mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
168 lines
9.5 KiB
Text
168 lines
9.5 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Two, Issue 22, File 7 of 12
|
||
|
|
||
|
[][][][][][][][][][][][][][][][][][][][][][][][][][][][]
|
||
|
[] []
|
||
|
[] Computer Hackers Follow A Guttman-Like Progression []
|
||
|
[] []
|
||
|
[] by Richard C. Hollinger []
|
||
|
[] University Of Florida []
|
||
|
[] []
|
||
|
[] April, 1988 []
|
||
|
[] []
|
||
|
[][][][][][][][][][][][][][][][][][][][][][][][][][][][]
|
||
|
|
||
|
Little is known about computer "hackers," those who invade the privacy of
|
||
|
somone else's computer. This pretest gives us reason to believe that their
|
||
|
illegal activities follow a Guttman-like involvement in deviance.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Computer crime has gained increasing attention, from news media to the
|
||
|
legislature. The nation's first computer crime statute passed unanimously in
|
||
|
the Florida Legislature during 1978 in response to a widely publicized incident
|
||
|
at the Flagler Dog Track near Miami where employees used a computer to print
|
||
|
bogus winning trifecta tickets (Miami Herald, 1977a and 1977b; Underwood,
|
||
|
1979). Forty-seven states and the federal government have enacted some
|
||
|
criminal statue prohibiting unauthorized computer access, both malicious and
|
||
|
non-malicious (BloomBecker, 1986; Scott, 1984; U.S. Public Law 98-4733, 1984;
|
||
|
U.S. Public Law 99-474, 1986). Although some computer deviance might already
|
||
|
have been illegal under fraud or other statutes, such rapid criminalization of
|
||
|
this form of deviant behavior is itself an interesting social phenomenon.
|
||
|
|
||
|
Parker documented thousands of computer-related incidents (1976; 1979; 1980a;
|
||
|
1980b; and 1983), arguing that most documented cases of computer abuse were
|
||
|
discovered by accident. He believed that these incidents represent the tip of
|
||
|
the iceberg. Others counter that many of these so-called computer crimes are
|
||
|
apocryphal or not uniquely perpetrated by computer (Taber, 1980; Time, 1986).
|
||
|
|
||
|
Parker's work (1976; 1983) suggests that computer offenders are typically males
|
||
|
in the mid-twenties and thirties, acting illegally in their jobs, but others
|
||
|
may be high school and college students (New York Times, 1984b; see related
|
||
|
points in Hafner, 1983; Shea, 1984; New York Times, 1984a).
|
||
|
|
||
|
Levy (1984) and Landreth (1985) both note that some computer aficionados have
|
||
|
developed a "hacker ethic" allowing harmless computer exploration, including
|
||
|
free access to files belonging to other users, bypassing passwords and security
|
||
|
systems, outwitting bureaucrats preventing access, and opposing private
|
||
|
software and copy protection schemes.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
This research on computer hackers is based on a small number of semi-structured
|
||
|
two-hour interviews covering many topics, including ties to other users,
|
||
|
computer ethics, knowledge of computer crime statutes, and self-reports of
|
||
|
using computers in an illegal fashion.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Such acts include these ten:
|
||
|
1. Acquiring another user's password.
|
||
|
2. Unauthorized use of someone else's computer account.
|
||
|
3. Unauthorized "browsing" among other user's computer files.
|
||
|
4. Unauthorized "copying" of another user's computer files.
|
||
|
5. Unauthorized file modification.
|
||
|
6. Deliberate sabotage of another user's programs.
|
||
|
7. Deliberately "crashing" a computer system.
|
||
|
8. Deliberate damage or theft of computer hardware.
|
||
|
9. Making an unauthorized or "pirated" copy of proprietary computer software
|
||
|
for another user.
|
||
|
10. Receiving an unauthorized or "pirated" copy of proprietary computer
|
||
|
software from another user.
|
||
|
|
||
|
In 1985, a group of five students took unauthorized control of the account
|
||
|
management system on one of the University of Florida's Digital VAX computers.
|
||
|
They were able to allocate new accounts to each other and their friends. In
|
||
|
addition, they browsed through other users' accounts, files and programs, and
|
||
|
most importantly, they modified or damaged a couple of files and programs on
|
||
|
the system. All first-time offenders, three of the five performed "community
|
||
|
service" in consenting to being interviewed for this paper. Eight additional
|
||
|
interviews were conducted with students selected randomly from an computer
|
||
|
science "assembler" (advanced machine language) class. These students are
|
||
|
required to have a working knowledge of both mainframe systems and micro
|
||
|
computers, in addition to literacy in at least two other computer languages.
|
||
|
|
||
|
The State Attorney's decision not to prosecute these non-malicious offenders
|
||
|
under Florida's Computer Crime Act (Chapter 815) may reflect a more general
|
||
|
trend. From research on the use (actually non-use) of computer crime statutes
|
||
|
nationally, both BloomBecker (1986) and Pfuhl (1987) report that given the lack
|
||
|
of a previous criminal record and the generally "prankish" nature of the vast
|
||
|
majority of these "crimes," very few offenders are being prosecuted with these
|
||
|
new laws.
|
||
|
|
||
|
The three known offenders differed little from four of the eight computer
|
||
|
science students in their level of self-reported computer deviance. The
|
||
|
interviews suggest that computer deviance follows a Guttman-like progression of
|
||
|
involvement. Four of the eight computer science respondents (including all
|
||
|
three females) reported no significant deviant activity using the computer.
|
||
|
They indicated no unauthorized browsing or file modification and only isolated
|
||
|
trading of "pirated" proprietary software. When asked, none of these
|
||
|
respondents considered themselves "hackers." However, two of the eight
|
||
|
computer science students admitted to being very active in unauthorized use.
|
||
|
|
||
|
Respondents who admitted to violations seem to fit into three categories.
|
||
|
PIRATES reported mainly copyright infringements, such as giving or receiving
|
||
|
illegally copied versions of popular software programs. In fact, pirating
|
||
|
software was the most common form of computer deviance discovered, with
|
||
|
slightly over half of the respondents indicating some level of involvement. In
|
||
|
addition to software piracy, BROWSERS gained occasional unauthorized access to
|
||
|
another user's university computer account and browsed the private files of
|
||
|
others. However, they did not damage or copy these files. CRACKERS were most
|
||
|
serious abusers. These five individuals admitted many separate instances of
|
||
|
the other two types of computer deviance, but went beyond that. They reported
|
||
|
copying, modifying, and sabotaging other user's computer files and programs.
|
||
|
These respondents also reported "crashing" entire computer systems or trying to
|
||
|
do so.
|
||
|
|
||
|
Whether for normative or technical reaspons, at least in this small sample,
|
||
|
involvement in computer crime seems to follow a Guttman-like progression.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
REFERENCES
|
||
|
|
||
|
BloomBecker, Jay. 1986. Computer Crime Law Reporter: 1986 Update. Los
|
||
|
Angeles: National Center for Computer Crime Data.
|
||
|
Florida, State of. 1978. Florida Computer Crimes Act Chapter 815.01-815.08.
|
||
|
Hafner, Katherine. 1983. "UCLA student penetrates DOD Network," InfoWorld
|
||
|
5(47): 28.
|
||
|
Landreth, Bill. 1985. Out of the Inner Circle: A Hacker's Guide to Computer
|
||
|
Security. Bellevue, Washington: Microsoft Press.
|
||
|
Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. New York:
|
||
|
Doubleday.
|
||
|
Miami Herald. 1977a-. "Dog players bilked via computer," (September
|
||
|
20):1,16.
|
||
|
--1977b "Why Flagler Dog Track was easy pickings," (September 21): 1,17.
|
||
|
Newsweek. 1983a. "Beware: Hackers at play," (September 5): 42-46,48.
|
||
|
--1983b. "Preventing 'WarGames'," (September 5): 48.
|
||
|
New York Times. 1984a. "Low Tech" (January 5): 26.
|
||
|
--1984b. "Two who raided computers pleading guilty," (March 17): 6.
|
||
|
Parker, Donn B. 1976. Crime By Computer. New York: Charles Scribner's Sons.
|
||
|
--1979. Computer Crime: Criminal Justice Resource Manual. Washington, D.C.:
|
||
|
U.S. Government Printing Office.
|
||
|
--1980a. "Computer abuse research update," Computer/Law Journal 2: 329-52.
|
||
|
--1980b. "Computer-related white collar crime," In Gilbert Geis and Ezra
|
||
|
Stotland (eds.), White Collar Crime: Theory and Research. Beverly Hills,
|
||
|
CA.: Sage, pp. 199-220.
|
||
|
--1983. Fighting Computer Crime. New York: Charles Scribner's Sons.
|
||
|
Pful, Erdwin H. 1987. "Computer abuse: problems of instrumental control.
|
||
|
Deviant Behavior 8: 113-130.
|
||
|
Scott, Michael D. 1984. Computer Law. New York: John Wiley and Sons.
|
||
|
Shea, Tom. 1984. "The FBI goes after hackers," Infoworld 6 (13):
|
||
|
38,39,41,43,44.
|
||
|
Taber, John K. 1980. "A survey of computer crime studies," Computer/Law
|
||
|
Journal 2: 275-327.
|
||
|
Time. 1983a. "Playing games," (August 22): 14.
|
||
|
--1983b. "The 414 gang strikes again," (August 29): 75.
|
||
|
--1986. "Surveying the data diddlers," (February 17): 95.
|
||
|
Underwood, John. 1979. "Win, place... and sting," Sports Illustrated 51
|
||
|
(July 23): 54-81+.
|
||
|
U.S. Public Law 98-473. 1984. Counterfeit Access Device and Computer Fraud
|
||
|
and Abuse Act of 1984. Amendment to Chapter 47 of Title 18 of the United
|
||
|
States Code, (October 12).
|
||
|
U.S. Public Law 99-474. 1986. Computer Fraud and Abuse Act of 1986.
|
||
|
Amendment to Chapter 47 of Title 18 of the United States Code, (October
|
||
|
16).
|
||
|
_______________________________________________________________________________
|