS."  The word is a catch
                    phrase it makes mom drop the dishes and watch
                    the TV.  They use the word because not only
                    they don't really know the meaning but they
                    have lack of a word to describe the
                    perpetrator.  That's why hacker has such a
                    bad name, its always associated with evil
                    things and such (PA, message log, 1988).

                    I never seen a phreaker called a phreaker




                                                                    24

                    when caught and he's printed in the
                    newspaper. You always see them "Hacker caught
                    in telephone fraud."  "Hacker defrauds old
                    man with phone calling card." What someone
                    should do is tell the fucken (sic) media to
                    get it straight (TP2, message log, 1988).


                    Obviously the CU and computer professional

               definitions of "hacker" refer to different social

               groups.  As Best and Luckenbill (1982, p. 39) observe:

               "Every social group modifies the basic language to fit

               its own circumstance, creating new words or using

               ordinary words in special ways."  Which definition, if

               either, will come into widespread use remains to be

               seen.  However, since computer break-ins are likely to

               receive more media attention than clever feats of

               programming, the CU definition is likely to dominate

               simply by being used more often.4  But as long as the

               two definitions do exist there will be confusion unless

               writers and researchers adequately specify the group

               under discussion.  For this reason, I suggest that

               sociologists, and criminologists in particular, adopt

               the "underground" definition for consistency and
               ____________________

                    4 Another factor may be the adoption  of a close
               proximity to the underground definition being included
               in the 1986 edition of Webster's New World dictionary:
                    hack.er n. 1. a person who hacks 2. an unskilled
               golfer, tennis player, etc. 3. a talented amateur user
               of computers, specif. one who attempts to gain
               unauthorized access to files.





                                                                    25

               accuracy when speaking of the actions of CU

               participants.

                    While it is recognized that computer hacking is a

               relatively new phenomenon, the indiscriminant use of

               the term to refer to many different forms of unorthodox

               computer use has been counterproductive to

               understanding the extent of the activity. To avoid this

               a "computer hacker" should be defined as an individual,

               associated with the computer underground, who

               specializes in obtaining unauthorized access to

               computer systems.  A "phone phreak" in an individual,

               associated with the computer underground, who

               specializes in obtaining unauthorized information about

               the phone system.  A "software pirate" is an

               individual, associated with the computer underground,

               who distributes or collects copyrighted computer

               software. These definitions have been derived from the

               data, instead of relying upon those who defend the

               "integrity" of the original meanings, or those who are

               unfamiliar with the culture.




                                                                    26





                       Topography of the Computer Underground

                    Having defined the three main roles in the

               computer underground, it is necessary to examine each

               activity separately in order to provide a general

               typology of the computer underground.  In doing so, the

               ways in which each contributes to the culture as a

               whole will be illustrated, and the divisions between

               them that affect the overall organization will be

               developed. Analysis of these roles and divisions is

               crucial to understanding identity, access, and mobility

               within the culture.



               Hacking

                    In the vernacular of the computer underground,

               "hacking" refers to gaining access and exploring

               computer systems and networks. "Hacking" encompasses

               both the act and the methods used to obtain valid user

               accounts on computer systems.

                      "Hacking" also refers to the activity that

               occurs once access to another computer has been

               obtained. Since the system is being used without

               authorization, the hacker does not, generally speaking,

               have access to the usual operating manuals and other

               resources that are available to legitimate users.




                                                                    27

               Therefore, the hacker must experiment with commands and

               explore various files in order to understand and

               effectively use the system.  The goal here is to

               explore and experiment with the system that has been

               entered. By examining files and, perhaps, by a little

               clever programming, the hacker may be able to obtain

               protected information or more powerful access

               privileges.5



               Phreaking

                    Another role in the computer underground is that

               of the "phone phreak."  Phone phreaking, usually called

               just "phreaking," was widely publicized when the

               exploits of John "Cap'n Crunch" Draper, the "father of

               phreaking," were publicized in a 1971 Esquire magazine

               article.

                    The term "phreaking" encompasses several different

               means of circumventing  the billing mechanisms of

               telephone companies.  By using these methods, long-
               ____________________

                    5 Contrary to the image sometimes perpetuated by
               computer security consultants, the data indicate that
               hackers refrain from deliberately destroying data or
               otherwise damaging the system.  Doing so would conflict
               with their instrumental goal of blending in with the
               average user so as not to attract undue attention to
               their presence and cause the account to be deleted.
               After spending what may be a substantial amount of time
               obtaining a high access  account, the hacker places a
               high priority on not being discovered using it.





                                                                    28

               distance phone calls can be placed without cost. In

               many cases the methods also prevent, or at least

               inhibit, the possibility of calls being traced to their

               source thereby helping the phreaker to avoid being

               caught.

                    Early phreaking methods involved electro-

               mechanical devices that generated key tones, or altered

               line voltages in certain ways as to trick the

               mechanical switches of the phone company into

               connecting calls without charging.  However the advent

               of computerized telephone-switching systems largely

               made these devices obsolete.  In order to continue

               their practice the phreaks have had to learn hacking

               skills:6

                    Phreaking and hacking have just recently
                    merged, because now, the telephone companies
                    are using computers to operate their network.
                    So, in order to learn more about these
                    computers in relation to the network, phreaks
                    have learned hacking skills, and can now
                    program, and get around inside the machines
                    (AF, message log, 1988).

                    For most members of the computer underground,

               phreaking is simply a tool that allows them to call

               long distance without amassing enormous phone bills.
               ____________________

                    6 Because the two activities are so closely
               related, with phreakers learning hacking skills and
               hackers breaking into "telco" computers, reference is
               usually made to phreak/hacking or "p/hackers."  This
               paper follows this convention.





                                                                    29

               Those who have a deeper and more technically oriented

               interest in the "telco" (telephone company) are known

               as phreakers. They, like the hackers discussed earlier,

               desire to master and explore a system that few

               outsiders really understand:

                    The phone system is the most interesting,
                    fascinating thing that I know of. There is so
                    much to know. Even phreaks have their own
                    areas of knowledge.  There is so much to know
                    that  one phreak could know something fairly
                    important and the next  phreak not.  The next
                    phreak might know ten things that the  first
                    phreak doesn't though. It all depends upon
                    where and  how they get their info.  I myself
                    %sic% would like to work for the telco, doing
                    something interesting, like programming a
                    switch. Something that isn't slave labor
                    bullshit. Something that you enjoy, but have
                    to take risks in order to participate unless
                    you are lucky enough to work for the telco.
                    To have access to telco things, manuals, etc
                    would be great (DP, message log, 1988).

                    Phreaking involves having the dedication to
                    commit yourself to learning as much about the
                    phone system/network as possible. Since most
                    of this information is not made public,
                    phreaks have to resort to legally
                    questionable means to obtain the knowledge
                    they want (TP2, message log, 1988).



                    Most members of the underground do not approach

               the telephone system with such passion. Many hackers

               are interested in the phone system solely to the extent

               that they can exploit its weaknesses and pursue other

               goals.  In this case, phreaking becomes a means and not

               a pursuit unto itself. Another individual, one who




                                                                    30

               identifies himself as a hacker, explains:

                    I know very little about phones . . . I just
                    hack. See, I can't exactly call these numbers
                    direct.  A lot of people are in the same
                    boat.  In my case, phreaking is a tool, an
                    often used one, but nonetheless a tool (TU,
                    message log, 1988).


                    In the world of the computer underground, the

               ability to "phreak a call" is taken for granted.  The

               invention of the telephone credit card has opened the

               door to wide-scale phreaking.  With these cards, no

               special knowledge or equipment is required to phreak a

               call, only valid credit card numbers, known as "codez,"

               are needed to call any location in the world.  This

               easy access to free long-distance service is

               instrumental for maintaining contact with CU

               participants scattered across the nation.



               Pirating

                    The third major role in the computer underground

               is that of the software pirate.  Software piracy refers

               to the unauthorized copying and distribution of copy-

               righted software.  This activity centers around

               computer bulletin board systems that specialize in

               "warez."7   There pirates can contribute and share
               ____________________

                    7 "Warez" is a common underground term that refers
               to pirated software.





                                                                    31

               copies of commercial software. Having access to these

               systems (usually obtained by contributing a copyrighted

               program via a telephone modem) allows the pirate to

               copy, or "download," between two to six programs that

               others have contributed.

                    Software piracy is a growing concern among

               software publishing companies. Some contend that the

               illegal copying of software programs costs the industry

               billions of dollars in lost revenues. Pirates challenge

               this, and claim that in many ways pirating is a hobby,

               much like collecting stamps or baseball cards, and

               their participation actually induces them to spend more

               on software than they would otherwise, even to the

               point of buying software they don't truly need:

                    There's a certain sense of, ahh, satisfaction
                    in having the latest program, or being the
                    first to upload a program on the "want list."
                    I just like to play around with them, see
                    what they can do. If I like something, I'll
                    buy it, or try out several programs like it,
                    then buy one. In fact, if I wasn't pirating,
                    I wouldn't buy any warez, because some of
                    these I buy I do for uploading or just for
                    the fun of it. So I figure the software
                    companies are making money off me, and this
                    is pretty much the same for all the really
                    elite boards, the ones that have the best and
                    most programs. . . . I just bought a $117.
                    program, an accounting program, and I have
                    absolutely no use for it. It's for small
                    businesses.  I thought maybe it would auto-
                    write checks, but it's really a bit too high
                    powered for me. I thought it would be fun to
                    trade to some other boards, but I learned a
                    lot from just looking at it (JX, field notes,
                    1989).




                                                                    32


                    Pirates and phreak/hackers do not necessarily

               support the activities of each other, and there is

               distrust and misunderstanding between the two groups.

               At least part of this distrust lies in the

               phreak/hacker perception that piracy is an unskilled

               activity.8  While p/hackers probably don't disapprove

               of piracy as an activity, they nevertheless tend to

               avoid pirate bulletin board systems --partly because

               there is little pertinent phreak/hack information

               contained on them, and partly because of the belief

               that pirates indiscriminately abuse the telephone

               network in pursuit of the latest computer game.  One

               hacker illustrates this belief by theorizing that

               pirates are responsible for a large part of telephone

               credit card fraud.

                    The media claims that it is solely hackers
                    who are responsible for losses pertaining to
                    large telecommunication companies and long
                    distance services.  This is not the case.  We
                    are %hackers% but a small portion of these
                    losses.  The rest are caused by pirates and
                    thieves who sell these codes to people on the
                    street (AF, message log, 1988).

                    Other hackers complained that uploading large
               ____________________

                    8 A possible exception to this are those pirates
               that have the programming skills needed to remove copy
               protection from software.  By removing the program code
               that inhibits duplicate copies from being made these
               individuals, known as "crackers," contribute greatly to
               the easy distribution of "warez."





                                                                    33

               programs frequently takes several hours to complete,

               and it is pirate calls, not the ones placed by "tele-

               communications enthusiasts" (a popular euphemism for

               phreakers and hackers) that cost the telephone industry

               large sums of money. However, the data do not support

               the assertation that all pirates phreak their calls.

               Phreaking is considered "very tacky" among elite

               pirates, and system operators (Sysops) of pirate

               bulletin boards discourage phreaked calls because it

               draws attention to the system when the call is

               discovered by the telephone company.

                    Regardless of whether it is the lack of phreak/

               hack skills, the reputation for abusing the network, or

               some other reason, there is indeed a certain amount of

               division between the world of phreakers and hackers and

               that of pirates. The two communities co-exist and share

               resources and methods, but function separately.






                                                                    34





                    Social Organization and Deviant Associations

                    Having outlined and defined the activities of the

               computer underground, the question of social

               organization can be addressed.  Joel Best and David

               Luckenbill (1982) have developed a typology for

               identifying the social organization of deviant

               associations.  Essentially they state that deviant

               organizations, regardless of their actual type of

               deviance, will vary in the complexity of their division

               of labor, coordination among organization roles, and

               the purposiveness with which they attempt to achieve

               their goals.  Those organizations which display high

               levels in each of these categories are more

               sophisticated than those with lower levels.

                    Deviants relations with one another can be
                    arrayed along the dimension of organizational
                    sophistication. Beginning with the least
                    sophisticated form, %we% discuss five forms
                    of the social organization of deviants:
                    loners, colleagues, peers, mobs, and formal
                    organizations.  These organization forms are
                    defined in terms of four variables: whether
                    the deviants associate with one another;
                    whether they participate in deviance
                    together; whether their deviance requires an
                    elaborate division of labor; and whether
                    their organization's activities extend over
                    time and space (Best and Luckenbill, 1982,
                    p.24).

               These four variables, also known as mutual association,

               mutual participation, elaborate division of labor, and




                                                                    35

               extended organization, are indicators of the social

               organization of deviant groups. The following, taken

               from Best and Luckenbill, illustrates:

               FORM OF       MUTUAL    MUTUAL      DIVISION  EXTENDED
               ORGAN-        ASSOCIA-  PARTICIPA-  OF        ORGAN-
               IZATION       TION      TION        LABOR     IZATION
               -----------------------------------------------------
               Loners         no        no          no        no
               Colleagues     yes       no          no        no
               Peers          yes       yes         no        no
               Mobs           yes       yes         yes       no
               Formal
               Organizations  yes       yes         yes       yes
               _____________________________________________________
                                                       (1982, p.25)


                    Loners do not associate with other deviants,
                    participate in shared deviance, have a
                    division of labor, or maintain their deviance
                    over extended time and space.  Colleagues
                    differ from loners because they associate
                    with fellow deviants. Peers not only
                    associate with one another, but also
                    participate in deviance together.  In mobs,
                    this shared participation requires an
                    elaborate division of labor.  Finally, formal
                    organizations involve mutual association,
                    mutual participation, an elaborate division
                    of labor, and deviant activities extended
                    over time and space (Best and Luckenbill,
                    1982, pp.24-25).

                    The five forms of organizations are presented as

               ideal types, and "organizational sophistication" should

               be regarded as forming a continuum with groups located

               at various points along the range (Best and Luckenbill,

               1982, p.25).  With these two caveats in mind, we begin

               to examine the computer underground in terms of each of




                                                                    36

               the four organizational variables. The first level,

               mutual association, is addressed in the following

               section.






                                                                    37





                                 Mutual Association

                    Mutual association is an indicator of

               organizational sophistication in deviant associations.

               Its presence in the computer underground indicates that

               on a social organization level phreak/hackers act as

               "colleagues."  Best and Luckenbill discuss the

               advantages of mutual association for unconventional

               groups:

                    The more sophisticated the form of
                    organization, the more likely the deviants
                    can help one another with their problems.
                    Deviants help one another in many ways: by
                    teaching each other deviant skills and a
                    deviant ideology; by working together to
                    carry out complicated tasks; by giving each
                    other sociable contacts and moral support; by
                    supplying one another with deviant equipment;
                    by protecting each other from the
                    authorities; and so forth.  Just as  %others%
                    rely on one another in the course of everyday
                    life, deviants find it easier to cope with
                    practical problems when they have the help of
                    deviant associates (1982,pp.27-28).


                    Hackers, phreakers, and pirates face practical

               problems. For example, in order to pursue their

               activities they require  equipment9 and knowledge.  The
               ____________________

                    9 The basic equipment consists of a modem, phone
               line, and a computer -- all items that are available
               through legitimate channels.  It is the way the
               equipment is used, and the associated knowledge that is
               required, that distinguishes hackers from other
               computer users.





                                                                    38

               problem of acquiring the latter must be solved and,

               additionally, they must devise ways to prevent

               discovery , apprehension and sanctioning by social

               control agents.10

                    One method of solving these problems is to turn to

               other CU members for help and support.  Various means

               of communication have been established that allow

               individuals to interact regardless of their location.

               As might be expected, the communication channels used

               by the CU reflect their interest and ability in high-

               technology, but the technical aspects of these methods

               should not overshadow the mutual association that they

               support.  This section examines the structure  of

               mutual association within the computer underground.














               ____________________



                    10 Telephone company security personnel, local law
               enforcement, FBI, and Secret Service agents have all
               been involved in apprehending hackers.





                                                                    39





                      The Structure of the Computer Underground

                    Both computer underground communities, the

               p/hackers and the pirates, depend on communications

               technology to provide meeting places for social and

               "occupational" exchanges.  However, phreakers, hackers,

               and pirates are widely dispersed across the country

               and, in many cases, the globe.  In order for the

               communication to be organized and available to

               participants in many time zones and "working" under

               different schedules, centralized points of information

               distribution are required.  Several existing

               technologies --computer bulletin boards, voice mail

               boxes, "chat" lines, and telephone bridges/loops --

               have been adopted by the CU for use as communication

               points. Each of these technologies will be addressed in

               turn, giving cultural insight into CU activities, and

               illustrating mutual association among CU participants.



               Bulletin Board Systems

                    Communication in the computer underground takes

               place largely at night, and primarily through Bulletin

               Board Systems (BBS).  By calling these systems and

               "logging on" with an account and password individuals

               can leave messages to each other, download files and




                                                                    40

               programs, and, depending on the number of phone lines

               into the system, type messages to other users that may

               be logged on at the same time.

                    Computer Bulletin Board Systems, or "boards,"  are

               quite common in this computerized age.  Nearly every

               medium-sized city or town has at least one. But not all

               BBS are part of the computer underground culture.  In

               fact, many systems prohibit users from discussing CU

               related activity.  However, since all bulletin boards

               systems essentially function alike it is only the

               content, users, and CU culture that distinguish an

               "underground" from a "legitimate" bulletin board.

                    Computer Underground BBS are generally owned and

               operated by a single person (known as the "system

               operator" or "sysop"). Typically setup in a spare

               bedroom, the costs of running the system are paid by

               the sysop, though some boards solicit donations from

               users. The sysop maintains the board and allocates

               accounts to people who call the system.

                    It is difficult to assess the number of

               underground bulletin boards in operation at any one

               time. BBS in general are transitory in nature, and CU

               boards are no exception to this. Since they are

               operated by private individuals, they are often set up

               and closed down at the whim of the operator. A week




                                                                    41

               that sees two new boards come online may also see

               another close down.  A "lifetime" of anywhere from 1

               month to 1-1/2 years is common for pirate and

               phreak/hack boards.11   One BBS, claimed to be the

               "busiest phreak/hack board in the country" at the

               time,12 operated for less than one year and was

               suddenly closed when the operator was laid off work.

                    Further compounding the difficulty of estimating

               the number of CU boards is their "underground" status.

               CU systems do not typically publicize their existence.

               However, once access to one has been achieved, it is

               easy to learn of other systems by asking users for the

               phone numbers.  Additionally, most BBS maintain lists

               of other boards that users can download or read. So it

               is possible, despite the difficulties, to get a feel

               for the number of CU boards in operation.    Pirate

               boards are the most common of "underground" BBS.  While

               there is no national "directory" of pirate boards,

               there are several listings of numbers for specific
               ____________________

                    11 While some non-CU BBS' have been operating
               since 1981, the longest operating phreak/hack board has
               only been in operation since 1984.


                    12 At it's peak this p/h board was receiving 1000
               calls a month and supported a community of 167 users
               (TP BBS, message log, 1989).





                                                                    42

               computer brands.13  One list of Apple pirate boards has

               700 entries. Another, for IBM boards, lists just over

               500.  While there is no way of determining if these

               lists are comprehensive, they provide a minimum

               estimate. Pirate boards for systems other than IBM or

               Apple seem to exhibit similar numbers. David Small, a

               software developer that has taken an aggressive stance

               in closing down pirate boards, estimates that there are

               two thousand in existence at any one time (1988).

               Based on the boards discovered in the course of this

               research, and working from an assumption that each of

               the four major brands of microcomputers have equal

               numbers of pirate boards, two thousand is a reasonable

               estimate.

                    The phreak/hack BBS community is not divided by

               differing brands of micro-computers.  The applicability

               of phreak/hack information to a wide range of systems

               does not require the specialization that pirate boards

               exhibit.  This makes it easier to estimate the number

               of systems in this category.

                    John Maxfield, a computer security consultant, has

               asserted that there are "thousands" of phreak/hack
               ____________________

                    13 Pirate boards are normally "system specific" in
               that they only support one brand or model of
               microcomputer.





                                                                    43

               boards in existence (WGN-Radio, November 1988).  The

               data, however, do not confirm this.  A list of

               phreak/hack boards compiled by asking active p/hackers

               and downloading BBS lists from known phreak/hack

               boards, indicates that there are probably no more than

               one hundred.  Experienced phreak/hackers say that the

               quality of these boards varies greatly, and of those

               that are in operation today only a few (less than ten)

               attract the active and knowledgeable user.

                    Right after "War Games" came out there must
                    have been hundreds of hacker bulletin boards
                    spring up. But 99% of those were lame. Just a
                    bunch of dumb kids that saw the movie and
                    spent all there %sic% time asking "anyone got
                    any k00l numberz?" instead of actually
                    hacking on anything. But for a while there
                    was %sic% maybe ten systems worth calling . .
                    . where you could actually learn something
                    and talk to people who knew what was going
                    Nowadays %sic% there are maybe three that I
                    consider good . . . and about four or five
                    others that are okay.  The problem is that
                    anybody can set up a board with a k-rad name
                    and call it a hacker board and the media/feds
                    will consider it one if it gets busted. But
                    it never really was worth a shit from the
                    beginning.(TP2, field notes, 1989)


                    Towards a BBS Culture.  Defining and identifying

               CU boards can be problematic.  The lack of an ideal

               type undoubtedly contributes to the varying estimates

               of the number of CU bulletin board systems. While

               developing such a typology is not the intent of this

               work, it is appropriate to examine the activities and




                                                                    44

               characteristics exhibited by BBS supporting the pirate

               and phreak/hack communities.  While much of the culture

               of pirate and phreak/hack worlds overlap, there are

               some differences in terms of how the BBS medium is used

               to serve their interests. We begin with a short

               discussion of the differences between the two

               communities, then discuss cultural characteristics

               common to all CU BBS systems.

                    All BBS feature a "files area" where programs and

               text files are available for downloading by users.

               Initially these programs/files are supplied by the

               system operator, but as the board grows they are

               contributed (called "uploading") by callers. The

               content and size of the files area differs according to

               whether the board supports the pirate or phreak/hack

               community.

                    The files area on a pirate board consists

               primarily of programs and program documentation.

               Normally these programs are for only one brand of

               micro-computer (usually the same as the system is being

               run on). Text files on general or non-computer topics

               are uncommon.  A "files area" menu from a pirate BBS

               illustrates the emphasis on software:

                    %1% Documentation        %2% Telecommunications
                    %3% Misc Applications    %4% Word Processing
                    %5% Graphics             %6% Utilities
                    %7% Games 1              %8% Games 2




                                                                    45

                    %9% XXX Rated            %10% Elite_1
                    %11% Elite_2             %12% Super_Elite
                                      (IN BBS, message log, 1988)

                    The "files area" on a phreak/hack BBS is

               noticeably smaller than it is on pirate systems.  It

               consists primarily of instructional files (known as "g-

               files" for "general files") and copies of phreak/hack

               newsletters and journals.  Pirated commercial software

               is very rare; any programs that are available are

               usually non-copyrighted specialized programs used to

               automate the more mundane aspects of phreaking or

               hacking. It is not uncommon to find them in forms

               usable by different brands of computers.  A "files

               area" list from a phreak/hack BBS is listed here

               (edited for size):

                      Misc Stuff
                    -------------
                    BRR2    .TXT: Bell Research Report Volume II
                    BRR1    .TXT: Bell Research Report Volume I
                    CONFIDE .ARC: Confide v1.0 DES
                                  EnCryption/DeCryption
                    CNA     .TXT: A bunch of CNA numbers
                    CLIPS   .ARC: newsclippings/articles on hackers
                                  and busts
                    ESS1    .TXT: FILE DESCRIBING THE ESS1 CHIP
                    TELEPHON.TXT: NY Times Article on hackers/phreaks
                    HP-3000 .TXT: This tells a little info about hp
                    VIRUS   .TXT: Digest of PC anti-viral programs.

                    Hack/Phreak Programs
                    -----------------------
                    THIEF   .ARC: Code Thief for IBM!
                    PC-LOK11.ARC: IBM Hard Disk Lock Utility- fairly
                                  good.
                    PHONELIS.COM: Do a PHONE DIR command on VAX from
                                  DCL.
                    XMO     .FOR: VAX Xmodem Package in FORTRAN




                                                                    46

                    PASSWORD.ARC: IBM Password on bootup.  Not too
                                  bad.

                    Archived Gfiles
                    ----------------------
                    PHRACK15.ARC: Phrack #15
                    PHRACK10.ARC: Phrack #10
                    PHRACK20.ARC: Phrack #20
                    ATI1_6.ARC  : ATI issues one thru six
                    PHRACK5.ARC : Phrack #5
                    PHRACK25.ARC: Phrack #25
                    PHUN1.ARC   : P/Hun first issue
                    TCSJ.ARC    : Telecom Security Journal
                    ATI31.ARC   : Activist Times Inc number 31
                    LODTECH3.ARC: LoD Tech Journal three
                                         (TPP BBS, message log, 1988)

                    The difference in files area size is consistent

               with the activities of pirates and phreak/hackers.  The

               main commodity of exchange between pirates is, as

               discussed earlier, copyrighted software thus accounting

               for the heavy use of that area of the board that

               permits exchange of programs.  The phreak/hackers, on

               the other hand, primarily exchange information about

               outside systems and techniques.  Their interests are

               better served by the "message bases" of BBS.

                    The "message bases" (areas where callers leave

               messages to other users) are heavily used on

               phreak/hack systems. The  messages are not specific to

               one brand of micro-computer due to the fact that not

               all users own the same equipment. Rather than focus on

               the equipment owned by the phreak/hacker, the messages

               deal with their "targets."  Everything from

               phreak/hacking techniques to CU gossip is discussed. On




                                                                    47

               some boards all the messages, regardless of topic, are

               strung together in one area.  But on others there are

               separate areas dealing with specific networks and

               mainframe computers:

                    Message Boards available:

                     1 : General
                     2 : Telecommunications
                     3 : Electronics
                     4 : Packet Switched Nets
                     5 : VAX/DEC
                     6 : Unix
                     7 : Primos
                     8 : HP-x000
                     9 : Engineering
                    10 : Programming & Theory
                    11 : Phrack Inc.
                    12 : Sociological Inquiries
                    13 : Security Personnel & Discussion
                    14 : Upper Deck
                    15 : Instructors
                                       (TPP BBS, message log, 1988)


                    The pirate community, on the other hand, makes

               little use of the "message bases." Most users prefer to

               spend their time (which may be limited by the system

               operator on a per day or per call basis) uploading

               and/or downloading files rather than leaving messages

               for others.  Those messages that do exist are usually

               specific to the pirating enterprise such as help with

               programs on the board, requests for specific programs

               ("want lists"), and notices about other pirate bulletin

               boards that users may want to call. Occasional

               discussion of phreaking may occur, but the emphasis is




                                                                    48

               on techniques used to make free calls, not technical

               network discussions as often occurs on phreak/hack

               systems.  A list of message areas from a large pirate

               BBS illustrates the emphasis on the pirating

               enterprise.  A message area for general discussions has

               been created, but those areas devoted to pirating

               display more use:

                    Area %1% General Discussion      15 messages
                    Area %2% Pirating Only!!         75 messages
                    Area %3% Warez Wants             31 messages
                    Area %4% **private messages**    10 messages
                                     (TL BBS, message log, 1988)


                    In addition to the differences between files and

               message use on pirate and phreak/hack boards, they

               differ in degree of community cohesiveness.  Every BBS

               has a group of "users" --the people who have accounts

               on the system. The group of users that call a specific

               BBS can be considered to be a "community" of loosely

               associated individuals by virtue of their "membership"

               in the BBS.

                    Additionally, the system itself, serving either

               pirates or phreak/hackers, exists within a loose

               network of other bulletin boards that serve these same

               interests. It is within this larger community where

               pirate and phreak/hack boards seem to differ.

                    Due to the brand-specific nature of pirate boards,

               there is not a strong network between pirate BBS that




                                                                    49

               operate on other systems.  This is understandable as a

               pirate that owned an Apple computer would have little

               use for the programs found on an IBM board.  However,

               this creates separate communities of active pirates,

               each loosely associated with other users of their

               computer type, but with little or no contact with

               pirate communities on other systems.

                    There is, however, a degree of cohesiveness among

               pirate boards that support the same micro-computers.

               While the users may be different on systems, the data

               shows that some pirate boards are "networked" with each

               other via special software that allows messages and

               files to be automatically shared between different

               boards.  Thus a message posted on a west coast pirate

               board will be automatically copied on an east coast BBS

               later that night. In a like manner, software programs

               can be sent between "networked" boards.  The extent of

               this network is unknown.

                    The pirate BBS community also exhibits

               cohesiveness in the form of "co-sysops."  As discussed

               earlier, sysops are the system operators and usually

               owners of BBS.  On some pirate boards, "co-sysop"

               distinction is given to an operator of another board,

               often located in another state. This forms a loose

               network of "sister boards" where the sysop of one has




                                                                    50

               co-sysop privileges on the other.   However, this

               cooperative effort appears to be limited mainly to the

               system operators as comparing user lists from sister

               boards shows little overlap between the regular

               callers. How co-sysop positions are utilized is

               unknown, and it is suspected that they are largely

               honorary.  But nonetheless it is indicative of mutual

               association between a small number of boards.

                     The phreak/hack board community does not exhibit

               the same brand-specific division as the pirate

               community.  Unlike the divided community of pirates,

               phreak/hackers appear to maintain contacts throughout

               the country.  Obtaining and comparing user lists from

               several phreak/hack BBS reveals largely the same group

               of people using several different boards across the

               country.14 While phreak/hack boards have yet to adopt

               the "networking" software used by pirate boards, an

               active group of phreak/hackers is known to use the

               sophisticated university mainframe computer network,

               called Bitnet, to exchange phreak/hack newsletters and

               gossip.

                    Despite the operational differences between pirate
               ____________________

                    14 In fact, users lists from phreak/hack BBSs
               located in Europe and Australia show that many U.S.
               p/hackers utilize these systems as well.





                                                                    51

               and phreak/hack boards, their cultures are remarkably

               similar. Any discussion of the computer underground

               must include both communities.  Additionally, a

               formulation of the culture of CU BBS must address the

               means in which access to the board, and thus deviant

               associates, is obtained.

                    For a caller to successfully enter the CU BBS

               community, he must display an awareness of CU culture

               and technical skill in the CU enterprise. If the caller

               fails to exhibit cultural knowledge, then access to the

               board is unlikely to be granted.  The ways in which

               this cultural knowledge is obtained and displayed

               illustrates the social nature of the CU and further

               displays some of the subcultural norms of behavior.

                    On most "licit" (non-underground) boards,

               obtaining permission to use the system is accomplished

               by logging on and providing a name and home phone

               number to the system operator (sysop).  Sysop's

               normally do not check the validity of the information,

               and once a caller has provided it he or she is granted

               full access to the system.  There is normally one level

               of access for all users, with only the sysop having

               more "powerful" access.

                    Obtaining access to underground bulletin boards is

               more complicated and requires more steps to complete.




                                                                    52

               In an attempt to prevent law enforcement agents

               ("feds") from obtaining accounts on systems where

               pirates or p/hackers are vulnerable, if not to actual

               arrest, then at least to exposing their latest act-

               ivities and methods, sysop's of illicit boards attempt

               to limit access to the system.

                    One method of doing this is to restrict

               publicizing the existence of the board.  Computer

               underground BBS are not normally included in BBS

               listings found in computer books and magazines, and

               there is a norm, particularly strong on p/hack systems,

               that the boards are not to be mentioned on non-CU

               systems.  There are, however, some "entry-level" CU BBS

               that are fairly well known.  These systems are known as

               "anarchist" boards.

                    "Anarchist" boards, while exhibiting many of the

               same characteristics as pirate and phreak/hack boards,

               are really a cross between the two and serve primarily

               as social outlets for both pirates and phreak/hackers.

               The message areas on "anarchist" boards are quite

               active, "chatty" messages are not discouraged. Indeed

               there are normally  several different message areas

               devoted to a wide range of topics including everything

               from "skipping school" to "punk rock." The files area

               contains both warez (but normally only the newest




                                                                    53

               games, and specific to the computer system that the

               board runs on) and phreak/hack text files.  Neither

               collection is as extensive as it would be on pirate-

               only or p/hack-only systems.

                    The data suggest that one function of "anarchist"

               boards is to introduce newcomers to the culture of the

               computer underground. By acting as "feeder boards,"

               they can provide preliminary socialization and

               instruction for CU behavior and techniques.

               Additionally, "anarchist" boards frequently provide

               areas where phone numbers to pirate and p/hack systems

               can be traded, thus providing systems where more in-

               depth information, and other contacts, can be found.  A

               phreak/hacker describes how an "anarchist" board was

               instrumental in introducing him to the computer

               underground:

                    I've been phreaking and hacking for about
                    four years now.  I discovered phreaking on my
                    own at this place I used to work.  We had
                    this small LD %long distance% provider that
                    used codez so I started hacking them out and
                    calling places myself . . . but I didn't know
                    no other phreaks at that time.  Then I
                    started using the codez to call boards from
                    home on my computer. Somebody gave me the
                    number to Jack Black's Whore House %an
                    "anarchy board"% and I started learning about
                    hacking and shit from the people and philes
                    they had there. Then one day this guy, King
                    Hammer, sent me some e-mail %a private
                    message% and told me to call his system.
                    That's where I really learned my way around
                    the nets and shit.  You could ask questions
                    and people would help you out and stuff. If I




                                                                    54

                    hadn't found out some of the tricks that I
                    did I probably would have got busted by now.
                    (TP2, field notes, 1989)

                    Once an individual has obtained the telephone

               number to a CU BBS, through whatever channels, callers

               follow essentially the same procedure as they do on

               licit systems . . . that of calling and logging on.

               However, since "underground" boards are not truly

               underground (that is, totally secret) first-time

               callers are not given access to the board itself. When

               a user is unable to provide an already valid

               username/password, the system will automatically begin

               its registration procedure.   First, the caller is

               asked to enter a "username" (the name used by the

               system to distinguish between callers) and "phone

               number."  These first system requests, normally seen

               only as "Enter Your Name and Phone Number," serve as

               partial screens to keep out non-underground callers

               that may have happened across the board.  The way that

               a user responds to these questions indicates if they

               have cultural knowledge of the CU. The  norm is to

               enter a pseudonym and a fake phone number.15 If a
               ____________________

                    15 A functional reason for this norm is that
               usernames and telephone numbers are stored on the
               computer as part of the BBS system files.  Should the
               BBS ever be seized in legal proceedings, this list of
               names and numbers (and on some systems addresses . . .
               which are also normally false) could be used to
               identify the users of the system.





                                                                    55

               caller enters his or her real name (or at least a name

               that does not appear to be a pseudonym) the system

               operator will be put on guard that the caller may not

               be aware of the type of board that he has called, for

               the pseudonym is the most visible of CU cultural

               traits.

                    All members of the underground adopt "handles" to

               protect their identity.  The pseudonyms become second

               identities and are used to log onto bulletin boards,

               and as  "signatures" on messages and instructional text

               files.16  They are not unlike those adopted by

               citizens-band radio users, and reflect both the humor

               and technical orientation of computer underground

               participants.  A review of handles used by phreakers,

               hackers, and pirates finds that they fall into three

               broad categories: figures from literature, films, and

               entertainment (often science fiction); names that play

               upon computers and related technologies; and

               nouns/descriptive names.  (See Appendix A for fictional

               examples of each.)

                    After providing a user name and entering a

               ____________________



                    16 The data suggest that, on the whole,
               individuals retain their handles over time.





                                                                    56

               password to be used for future calls, the caller is

               asked several more questions designed to screen users

               and determine initial access privileges.  Unlike licit

               boards, underground BBS may have several different

               levels of access with only the most trusted users being

               able to read messages and get files in "elite" or "high

               access" areas that are unknown and unavailable to other

               callers.  In many cases, pirate boards are able to

               operate "above ground"  and appear to be open-public

               access systems unless callers have the proper

               privileges to access the areas where the "good stuff"

               is located.  The answers given to access questionnaires

               determine whether a caller will receive access to some,

               all, or none of the higher levels.

                    These questionnaires frequently ask for "personal

               references" and a list of other boards the caller has

               "high access" on.  The question is vague, and random

               callers are unlikely to answer it correctly.  However,

               if the caller lists pseudonyms of other CU members that

               are known and trustworthy to the sysop, as well as some

               other boards that are known to have "good users" and

               "good security" access will usually be granted.17  If

               all the answers are relevant and indicative of CU
               ____________________

                    17 The data suggest that personal references are
               only checked if something seems unusual or suspicious.





                                                                    57

               knowledge, then initial access is normally granted.

                    Other methods of controlling access include

               presenting a "quiz" to determine if the technical

               knowledge of the user is up to par with the expertise

               expected on the boards.18  Some systems, instead of a

               quiz, ask the user to write a short statement (100

               words or less) about why they want access, where they

               got the phone number to the system, and what they can

               provide to other users. Some pirate boards come right

               out and ask the user to supply a list of the good

               "warez" that they can upload and what they are looking

               to download. If the caller fails to list recent

               copyrighted programs then it is evident that they are

               unaware of the nature of the BBS:

                    I had this one dude call up and he told me in
                    his message that he was looking for some
                    "good games."  So instead of giving him
                    access I just left him some e-mail %a private
                    message%.  I asked what kind of games he was
                    looking for. Next time he called he wrote
                    back and said "a public domain Asteroids
                    game."  I couldn't believe it. Not only is
                    Asteroids so damn old it's lame, but this guy
                    is looking for pd %public domain% shit.  No
                    way was he going to get access. He didn't
                    even know what this board is. I left him a
                    message telling him that I didn't have one.
                    He never called back after that (CH, sysop of
                    a pirate BBS, field notes, 1988).

               ____________________

                    18 One such quiz, from a p/h board, can be found
               in Appendix B.





                                                                    58

                    Ironically, the pseudo-elaborate security methods

               of underground boards, while they may be effective in

               keeping off random non-CU callers, are not effective in

               screening out "feds." Data and media accounts show that

               boards are regularly infiltrated by telephone security

               personnel and software companies. Also, the adoption of

               handles to protect identities is defeated by the

               consistent use of the same handle over time. But in

               order to obtain and maintain status and prestige in the

               CU one must keep the same pseudonym in order to

               (literally) "make a name for oneself." The fact that CU

               communication is not face-to-face requires a consistent

               means of identifying oneself to others.  The handle

               fulfills this purpose but at the same time becomes as

               attached to a single individual as a real name would.

               The access rituals of the computer underground, which

               are contingent on being a "known" pirate or

               phreak/hacker, make changing handles unproductive.

                    The life blood and center of the computer under-

               ground is the bulletin board network.  Acting as both

               the main trade center of performance related tools and

               innovations and as a means of socialization, the

               underground could not exist without the BBS network.

               They serve to "recruit" and educate newcomers and

               provide a way to traffic in information and software.




                                                                    59

               The pirating enterprise in particular is very dependent

               upon the BBS as they are the very means by which

               "warez" are traded.  For the phreak/hacker community,

               BBS provide a means of trading the resources of system

               numbers and passwords, as well as instructional texts

               on techniques.  The access process serves as evidence

               of mutual association amongst phreakers, hackers, and

               pirates as cultural knowledge is needed as well as

               personal references (evidence of acceptance and access

               to others).

                    The CU bulletin board systems are unique in that

               they provide a way to exchange information with a large

               number of others.  The other methods of CU commun-

               ication are based on conversations rather than written

               texts and thus are much less permanent.  These methods,

               discussed next, are telephone bridges/loops, voice mail

               boxes, and computer "chat" systems.



               Bridges, Loops, and Voice Mail Boxes

                    Of the additional means of communication used by

               the CU, telephone "bridges" and "loops" are most

               common.  Unlike BBS, which require data links provided

               by a computer and modem, bridges and loops are "old

               fashioned" voice connections.  Since they can not

               accommodate the transfer of programs or files they are

               used primarily by phreakers and hackers, and most often




                                                                    60

               as a social/recreational outlet.

                    A "bridge" is a technical name for what is

               commonly known as a "chat line" or "conference system."

               They are familiar to the  public as the pay-

               per-minute group conversation systems advertised on

               late night television.  Many bridge systems are owned

               by large corporations who maintain them for business

               use during the day.  While the numbers to these systems

               is not public knowledge, many of them have been

               discovered by phreaks who then utilize the systems

               during the night.

                    In addition to these pre-existing conference

               systems, phreakers have become skilled at  arranging

               for a temporary, private bridge to be created via

               AT&T's conference calling facilities.  This allows for

               conversations to be held among a self-selected group of

               phreak/hackers:19

                    Bridges can be %sic% extremely useful means
                    of distributing information as long as the
                    %phone% number is not known, and you don't
                    have a bunch of children online testing out
               ____________________

                    19 The data indicates that these private
               conference calls aren't "scheduled" in any real sense.
               One p/hacker will initiate the conference and call
               others at home to add them to the conference.  As more
               people join they suggest others to add. The initiator
               can temporarily jump out of the conference, call the
               new person and solicit their attendance. If they don't
               want to join or aren't home, the initiator simply
               returns to the conference without adding them in.





                                                                    61

                    their DTMF.20  The last great discussion I
                    participated with over a bridge occurred
                    about 2 months ago on an AT&T Quorum where
                    all we did was engineer 3/way %calls% and
                    restrict ourselves to purely technical infor-
                    mation. We could have convinced the Quorum
                    operators that we were AT&T technicians had
                    the need occurred. Don't let the kids ruin
                    all the fun and convenience of bridges.
                    Lameness is one thing, practicality is
                    another (DC, message log, 1988).


                    In addition to setting up "private" bridges,

               p/hackers can utilize "loop lines" in a further attempt

               to limit the number of eavesdroppers on their

               conversations. Unlike bridges, which connect a

               virtually unlimited number of callers at once, "loops"

               are limited to just two people at a time.

                    "Loop lines" are actually telephone company test

               lines installed for internal use.21  A loop consists of

               two separate telephone numbers that connect only to

               each other. Each end has a separate phone number, and

               when each person calls one end, they are connected to

               each other automatically.  This allows for individuals
               ____________________

                    20 "Dual Tone Multi Frequency" or in laymen terms,
               the touch tone sounds used to dial phone numbers.


                    21 These test lines are discovered by phreaks and
               hackers by programming their home computer to dial
               numbers at random and "listen" for the distinctive tone
               that an answering loop makes, by asking sympathetic
               telephone company employees, or through information
               contained on internal company computers.





                                                                    62

               to hold private conversations without divulging their

               location or identity by exchanging telephone numbers.

                    Finally, voice mail boxes ("VMB") are another

               means of communicating with individual actors. There

               are several commercial voice mail box systems located

               throughout the country.  They function similar to a

               telephone answering machine in that callers can call

               in, listen to a recorded message, and then leave a

               message for the box owner. Many of these systems are

               accessible via toll-free telephone numbers. The

               security of some VMB systems is notoriously poor. Many

               phreaks have expertise in "creating" boxes for

               themselves that are unknown (until discovered) by the

               owner of the system. However, these boxes are usually

               short lived since discovery by the system operator, and

               closure of the box, is only a matter of time. But as

               long as the box is functioning, it can serve as a means

               of communicating with others.  VMB numbers are

               frequently posted on bulletin boards with invitations

               to "call if you have any good stuff."  They are often

               used by pirates to exchange messages about new releases

               of software, and by phreak/hackers to trade account and

               access numbers.  Additionally, some of the underground

               newsletters and journals obtain boxes so users can call

               in news of arrests and other gossip.




                                                                    63

                    Like bulletin boards, VMBs are systems that allow

               information to be disseminated to a large number of

               associates, and unlike the live telephone conversations

               of bridges and loops, they are available at any time of

               the day.  Additionally, VMB's don't require use of a

               computer and modem, only a touch tone phone is needed

               to call the box.  Their usefulness is limited somewhat

               because they play only one "outgoing" message at a

               time, and their transitory nature limits their

               reliability.



               Summary

                    Phreakers, hackers and pirates do not act as

               loners.  They have adopted existing methods of

               communication, consistent with their skills in high

               technology, to form a social network that allows for

               the exchange of information, the socialization of new

               members, socializing with others, and in the case of

               pirates, performing the "deviant" act itself via these

               means.

                    These communication points create and foster

               groups of loosely associated individuals, with specific

               interests, coming together to exchange information

               and/or software. It is impossible to be a part of the

               social network of the computer underground and be a

               loner.   Based upon the Best and Luckenbill measure,




                                                                    64

               actors in the computer underground, by displaying

               mutual association, organize as colleagues.

                    The social network of the computer underground

               provides the opportunity for colleagues to form

               cooperative working relationships with others, thus

               moving the CU towards a more sophisticated form of

               social organization.  These "hacker groups" are

               addressed in the next section.




                                                                    65





                                Mutual Participation

                    In the previous chapter the ways in which the

               structure of the computer underground fosters mutual

               association  were discussed. Their social outlets and

               means for informational exchange bring the CU community

               together as deviant colleagues.  Their relationships

               fit quite well into the Best and Luckenbill (1982)

               typology of collegial associations:

                    The relationship between deviant colleagues
                    involves limited contact.  Like loners,
                    colleagues perform their deviant acts alone.
                    But unlike loners colleagues associate with
                    one another when they are not engaged in
                    deviance . . . In effect, there is a division
                    between two settings; onstage where
                    individual performs alone; and backstage,
                    where colleagues meet (cf Goffman).  In their
                    backstage meetings, colleagues discuss
                    matters of common interest, including
                    techniques for performing effectively, common
                    problems and how to deal with them, and ways
                    of coping with the outside world (1982 p.37).

                    However, despite the advantages of collegial

               association, ties between CU participants are weak.

               Loyalty between individuals seems rare, as the CU is

               replete with tales of phreak/hackers who, when

               apprehended, expose identities or "trade secrets" in

               order to avoid prosecution.  These weak collegial ties

               may be fostered by the anonymity of CU communication

               methods, and the fact that all CU actors are, to some




                                                                    66

               extent, in competition with each other. There are only

               so many systems with weak security and once such a

               system is found, sharing it with others will virtually

               ensure that the hole will be sealed when the increased

               activity is noticed.  Thus while p/hackers will share

               general knowledge with each other, specific information

               is not disseminated publicly.

                    As Best and Luckenbill have observed, in order to

               remain in a collegial relationship individuals must be

               able to successfully carry out operations alone (1982

               p.45). In order to sustain a career in p/hacking one

               must pursue and collect information independent of what

               is shared on the communication channels.  Despite the

               association with other phreakers and hackers, the

               actual performance of the phreak/hacking act is a

               solitary activity.22

                    That is not to say, however, that p/hackers never

               share specific information with others.  As discussed

               earlier, p/hack bulletin board systems frequently have

               differentiated levels of access where only highly

               regarded individuals are able to leave and read

               messages. These areas are frequently used to keep
               ____________________

                    22 This does not hold true for pirates. By
               definition they must trade programs with other
               individuals.





                                                                    67

               information from "unskilled" users at the lower levels.

               There are strong social norms that some information

               should not be shared too widely, as it may be either

               "abused" or fall into the hands of enforcement agents.

               For example, when one p/hacker announced that he was

               going to release a tutorial on how to infiltrate a new

               telephone company computer, he received the following

               messages in reply:

                    Not smart, DT. %That computer% is a system
                    which can be quite powerful if used to its
                    potential. I don't think that information on
                    programming the switches should be released
                    to anyone. Do you realize how destructive
                    %that computer% could really be if used by
                    someone who is irresponsible and intends on
                    destroying things? Don't even think about
                    releasing that file. If you do release that
                    file, it will disappear and will no longer
                    remain in circulation. Believe me. Not many
                    have the right to know about %that computer%,
                    or any other delicate telco computers for
                    that matter. Why do you think the fucking New
                    York Times published that big article on
                    hackers screwing around with telco machines?
                    Not only will you get into a lot of trouble
                    by releasing that file on %computer%, you
                    will be making telcos more aware of what is
                    actually happening, and soon no one will be
                    able to learn about their systems. Just think
                    twice (EP, message log, 1988).

                    Why would you want normal people to have such
                    knowledge? Any why would you post about it?
                    If you have knowledge that's fine but DON'T
                    spread that knowledge among others that may
                    abuse it. It's not impressive! I don't know
                    why anyone would want to disperse that
                    knowledge. Please don't release any "in
                    depth" files on such systems of great power.
                    Keep that to yourself it will just mess it up
                    for others (UU, message log, 1988).





                                                                    68


                    The desire to share information with selected

               colleagues often leads to the formation of cooperative

               "working groups." These partnerships are easily formed,

               as the structure of mutual association in the CU

               creates a means where "talent" can be judged on the

               basis of past interactions, longevity in the field, and

               mutual interests. When allegiances are formed, the CU

               actors begin "mutual participating" in their acts, thus

               becoming "peers" in terms of social organization.

                    Mutual participation, as defined in the Best and

               Luckenbill typology, is exhibited by actors sharing in

               the same deviant act, in the physical presence of one

               another (1982 p.45).  However, the measurement was

               "grounded" in studies of traditional deviant

               associations (eg:  street gangs, prostitutes, etc.)

               where "real-time" interaction is common. The technology

               used by the CU negates this requirement as actors can

               be located in different parts of the country.

               Additionally, "hacking" on a system, by a group of

               peers, does not require simultaneous participation by

               all members.  However Best and Luckenbill's typology is

               an ideal type, and the activities of peers in the

               computer underground do not fall outside of the spirit

               or intention of their concept of mutual participation.

               Their description of deviant peer associations is




                                                                    69

               presented here:

                    Deviant peers are distinguished from
                    colleagues by their shared participation in
                    deviance.  While colleagues carry out their
                    deviant operations alone, peers commit
                    deviant acts in one another's presence.
                    Peers cooperate in carrying out deviant
                    operations, but they have a minimal division
                    of labor, with each individual making roughly
                    comparable contribution.  Peer relationships
                    also tend to be egalitarian and informal;
                    some peers may be acknowledged leaders or
                    admired for their skill, but there is no set
                    division of authority.  Like colleagues,
                    peers share subcultural knowledge, but peer
                    groups typically provide their members with
                    more support.  In addition to cooperating in
                    deviant operations, peers may recruit and
                    socialize newcomers and supply one another
                    with deviant equipment and social support.
                    Thus, the bonds between peers are stronger
                    than those linking colleagues (1982, p.45).

                    Peer associations in the CU are largely limited to

               small groups23 working on a specified goal.  Both

               pirates and p/hackers organize themselves in this

               regard, though their characteristics differ.  We begin

               with a discussion of mutual participation among

               pirates.



               Pirate Groups

                    Pirate groups are composed of less than ten
               ____________________

                    23 In terms of the ideal type for deviant peers
               any two individuals working in cooperation exhibit
               mutual participation. The discussion here addresses
               groups that consist of three or more people that
               identify themselves as a sort of "club." Short-lived
               interaction between two people is not considered a
               "group" in the CU culture.





                                                                    70

               members.  Their primary purpose is to obtain the latest

               software, remove any copy-protection from it, and then

               distribute it to the pirate community.  Often the

               "warez" that they distribute will be adorned with the

               group name, so subsequent users will be aware of the

               source of the software.  Many pirate groups have "home"

               BBS systems that act as key distribution points, and as

               places where outsiders can communicate with members of

               the association. This researcher was unable to obtain

               data about the internal organization of pirate groups,

               but it appears that they are leaderless, with

               individual members working alone but giving credit to

               the group as a whole.



               Phreak/hack groups

               The existence of phreak/hacker groups is well

               documented in the data, and has been heavily reported

               in the media.  Two hacker groups in particular, The

               414's (named for the Wisconsin area code in which they

               lived), and The Inner Circle, received a large amount

               of press after being apprehended for various computer

               break-ins.  However, the "threat" that such groups

               represent has probably been overstated as the data

               indicate that "hacker gangs" vary greatly in

               organization and dedication to the CU enterprise.

                    Many hacker groups are short-lived associations of




                                                                    71

               convenience, much like the "no girls allowed!" clubs

               formed by young boys.  They often consist of four to

               nine beginning phreak/hackers who will assist each

               other in obtaining telephone credit-card numbers. By

               pooling their resources, a large number of illicit

               "codez" can be obtained and shared with others.

               Distribution of the account numbers is not limited to

               the group, they are often shared with the community at

               large, "courtesy of Codez Kidz Ltd." Groups of this

               type are looked at with disdain by "elite"

               phreak/hackers and are often criticized as being more

               interested in self-promotion then they are with

               actually phreaking or hacking.

                    Some hacker groups are very proficient and

               dedicated to their craft, however. These groups are

               characterized by smaller memberships, less visibility

               to non-members, and commitment to the CU enterprise.

               They are loosely organized, yet some have managed to

               exist six or more years despite members dropping out or

               being arrested. These "elite" groups are selective

               about membership, and cite trust and talent as the two

               leading requirements for joining:

                    The group exists mainly for information
                    trading. If you trust everyone else in the
                    group, it is very profitable to pool
                    information on systems . . . also it is nice
                    to know someone that you can call if you need
                    help on operating system X and to have people




                                                                    72

                    feel free to call you if they need help on
                    operating system Y (AN, message log, 1988).

                    Trust is a very important part of a group. I
                    think that's blatantly obvious. You have to
                    be able to trust the other members of the
                    group with the information you are providing
                    in order to be productive, and have a secure
                    situation (UU, message log, 1988).

                    . . . all groups serve the same purpose: to
                    make their members feel better about
                    themselves (like, wow, I'm in a group) and to
                    trade things, whether it's wares, codes, or
                    whatever. But the thing is that being in a
                    group is like saying "I trust you, so like,
                    what can we do together?" (NN, message log,
                    1988)

                    Indeed, hacker groups are formed primarily for the

               purpose of information exchange.  To this end, groups

               attempt to recruit members with a wide variety of

               "specializations" in order to have a better support

               network to turn to:

                    %Our group% has always been very selective
                    about members (took me six years to get in).
                    The only reason the group exists is to bring
                    together a diverse group of talents. There is
                    very little overlap in %the group% these
                    days.  Everyone has one thing that they are
                    the best in the country at, and are
                    conversant with just about any other form of
                    hacking.  As an example, I got into a Primos
                    computer this morning around 9 am. Once I got
                    in, I know enough about Primos to get around,
                    but that's it. So I call %PS% in New York,
                    give him the info, and when I get home
                    tonight, he has gotten in and decrypted the
                    entire username/password file and uploaded it
                    to me.  But two weeks ago he got into a VAX.
                    He got the account to me, I called it up and
                    set up three backdoors into the system that
                    we can get in if the account is detected or
                    deleted.  Simple matter of communism.  From
                    each according to his ability . . . etc. Also




                                                                    73

                    it helps that everyone in the group is
                    experienced enough that they don't fuck up
                    accounts you spend all day getting (TM, field
                    notes, 1989).

                    Consistent with the Best and Luckenbill ideal

               type, hacker groups do not exhibit a set division of

               authority or labor. Most groups are leaderless, and

               every member is free to pursue their own interests,

               involving other members of the group only when desired:

                    We just got our group together.  We've got a
                    guy that does VMB's and a Sprinter %obtains
                    "codez" from U.S. Sprint% and a couple of
                    hackers.  Everybody's free to pursue whatever
                    system they want but if they want or need
                    some help they can call on any of the other
                    members if they want to. Like if one guy is
                    scanning and finds a VAX he might call and
                    give me the dialup.  Then I might have to
                    call our Sprinter to get some codez so I can
                    start hacking on it.  Once I get through I'll
                    give the account to the other members.  But
                    if I found it myself I wouldn't have to give
                    it out but I probably would anyway 'cuz
                    keeping it would be bullshit (DC, field
                    notes, 1988).

                    There isn't a leader really.  The guy who
                    starts the group sort of acts like a contact
                    point but everyone else has everyones' phone
                    number and you can call whoever you want to
                    anytime.  Usually when you're putting a group
                    together you just get everyone you want and
                    you all decide on a name. (DC, field notes,
                    1988).



               Summary

                    By virtue of the extensive social network found in

               the CU, some participants form work groups.  The

               sophistication of these groups varies, but in all cases




                                                                    74

               it is evident that the groups exist to support what are

               primarily individually performed activities.  The

               groups exhibit many of the ideal-type characteristics

               of peer associations, and it is clear that in some

               cases the computer underground is socially organized as

               peers.






                                                                    75





                                     Conclusion

                    Phreakers, hackers, and pirates do not act as

               loners.  Loners do not associate with others, and are

               on their own in coping with the practical problems

               presented by their activities (Best and Luckenbill

               1982, p.28).  From the data presented here, it is

               evident that the computer underground has established

               an extensive social network for the exchange of

               resources and mutual support.  The characteristics of

               the CU varies according to the goals of the

               participants, but the presence of mutual association is

               consistent. Contact between individuals is limited,

               with the acts of phreaking or hacking being committed

               alone.  Computer underground participants do associate

               with one another in order to discuss matters of common

               interest, such as performance techniques, news, and

               problem solving.  To facilitate this informational

               exchange, they have established a technologically

               sophisticated network that utilizes computer bulletin

               boards, voice mail boxes, telephone bridges, and

               telephone loops.

                    The collegial organization of the computer

               underground is further evidenced by the establishment

               of a CU culture. The subcultural adaptation of




                                                                    76

               language, expectations of normative conduct, and status

               stratification based on mastery of cultural knowledge

               and skill, all indicate that the computer underground

               is, at the very least, a social organization of

               colleagues (see Best and Luckenbill, 1982, p.37).

                    The very structure that permits mutual association

               among CU participants also encourages some to form

               working relationships, thus acting as peers by mutually

               participating in CU activities. Peers organized in this

               manner share in their deviance, organizing informally

               with little division of labor or set division of

               authority (Best and Luckenbill, 1982, p.45).  These

               peer associations provide support to members, and can

               provide socialization and recruitment functions for

               newcomers. The establishment of work groups, through

               mutual participation, indicates that though the

               computer underground is largely organized as a network

               of colleagues, it is also, to some degree, a social

               organization of peers.

                    Best and Luckenbill (1982) describe two additional

               forms of deviant associations that are more

               organizationally sophisticated than peers: "mobs" and

               "formal organizations." The computer underground,

               however, does not display the requisite characteristics

               of these organizational types.  The primary




                                                                    77

               characteristic of "mobs" is an elaborate division of

               labor (Best and Luckenbill, 1982, p.25).  While some CU

               groups do exhibit a rudimentary division of labor based

               on individual members' specialization, it is not by any

               means "elaborate."  Any division of labor that does

               exist is voluntary and arises on the basis of

               specialized knowledge, not a specialized organizational

               role.

                    In much the same manner the lack of a designated

               leader or leadership hierarchy prevents CU groups from

               being categorized as "formal organizations" in the Best

               and Luckenbill typology.  Deviant organizations at this

               level are quite sophisticated and there is no empirical

               evidence that the computer underground is organized in

               this manner.

                    This study of the computer underground has been a

               test of the Best and Luckenbill typology of the social

               organization of deviants.  As a test of their

               organizational indicators, the CU has shown that the

               categories are well constructed, with the possible

               exception of limiting "mutual participation" to acts

               carried out in the presence of others.  However, if we

               modify this to include non-simultaneous, but

               cooperative, acts as found in phreak/hacker groups, the

               category is otherwise robust.  The flexibility of the




                                                                    78

               typology, which explicitly recognizes that not all

               deviant associations will display all of the character-

               istics (Best and Luckenbill, 1982, p.25), is a strength

               that allowed it to be easily used in terms of the

               computer underground.

                    By addressing the CU from a social organizational

               viewpoint we have seen that despite the high technology

               trappings of their craft, pirates, phreakers, and

               hackers display organizational characteristics found in

               other groups that have been criminalized.  This may

               suggest that the development of sophisticated tools to

               commit "crime" does not necessarily affect the ways in

               which individuals organize their activities.

                    The implications of peer and collegial

               organization for the members of the computer

               underground are vast.  The level of sophistication has

               a direct relationship to the types of resources on

               which individuals can draw (Best and Luckenbill, 1982,

               p.54).  Because CU members are mutually associated,

               they are able to turn to colleagues for advice and

               support with various problems.  However, at the

               collegial level they are left to enact the solutions

               independently.  Whether or not they are successful in

               doing so will determine if they choose to remain active

               in the computer underground.  The data show that




                                                                    79

               involvement in the CU is short in duration, unless

               success in early phreak/hack attempts is obtained.  As

               long as the CU remains organized as a collection of

               colleagues, this trend will continue.  Additionally, as

               the computer and telephone industries become more

               sophisticated in preventing the unauthorized use of

               their facilities, new phreak/hackers are unlikely to

               succeed in their initial attempts at the act, thus

               dropping away from the activity and never becoming

               acculturated to the point where peer relationships can

               be developed.

                    At the peer level, a dimension of sophistication

               that some members of the CU do display, the knowledge

               and resources to solve problems and obtain resources is

               greater.  However, even at this level the ties between

               peers remain weak at best.  Although their cooperative

               ties allow for more sophisticated operations, and

               somewhat reduce the CU's vulnerability to social

               control agents (Best and Luckenbill, 1982, p.53), it

               still does not completely eliminate the need for

               individual success in order to sustain a CU career.  As

               long as the CU remains at the current level of

               organizational sophistication, with weak ties and

               somewhat limited means of support and resource

               attainment, it will continue to be a transitory and




                                                                    80

               limited "criminal" enterprise.

                    This realization should be considered by policy

               makers who desire to further criminalize computer

               underground activities. Given the current organization

               of the CU, the future social costs of their actions are

               not likely to expand beyond the current level.  There

               is no evidence to support assertions that the CU is

               expanding, and the insight provided here shows that it

               is not likely to do so on a large scale.

                    For sociologists, the computer underground is a

               field rich for insight into several areas of concern.

               Future research into the career path of CU members, and

               the relationships between individuals, could prove

               helpful to those interested in applying theories of

               differential association and career deviance.

               Additionally, the computer underground provides a

               unique opportunity to study the process of

               criminalization, and its effect on those who are

               engaged in the behavior.














                                     REFERENCES

               Best, Joel and David F. Luckenbill. 1982. Organizing
               Deviance. Englewood Cliff, New Jersey: Prentice-Hall.

               Bequai, August. 1987. Technocrimes. Lexington,
               Mass.:Lexington Books.

               Bickford, Robert. 1988. Personal communication to
               Gordon Meyer.

               Chicago Tribune. 1989. "Computer hacker, 18, gets
               prison for fraud."  Feb. 15:2,1.

               Field Notes. Interviews with phreakers, hackers, and
               pirates. Conducted from 7/88 to 4/89 (confidential
               material in authors files).

               Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The
               Process of  Criminalization: The Case of Computer Crime
               Laws." Criminology 26:101-126.

               Levy, Steven. 1984. Hackers: Heroes of the Computer
               Revolution. New York: Dell Publishing.

               Message Logs from a variety of computer underground
               bulletin board systems, (confidential material), 1988-
               1989.

               NBC-TV. 1988. Hour Magazine. November 23, 1988.

               Parker, Donn B. 1983. Fighting Computer Crime. New
               York: Charles Scribner's Sons.

               Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box."
               Esquire October, pp. 116-125.

               Small, David. 1988. Personal communication to Gordon
               Meyer.

               WGN-Radio. 1988. Ed Schwartz Show. September 27, 1988.







                                                                    82






                                     APPENDIX A
                           COMPUTER UNDERGROUND PSEUDONYMS

              _________________________________________________________
              |Literature, films,|Computers &        |Nouns, titles &  |
              |and Entertainment |related technology |Descriptive names|
              ---------------------------------------------------------
              | Pink Floyd       | Mrs. Teletype     | The Professor   |
              | Hatchet Molly    | Baudy Bastard     | Perfect Asshole |
              | Jedi Knight      | Doctor Phreak     | The Messiah     |
              | King Richard     | Lord FAX          | Right Wing Fool |
              | Captain Hoga     | CNA Office        | Bed Bug         |
              | Al Crowley       | Sir Mac           | Sleepy Head     |
              | Doc Holiday      | Busy Signal       | Mean  Underwear |
              | Mr. Big Dog      | Silicon Student   | Cockroach       |
              | Robin Williams   | Fiber Cables      | Primo Bomber    |
              | Big Bird         | Phone Crasher     | The Prisoner    |
              | Cross-eyed Mary  | Doc Cryptic       | Night Lighting  |
              | Capt. America    | Apple Maniac      | No Regrets      |
              | Uncle Sam        | Fuzzy Sector      | Grounded Zero   |
              | Thumpr           | Cntrl. Alt. Del.  | Spit Wad        |
              | Little John      | Byte Ripper       | Shadow Dove     |
              ----------------------------------------------------------






                                                                    83





                                     APPENDIX B
                    NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS


                    Welcome to Analog Electronics Datum System.
               Please take this time to fill out a one-time
               questionnaire that will allow us to determine your
               level of access on Analog Electronics Datum System.

                    If any question is too difficult for you to
               answer, just answer with your best guess or a simple "I
               don't know."

                    We basically have two different divisions or types
               of users on this system:

                       (1) Apple (%%,Mac), and IBM software traders
                       (2) Telecommunication hobbyists - any/all
                           computers (networks, mainframes,
                           engineering)

                    Your answers will help us decide which category
               you belong to and what access you should get on our
               system.

               * What type of computer & modem are you using to call
               this system?

               * Where did you get the phone number to Analog
               Electronics Datum System?

               * We'll need your first name and real phone # where you
               can be reached for validation purposes only, this
               information is kept in a password encoded file, on
               another computer (critical for higher validation):

               First for the FILE TRANSFER AREA ACCESS questions:

               (1) How many bits are in a nibble? (Assume 6502 micro
                   processor)

               (2) Define WORM, RAM, ROM, VDT, CRT, BPS? (Pick any 3)

               (3) What does 2400 baud mean in terms of bit transfer
                   speed?





                                                                    84

               (4) What is PT,MT,AE,BIN2,Ymodem Batch,BLU? (Pick any
                   4)

               (5) How many Megahertz does a standard Apple %%+ run
                   at? (rounding OK)


               Now for the TeleCommunication Questions:

               (1) Describe the Voice Transmission Use of a Loop:

               (2) If I gave you my phone #, how would you find my
                   name and address?!

               (3) Can you name any networking software operating
                   systems or protocols?

               (4) What is the highest frequency a twisted two wire
                   pair can transmit at?

               (5) We believe Phones and Computers Belong Together,
                   what do you BELIEVE?


               Ok, thanks for that info.


                  A MESSAGE FROM AL CAPONE (LOCAL) AND THE TRADER (LD)
                                      SYSTEM VALIDATORS

               -----------------------------------------------------


                    Welcome  to  ALDS!  As a new  user you have  made
               a  change  for the better in choosing this system as
               one of your places of telecommunication exchange.   In
               my  opinion, this  is one, if  not  the  best, system
               in telecommunications today as most of the good  boards
               such as Shadowspawn, Metal  Shop  Private, etc. do not
               exist anymore.  Quality users exist on this system that
               have established a reputation for themselves so
               questions you ask will be answered thoroughly and
               precisely.  We are a sponsor board of the  LOD/H
               Technical  Journal,  and  accounts  have  been
               established representing  Phrack,  Inc.  and 2600
               Magazine.  (For our software trading people, we also
               have an excellent file transfer area . . . consistent
               with the rest of the nation . . . )

                    Due to the high quality of our system, we will




                                                                    85

               need some additional information about you.
               Maintenance  of a high  quality system requires high
               quality users, so the first step in  this  process is
               keeping the low quality users off of the system . . .
               so please cooperate with us . . . this is for your
               benefit as well as ours.   The information you give us
               will be cross referenced with other systems for
               accuracy, and if you leave false information, you may
               suffer low access or deletion.

                    All phone number information is stored outside of
               the housing of this system inside of an encrypted,
               password locked file for your security. So if you have
               left an invalid phone #, please leave one where you can
               be reached, or someone's name and number (if possible)
               that will vouch for you.  Keep in mind this validation
               can take up to 1 week to complete due to the high
               volume of new callers to our system.

               Note: Limited system access will be granted within 24
               Hrs if all of your  info seems correct.


               Thanks in advance . . .            Bugsy Malone
                                                  The Swapper
                                               SYSOP/SYSTEM VALIDATORS


               % Bugsy Malone needs the following info: %

               (1) Your references (sysops, other users on this
                   system, other BBS).
               (2) Your interests in having access to our system.
               (3) How do you feel you can contribute to our system?
               (4) How many years of telecommunication experience do
                   you have?
               (5) Do you have any special talents in programming, or
                   operating systems?
                   If yes, then name the language(s) or operating
                   system(s).



               Enter message now, answering these questions:



               %after entering the message the BBS hangs up and the
               caller will  call back in 24 hours to see if access has
               been granted.%