[alt.society.cu-digest] Cu Digest, #2.18

TK0JUT2%NIU.BITNET@UICVM.uic.edu (12/28/90)

  ****************************************************************************
                  >C O M P U T E R   U N D E R G R O U N D<
                                >D I G E S T<
              ***  Volume 2, Issue #2.18 (December 28, 1990)   **
  ****************************************************************************

MODERATORS:   Jim Thomas / Gordon Meyer  (TK0JUT2@NIU.bitnet)
ARCHIVISTS:   Bob Krause / Alex Smith
PERIPATETIC GADFLY:  Brendan Kehoe

USENET readers can currently receive CuD as alt.society.cu-digest.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may be reprinted as long as the source is
cited.  Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission.
It is assumed that non-personal mail to the moderators may be reprinted
unless otherwise specified. Readers are encouraged to submit reasoned
articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
            views of the moderators. Contributors assume all responsibility
            for assuring that articles submitted do not violate copyright
            protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Computers Under Attack
File 4: CU Resources in Germany
File 5: Trade Secrets; When are they Bad?

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
***  CuD #2.18: File 1 of 5: Moderator's corner                  ***
********************************************************************

From: Moderators
Subject: Moderators' Corner
Date: December 28, 1990

++++++++++
In this file:
1. FTP FILES
2. RESOURCES OF CU INTEREST
++++++++++

+++++++++++++++++++++
FTP Files
+++++++++++++++++++++

The FTP archives are steadily growing. They include Network Information
Access (NIA), a few new CU magazines, and a variety of computer crime
statutes (state, federal, foreign), and a few new papers written by law
students and attorneys. Thanks to all those who send material along. If you
submit a long paper (20 pages or more), please be sure the format is
complete (biblio and footnotes not excluded if cited in the text) and line
length is not over 80 characters per line. Papers should be of publishable
quality and not simply stream-of-consciousness opinion. If you're not sure
if your paper is appropriate, send it along anyway. Papers should be timely
or of historical/archival value, and not something you happened across on a
BBS somewhere that is dated.

--------------------
Resources Worth Looking At
--------------------

There are a number of first-rate resources available on the nets for
computerists of all stripes. Among those of particular value include:

1. TAP MAGAZINE: TAP contains a variety of information and can be obtained
for only a postage stamp for each issue from:
TAP
PO Box 20264
Louisville, KY  40250

2. 2600 Magazine: 2600 covers a broad range of topics, ranging from
technical material to political analysis. It is published quarterly in
hardcopy format. It also holds periodic meetings and is an excellent
resource for information of relevance to a variety of interests.  2600
Magazine can be reached at:

      2600@well.sf.ca.us     OR
      2600 EDITORIAL DEPARTMENT
      P.O. BOX 99,
      MIDDLE ISLAND, NY 11953

3. EFF DIGEST: The Electronic Frontier Foundation's first issue of EFF
Digest is out, and it is essential reading for those keeping up with the
the specifics of EFF activity as well as for following legal cases and
other issues affecting the computer world. The first issue provides a
detailed summary of the EFF goals and activities to date.
E-mail subscription requests:  effnews-request@eff.org
Editorial submissions: effnews@eff.org
Or:
Electronic Frontier Foundation
155 Second St.
Cambridge, MA 02141
(617) 864-0665
(617) 864-0866 (fax)

4. BMUG (Berkeley Macintosh Users' Group) Magazine:  Don't be deceived by
the name. BMUG contains a variety of articles relevant to all computerists
and is well worth reading.  The Fall/Winter 1990 issue of the BMUG
newsletter will be available as of February, 1991. Cost is $25 (comes with
6 month BMUG membership). To subscribe, call BMUG at (415) 549-BMUG.

5. PHRACK CLASSIC: What can we say? Contact them at pc@well.sf.ca.us

6. TELECOM DIGEST: TCD, edited by Pat Townson, focuses primarily on telecom
issues of all kinds (technical, legal, rumor, facts, news articles). During
a period of hot topics, several issues can come out in a day. Pat chases
down rumors, keeps posts relevant, and has established TCD as the premier
e-mail source for telecom information. There is also an ftp site for back
issues. To subscribe, contact:
telecom@eecs.nwu.edu

7. NIA: Network Information Access, although fairly new, has published 68
issues to date.  The first issues were relative short, but, beginning with
#68, the issues will be longer and provide a variety of detailed technical
and other information.  For more information, drop a note to:
elisem@nuchcat.sccsi.com

8. NEWSBYTES:  The Newsbytes News Network is an electronic news service
dealing solely with technology issues. It is published daily on GEnie and
is available in a semi-weekly format on Dialog, America On-Line, NewsNet
and a Japanese newsnetwork. Excerpts are also downloaded for publication
by Newspapers throughout the country (such as Computer Currents). The
service is international and has bureaus from Moscow to Sydney, Australia.
For more information, contact: mcmullen@well.sf.ca.us; CompuServe -
70210,172; GEnie - nb.nyc; AppleLink -- x1888 and MCI - 316-9687 with any
comments or additions.

There are other good resources out there, and we will include them in
future issues. There are also a number of good BBSs with extensive
collections of text files or discussion sections (Ripco, The Well, The
Works, Face-to-Face), and we will list a few of them next month. If you
know of exceptional boards worth mentioning, pass the names and numbers
along.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Various
Subject: From the Mailbag
Date: December 28, 1990

********************************************************************
***  CuD #2.18: File 2 of 5: From the Mailbag                    ***
********************************************************************

From: Carrier Wave <MERCURY@LCC.EDU>
Subject: Operation Sun Devil and Ayn Rand
To: TK0JUT1%NIU.BITNET@UICVM.UIC.EDU
Date: Fri, 21 Dec 90 09:15 EST

                           Operation Sun Devil and
              Ayn Rand's Theory of "The Sanction of the Victim"
                 by Michael E. Marotta, mercury@well.sf.ca.us

Arthur Koestler's novel, Darkness at Noon, tells of the downfall of a
Bolshevik.  He is purged by the party, charged with conspiring to
assassinate Stalin.  Of course, he did no such thing, but he soon comes
to understand the needs of his captors.  As a Bolshevik, he knows the
theory of the centralized democracy and he comes to understand that
merely questioning authority is no different than a physical assault on
the Leader.  The operant theory in this true-to-life example was later
enunciated by Ayn Rand in her novel, Atlas Shrugged.  She called it
"The Sanction of the Victim."

In Atlas Shrugged, the heroes are engineers and investors who learn to
reject mysticism, altruism and collectivism.  They learn to be proud of
their own achievements.  They identify and reconcile the contradictions
that tore them apart and allowed them to be regulated, ruled, taxed and
vilified.  One of the highlights of this novel is the trial of Hank
Rearden, a steel industrialist who violated an equalization of opportunity
law.  He tells the court that it can sentence him to anything and he is
powerless to prevent that but he will not help them by participating.  He
does not recognize their right to try him and he will not help them pretend
that the trial is just.  He is acquitted.

If this seems too unreal, consider the case of Craig Neidorf in Chicago and
compare it to the trials of the Legion of Doom in Atlanta.  Neidorf stood
his ground, prepared a First Amendment defense and asked for help from the
pioneers on the electronic frontier.  The government dropped its charges.
In Atlanta, the hackers co-operated with the government, informed on each
other and even testified against Craig Neidorf and they were sentenced to
prison.  Neidorf incurred legal expenses near $250,000.  This is also about
the size of the fines to be paid by each of the LoD hackers in Atlanta.
The difference, of course, is that Neidorf is free and they are in jail.

The decision to go to trial rested on the premise that Right makes Might.
Niedorf prepared a First Amendment argument.  In point of fact, victory
hinged on the demolition of the government's evidence.  A suitable defense
could have been created from any perspective.  The First Amendment is a
broad shield that protects religion, speech and assembly in addition to
writing.  The Tenth Amendment guarantees all those necessary and proper
rights enjoyed by the people that are not specifically enumerated in the
Bill of Rights.  Niedorf could have claimed that he was performing a
challenge commanded of him by the Gods of Olympus.  What counted most is
that he felt that his accusers were morally wrong.

The Legion of Doom went down the drain in Atlanta because they granted the
moral high ground to the government.  They were wrong in their own eyes and
they deserved punishment by their own standards.  Their viewpoint and their
standards were the same as the government's.

The question then becomes: Is hacking right?  Unless you want to go to
jail, you better find a lot of reasons to believe that it is.

+++++++++++++++++++++++++

From: gnu@TOAD.COM
Subject: Re: "strangers probing for security flaws" -- another view
Date: Fri, 21 Dec 90 13:11:14 -0800

Given the existing state of computer security (i.e. it requires excessive
care by a system administrator to make a system more than nominally
secure), I think that whatever automation we can bring to bear on security
testing is welcome.

Suppose there was a free program, available in source code and scrutinized
by wizards all over the net, that you could run to test your security.  If
you had the time, you might run it and fix up the things it found.  If you
didn't have the time, those things would probably go unfixed.

If someone at a remote site (Italy?) volunteers to run such a program and
mail you the results as they pertain to your site, are they performing you
a service or a disservice?  I don't know about you, but when a stranger
knocks at my door to tell me that I left my garage door gaping wide open
and the neighborhood hoods are eyeing my bicycles, I usually thank her
rather than knocking her down and calling the police.  Then I go and fix
the garage door.

If the stranger had taken a few bicycles before coming and telling me about
the problem, that would be different.  But even that is preferable to their
stealing the bicycles and not even telling me I had a problem.

Sites all over the Internet *are* being probed by people who want to do
them harm.  We know this as a fact.  I would prefer if we had some
volunteer "cop on the beat"s who would walk by periodically and rattle the
door to make sure it's locked.

	John

++++++++++++++++++++++++++

From: snowgoose!@UUNET.UU.NET
Date: Mon, 17 Dec 90 16:16:00 -0500
Subject: Is Technology Beyond the Law?

                         Is Technology Beyond the Law?

There are many factors which shape events like Operation Sun Devil.
Certainly mission, political mandate, public perception, and human frailty
are forces which shaped the behavior of the Secret Service.  But, the
juxtaposition of technology and the law may well be the most significant
factor.

Law is (or at least, is supposed to be) a reflection of the needs of
society for definition of and protection of its interests.  Technology
presents rapidly changing circumstances with which the law, because the
people, cannot keep abreast.  Technology is, and will always be, beyond the
law?

Now, I'm not a lawyer, and I haven't got a clue of how to conceptualize
this under the law, but consider the following:

One day, the Secret Service shows up at my door with a search warrant to
seize and search my computer for incriminating evidence.  They get my
computer back to their lab and discover that the entire hard disk is
encrypted, (probably block by block).  Upon further examination, they find
either an encryption card or a software encryption routine in the disk
driver.  I'm not going to give them the key.  I have used a sufficiently
difficult encryption technique as to frustrate even the NSA.  Where does
that leave their investigation?  Where does that leave my computer?

Is there a concept in the law which requires that a law must be
enforceable?  If so, isn't investigation an enforcement procedure?  If so,
and if the law isn't enforceable, what happens to my computer with its
encrypted disk?

I have intentionally exaggerated the technical circumstances to raise the
question, but it seems to me that the same situation exists today.  The
Secret Service has had 40+ computers and 23,000?  disks since their seizure
on May 8th, 1990.  If we assume that the Secret Service has procedures
(methods and techniques) for using the seized property in their
investigation, then is there a time limit on how long the investigation
can continue?  If it could be demonstrated that there were *no* procedures
for using the seized property in furtherance of the investigation, would
they have a right to have seized it?

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

Date: Thu, 6 Dec 90 15:00:32 PST
From: Peter Denning <pjd@riacs.edu>
Subject: Computers Under Attack

********************************************************************
***  CuD #2.18: File 3 of 5: Computers Under Attack              ***
********************************************************************

COMPUTERS UNDER ATTACK
Intruders, Worms, and Viruses
Edited by Peter J. Denning
ACM Press and Addison-Wesley, 1990, 554pp
$18.50 ACM members, $20.50 others

On behalf of ACM Press and the authors of the 38 articles brought together
in this edition, I am proud to announce that our book on the subject of
attacks on computers is now available.

This subject continues to receive ongoing attention in the national press
--for example, the recent discovery of $12M of toll fraud at the NASA
Johnson Space Center, Operation Sun Devil, an Esquire article about
computer pirates breaking in to the Bell System, and the recent splashy
appearance of the NRC report, "Computers at Risk".

The purpose of this book is to tell the story of attacks on computers in
the words of those who are making the story and who see the broad
perspective in which it is taking place.  We have painstakingly selected
the articles and have provided connective material to bring out the global
context and show that the problem is not purely technology, not purely
people, but a product of the interaction between people and computers in a
growing worldwide network.

After and introduction and preface by me, the articles are arranged in six
parts.  Most of these have been previously published, but there are a few
new pieces specifically commissioned for this volume.

PART I: THE WORLDWIDE NETWORK OF COMPUTERS

Worldnet and ARPANET by Denning, overview of networks by Quarterman,
reflections by Thompson, survey of computer insecurities by Witten.

PART II: INTRUDERS

Reflections by Reid, Wily hacker story by Stoll, a followup commentary by
Mandel, and a business perspective by Wilkes.

PART III: WORMS

Internet worm overview by Denning, perspectives on the Morris worm by MIT's
Rochlis et al, Purdue's Spafford, and Utah's Seeley, executive summary of
Cornell Report, Morris indictment and trial summary by Montz, original worm
paper by Shoch and Hupp.

PART IV: VIRUSES

Virus overview by Denning, BRAIN and other virus operation by Highland,
virus primer by Spafford et al, viral protection in MS/DOS by Brothers, and
a perspective on viruses by Cohen.

PART V:  COUNTERCULTURES

Computer property rights by Stallman, cyberspace literature by Paul Saffo,
a dialog on hacking and security by Dorothy Denning and Frank Drake.

PART VI:  SOCIAL, LEGAL, AND ETHICAL IMPLICATIONS

A spectrum of commentaries: moral clarity and sending a signal by Denning,
global city by Morris, virus bills in congress by Crawford, GAO report
summary, legal issues by Samuelson and by Gemingani, computer emergency
response by Scherlis et al, ethics statements by various organizations, ACM
President's letters by Kocher, ACM forum letters, law and order for the PC
by Director, RISKS perspectives by Neumann, crimoids by Parker.

To order the book, run to your local bookstore or call ACM Press Order
Department.  For credit card orders only call    800-342-6626 or in
Maryland and outside the continental US call    301-528-4261 and for mail
orders ACM Order Department, P. O. Box 64145, Baltimore, MD 21264.  The
price for ACM members is $18.50 and for nonmembers $20.50.  Shipping is
extra unless you send a check to the order department.  BE SURE TO INCLUDE
YOUR ACM MEMBER NUMBER AND THE BOOK ORDER NUMBER (706900).

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: "Martin Huber" <martin@EE.UNI-SB.DE>
Subject: CU Resources in Germany
Date: Fri, 14 Dec 90 04:29:59 +0100

********************************************************************
***  CuD #2.18: File 4 of 5: CU Resources in Germany             ***
********************************************************************

{Moderators' note: We in the U.S. tend to be rather insular and often think
of the CU world as limited to the 48 contiguous states. We are constantly
reminded by cybernauts elsewhere that we should be more aggressive in
recognizing that cyberspace is non-territorial. There are numerous articles
and newsbits out there that we don't often see because of language
barriers. We *STRONGLY ENCOURAGE* readers fluent in other languages to
either send over translations or send summaries of various news stories.
In addition to their general interest, we are finding that scholars, law
students, and others find this information quite helpful. Thanks to Martin
for sending the following over.  When we spoke with him, he indicated that
there is considerable activity in Europe that we neglect here in the U.S.,
and he uses a comment in Pat Townson's Telecom Digest to segue into the
discussion}.

*******************

In article <15334@accuvax.nwu.edu> (of Telecom Digest the
moderator writes):
>
>Len Rose is beginning to prepare for his defense in Baltimore in
>February. He is looking for Unix experts/gurus who would be willing to
>provide general technical testimony about Unix.  If anybody is willing
>to consider it, or can provide the names of others who might be
>willing, call Len at: (708) 527-xxxx.
>
>
>Jim Thomas
>Computer Underground Digest
>
>
>[Moderator's Note: Poor Len. He's a great subject-candidate for the
>old negro spiritual song, "Nobody Knows the Trouble I've Seen".   PAT]

I'll side with PAT and Len (although i didn't notice what he did, but today
a seemingly funny hack can become a ghostly nightmare real fast).  Please
understand that i do not side my criminal activities, but IMHO mostly the
wrong people get caught. The real criminals nearly get away with it.

Me, i can't give him help (other than moral one). But there are some guys
here in Germany who should be able to help with real expertise on any kinds
of hacks (phone, modem, nets, UNIX boxes, other). They are called CCC
(Chaos Computer Club). Their head has been charged with breaking into some
kind of NATO network (can't remember details, ask them how it went out). I
think they won or got a vote of confidence and a slight punishment because
of having alerted security people about the possibility of the hack. Again,
to state my opinion:  They don't inquire into secrets in order to steal
something/rob some bank/whatever, but merely want to enwiden their
knowledge and try to pass information to others. (See below).  Oh sh..... .
Can't find any of their documents in my bureau. Let me try to squeeze my
brain:

       Organization: "Chaos Computer Club"
       Contact:      ??????? - they all have lots of nicknames
       City:         "DW-2000 Hamburg"
       Country:      "Germany"

Check like 1-3 year old infos on the famous NATO hack. Names should appear
there. I'll be searching back home and try to come up with more info ASAP.

Maybe a secondary contact in Hannover will help: This is a german computer
magazine called "c't". It is a full-fledged computer magazine for mostly
small computers and UNIX systems. The spectrum of articles ranges from
problems in information theory over product reviews, hard- und software
tests, source code listings in different languages to science-fiction
stories. They regularly feature editorials on hacking, law problems and
such and are at the approximate level of expertise as BYTE is in the US (in
fact, the magazines cooperate).  [Of course, professional level in germany
is in general not as high as in the US (the states are much larger and thus
have more experts), but in science Germany is competitive.] In their
January 1991 issue (no kidding, it appears in the mid of December!) they
published a report on a sociological study on computer freaks which was
carried out by a german university (Univ. of Trier).  In the following,
i'll give some quotations (transliterated to English):
[Note that this is done with no regard to copyright issues, i don't know
what position c't has regarding such matters, but i think it is perfectly
o.k. to translate something while crediting it to the original author. As
for publishing, you have my allowance to publish the english summary as
long as c't or the author is not affected by this move]

ARTICLE: "c't, Jan. 1990, p.44-46"
AUTHOR: "Claudia Schmidt" [Can't find her listed on the
  publisher staff, seems to be an invited article, i bet she is
  from the research group]
TITLE: Viele Vorurteile - Computerfreaks im Licht der Soziologie
[ premonitions abound - computer freaks seen from a sociologist's
 point of view ]

The article starts:
 "In a study sponsored by the Department of the Interior of the FRG
  a group of scientists from the University of Trier tried to find
  access to the world of computer freaks. The sociologists wanted
  to gain a fundamental platform for the assessment of computer
  technology und to unemotionalize the discussion on it.
     Wherever computing centers are, young alert people with rugged
  hair and deep-set eyes can be seen in front of computer consoles;
  their arms are bent und their hands seem to be waiting for hitting
  the buttons of their keyboards which they watch with the same inten-
  sity a gambler watches the rooling dices. Seemingly more relaxed
  they sit at desks loaded with computer listings and meditate like
  scientists over cabalistic treats ....
     This statement dating back to 1977 clearly demonstrates the
  premonitions which usually are ascribed to computer freaks[1].
  'Pseudo-empirical criticism on culture, mythos-conserving hearsay!'
  it is termed by the authors of a 300-page report of the University
  of Trier[2]. People are adopting fancy images [of freaks] all too
  eagerly: most of the statements suffer from a pseudo-scientific
  method of 'associative reasoning', the scientists claim ...
           The sociologists visited the Chaos Communication Congress 1989
  in Hamburg, ..., 'in order to get a lasting impression of the
  productivity aspects of computer social life' and tested personal
  attitudes of [computer] freaks in meetings with several [computer]
  clubs. After field work, 62 interviews of 1 - 2 hours duration
  complimented by 15 interviews gained from interviews on a BBS
  were to be evaluated.

  [A description of a typical freak's school and college time follows
   (boring classrooms for under-rated geniuses), including the treat-
   ment of the early attraction of a typical freak towards technology.
   An interesting bynote states that women tend to exclude the computer
   of their private live and they are said to 'be afraid to destroy
   something'.
      The next paragraph follows the growth of a juvenile freak to
   a competent and professional specialist: ]
      Evolution:
      ... [freaks], according to the scientists can be separated into
   the classes of 'hackers', 'players', 'programmers', 'crackers' and
   'crashers'.
      Freaks want to use all capabilities of their machines. A high
   degree of professionalism and competence, in general specialist's
   knowledge, gives the benefits of good standing, being recognized
   and admired among fellow professionals.
      The research group noticed that the rapid evolution of technology
   posed a problem. Social sciences always lag behind in assessment
   of new technologies and hust helplessly see a new wave of technology
   coming just as they finished evaluating it's predecessors.
      Lots of questions:
      The only solution to this problem is to tend towards dampening
   critical opinions: Of course the freak is working all alone ...
   in front of his computer, but - does he not communicate with
   fellow freaks over [computer] nets?
      A computer demands clear and concise commands, it cannot handle
   ambiguous statements found in everyday's speech. Under the assumption
   that a broad knowledge of speech is correlated with intellectual
   capabilities, a person who has to adopt his syntactical capability
   to abbreviations fitting a machine is in danger! ... the programming
   paradigm could influence life style towards thinking in rational
   terms only.
      Lone guys:
      On the other hand, there is a thesis that computerization is
   not the reason but the effect of a culture adoring reasoning, and
   that the computer is only fulfilling the wishes of men leaning
   towards a technical zivilisation. ...
      With the impact of lots of new media at home and at work, can
   we see an 'impersonalization of learning', will the real world
   be substituted by a made-up world, which is a secure place to flee
   to? ... Or is this world of synthetic images the expression of a
   desire to create new and singular scenarios, stimulating creativity
   and emotionality in the freaks? Is not today's world by a much
   higher degree plagued by rationalism and lack of emotions compared
   to the computerist's world?
      Summa summarum:
      For public discussion, the scientists drew the following
   conclusions: Since the computer is a well-known part of today's
   work, it is useful for several different specialisations. To the
   freak, it has become a natural part of his live and he spends a
   substantial amount of time and money on it.
      Only people with adequate knowledge can use a computer. A
   broad knowledge of information science is indispensable for a
   freak. His main method of learning is autodidactic. ... The
   'process of auto-professionalisation' is found across all
   social and professional levels.
      Those activities do not tend to neglect leisure-time acti-
   vities. Electronic media are very important, whereas books
   are not so important (with the exception of cs books). Data
   nets created a renaissance of the art of writing letters.
      Computer freaks are not biased towards technology. From
   their intimate knowledge of systems and their limitations,
   their [the freaks] opinions are well balanced and often two-
   sided. Dangers are seen mainly in big uncontrollable systems.
   Contours of the information age of tomorrow are seen as changing
   and not subject to forecast or planning in a deterministic way.
      Methods of learning und practical work show a high degree
   of personal autonomy. New forms of self-controlled and self-
   confident use of communication medias are evolving hand in hand
   with a culture which does not need federal regulations
   (e.g. in form of laws). [because they are self-regulating, i
   can't resist to make my point here]
      The authors close with a proposal to the ministry of the
   interior to inquire into the usefulness of computerclubs and
   groups of hackers as critics of media, similar to the
   function of ecologist's associations in environment.
     [ The article closes with the perfectly natural observation
   that the degree of weirdness and fanaticism does not vary
   between philanthropists, hobby astrologicians and computer
   freaks ]

[1] J. Weizenbaum, Die Macht der Computer und die Ohnmacht der Vernunft,
                            Frankfurt/a.M., 1977, p.160
   [The power of computers and the impotence of common sense]

[2] R. Eckert et al., Im Schatten der Computer-Mythen. Zur kulturellen
               Praxis und den Spezialkulturen von Hackern, Programmierern,
               Crackern und Spielern. Eine ethnografische Untersuchung, Trier,
   [In the twilight of computer myths. On the cultural praxis and the
    specialized cultures of hackers, programmers, crackers and players.
    An ethnografical study]

In the following some more citations from "c't", quoted from the
indices:
- c't,October 1990,Rechtliche Rahmenbedingungen fuer die Mailbox
                      [ Juristical Framework for BBS ]

- c't,February 1990,Es geht um Milliarden - Niederlage der Post in einem
                   Modem-Prozess
         [ billions on stake - telco looses lawsuit concerning modems ]

- c't,May 1989,Hackordnung - Wann wird das Strafrecht fuer Datenreisende
                   zur Falle?
    [ hacker's laws - when do hackers get trapped in penal law? ]
    * This is written by a lawyer and treates the relationship       *
    * between german penal law and hacker's activities. - excellent. *

- c't,July 1988,Latente Bedrohung - Ueber die Verletzlichkeit der
               Informationsgesellschaft
 [ sleeping danger - about the vulnerability of information culture ]
 * This is an interview with Prof. Dr. Klaus Brunnstein, Univ. of
 * Hamburg, Inst. for applied computer science. He is specialising
 * in the field of computer crimes and the security of computer systems
 * Maybe a candidate for expert opinion?

The publishing company is:
  "Verlag Heinz Heise GmbH"
  "Postfach 610407"
  "DW-3000 Hannover 61"
  Tel. ++49/511/54747-10 (PBX with direct)
  Fax  ++49/511/54747-33 (call extensions)
The editor is:
  "Christian Persson"  extension -10
The vice editors are:
  "Andreas Burgwitz"   extension -12
  "Detlef Grell", MSEE extension -13
They are reachable on "CosmoNet":
  T. ++49/511/555398  300 Baud [ In fact, i think it is *their* BBS
  T. ++49/511/555392  300 Baud   ask PAT or other netlanders for
  T. ++49/511/555686 1200 Baud   more info. CosmoNet is well used in
  T. ++49/511/555630 1200 Baud   Germany, maybe even Europe ]
  T. ++49/511/555302 2400 Baud
  Datex-P NUA: 45511090835     [ This is the german packet switching
                                 network. I have no idea of how to
access it from overseas, but a friend of mine working in CA, USA
should know it. If you need an european mail feed for this, i have
access (in principle) to internet, bitnet, uucp and thus should be
able to reach every german host. However, the transition from
{internet,bitnet,uucp} to e.g. CosmoNet is newland for me. ]

I'll stop here. I have all of the cited articles in my bookshelf.
I have a FAX and a copier around. So if Len wants to have some, he
should phone / FAX / mail me. Of course, translations are better to
be done by somebody which is a native english speaker. I can help
with nasty german sentences, no problem (with lightspeed communication?
- never!). Anyway, i'll help what i can, sticking to the old prin-
ciple: in dubio pro reo.
--
                              /---------------------------------
Martin                        /      Martin Huber               :
:----------------------------/       Univ. of Saarland          :
:email: mahu@ee.uni-sb.de            Dept. of Electr. Eng.      :
:Tel: ++49/681/302-3574              D-66 Saarbruecken 11       :
:FAX: ++49/681/302-2678              Germany                    :

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Dark Adept (Ripco-312-528-5020)
Subject: Trade Secrets; When are they Bad?
Date: Sat, 1 Dec 90 1:38:06 CST

********************************************************************
***  CuD #2.18: File 5 of 5: Trade Secrets: When are they Bad?   ***
********************************************************************

                    Trade Secrets:  When are they bad?

                                    by

                              The Dark Adept


A trade secret is a method or procedure or information used by a company to
obtain profit.  The law protects trade secrets through copyrighting and
patenting and various other laws.  The main reason a company protects this
type of information is to stop competitors from producing the same product
thereby taking away from its profits.  The main reason the government
protects the rights of the company to protect this information is to
promote innovation and progress (at least according to the U.S.
Constitution).  But, there are times when copyrighting and patenting reduce
profits and restrict progress and innovation.


The User Interface
==================

One of the most important aspects of a computer program is the user
interface (the way in which the user is allowed to interact with the
computer).  Ideally, a program should be able to perform complex tasks and
remain user-friendly.  However, the user interface does not affect the way
in which the program completes its task.  Two different programs with the
same user interface can perform the same task in two different ways.  One
might be better or faster at the task than the other.  Conversely, two
programs that perform different tasks may have the same user interface.
The point is that the user interface is generic.  It can be applied to many
different programs without changing the value of the program.  It merely
enhances or detracts from the program.

In the same way, the user interface of any product does not change the
integral operation of the product.  Take the automobile, for example.
In all automobiles the user interface is the same.  There is a wheel you
turn for direction.  There are pedals on the floor to control speed, etc.
The quality of the automobiles are not judged for value by the user
interface, but by how the automobile responds to input from the user.
How fast it goes, how durable it is, etc., these are the qualities by how
an automobile is selected for purchase, and not by the fact that it has
a steering wheel.  One may take this analogy further by comparing automatic
transmissions against stick-shifts.  Neither changes the performance of the
car in a radical way.  A purchaser selects automatic or manual as a matter
of either aesthetic preference or familiarity.  If the buyer prefers stick
over automatic, but the car with the stick is way behind the automatic
in terms of performance, he would generally choose the automatic since he
is buying the car to perform a task.  The way the car performs the task
is more important than how he tells the car to perform the task as long as
both are equally intelligible to the car.

Can you see the point I am trying to make?  A program can work either through
a command line interface, a key-stroke interface, or a GUI (Graphic User
Interface).  None of these change the performance of the program to any
great extent.  They merely change the aesthetics and the ease of use.  The
interface should not be allowed to be protected under law.  To do so would
interfere with innovation and progress without conclusively affecting the
profits of a company.  If company A holds the rights to the best interface,
but their program is worthless, then company B will still make more profit.
If it is truly the best interface possible, then progress would be slowed
since people would have to learn many different types of interfaces to go
from one program to another.  Clearly, it would be in the interest of all
concerned to leave the interface open for public usage and only protect
the code behind the interface.

Algorithms
==========

To protect an algorithm is to, in effect, copyright a mathematical equation.
Since all algorithms reduce down to a mathematical model, that model would
not be able to be implemented except by whoever holds the rights. This
would greatly reduce the productivity of mathematicians.  Imagine if
someone patented Integral Calculus.  Don't laugh.  IC is an algorithm
like any other.  It is a solution to a problem.   Or what if someone
patented the internal combustion engine?  Most of us would be walking.
But like the engine, it is not the algorithm of the engine that is important,
but how it is implemented.  All engines work on the same basic principle, but
they do so differently.  This is why one engine works better than the other.
This is why a buyer would choose one engine over another.


Source Code
===========

While source code should generally be protected, there are times when it
may be more profitable to a company to release either the source code or
important information pertaining to it.  A prime example is IBM and Apple.
Apple chose to keep their operating system under close wraps.  IBM, in their
usual wisdom, chose to let some of it fly.  This caused the market to be
flooded with "clone" PC's.  Given a choice, most people bought PC's or
PC-compatibles.  This generated more third-party support and even higher
sales.  What is the best selling computer today?  You got it.  Who
practically sets the standard for every computer that comes out today?  Good
guess.  While some may say that IBM could have made more money if they
had not released the information, I grant you that.  But, IBM has something
that Apple does not: insured existance.  There is no way that IBM could
be jettisoned from the marketplace.  IBM has insured that they will exist
long after Apple closes its doors.  All they have to do is keep putting
out downward compatible products and people will continue to buy PC's.


The Hacker Ethic Vs. The Business Ethic
=======================================

Hackers (including programmers) view computer programs different than
businessmen do.  Bits and pieces of programs are meant to be shared in order
to further innovation and increase productivity.  Programmers have always
shared algorithms, traded libraries, and swapped subroutines.  They do this
so that they do not have to "reinvent the wheel" every time they write a
program.  If something is very basic and can be used over and over in
many programs, then programmers share it with others.

Businessmen, on the other hand, are not motivated by sharing but by making
a dollar.  There is nothing wrong with this at all.  The problem is that
sometimes making a dollar in the short run can be detrimental to the overall
market in the long run.  Being misers with algorithms will force everyone
to spend a lot of time and MONEY to develop new products.  If something
is so basic and so useful, then it should be allowed the freedom to be
developed to its fullest.  Only then will the real bucks come rolling in.

The solution to this paradox is that hackers have to learn that companies
need money to keep going, and businessmen have to learn that computers
cannot be treated like most products.  A compromise needs to be reached so
that both profits and innovation are protected without destroying each.  Not
everything should be given away, and not everything should be kept secret.
Both should collaborate on deciding what to release and what to keep.
Lately, it has been more of a business decision than a programmer's, and
the imbalance is not good.


Conclusion
==========

There are more things to consider when protecting something in a computer
program than next quarter's profits.  In the long run, it may be more
profitable to let the competition use some of your ideas.  The more people
who are able to easily access computers, the bigger the market, and the
more profit.  If only one company has a good interface and the price is
high, the market will be small.  Obviously, not everything should be
allowed to be used freely, but the decision-making process should include
more than looking at the bottom line.


A fond farewell.....
====================

This is the last in my series of articles for CuD.  I have tried to show
another side of the Underground than the one that is commonplace.  There
is much more to the Underground than hacking and phreaking.  It is composed
of many intelligent people who can make a valuable contribution to the
computer industry.  They should not be thrown to the wayside as they have
been.  While I am not a spokesman for anyone down here, and I am certainly
long-winded and less intelligent than many, I sincerely hope that these
articles have made an impact on someone somewhere.

I would also hope that I have inspired other members of the Underground
to show that they are more than people who break into systems.  This
is your chance: start showing people what you really are, and then they
will take you seriously.  You can do a better job than I did; I know you
can!  Go out there and do it!!!

I would especially like to thank CuD and Jim Thomas for allowing me to
espouse my drivel in their fine digest.  A finer and fairer publication
could not be found anywhere.  I would also like to thank Dr. Ripco since
it was his BBS that first connected me to Underground when I was a mere
pup of 15, 6 years ago.  I have yet to see a BBS that compares in quality
in all my years down here.

As for my future plans, I will be taking a sabbatical from being active in
the Underground for a while.  I have many things to reflect over and much
to plan for my life.  I have a few projects that may or may not include
programming, writing, and editing a tech journal that will contain
articles from members of the Underground of a technical nature.  This
journal would be sent throughout the computer industry as a means of
communication.

I know these articles probably sucked, but I gave it my best shot.


In the words of the Darkest Adept the world has ever known:

Do what thou Wilt shall be the whole of the Law;
Love is the Law, Love under Will.


Thanks for the memories....

As always, I remain...

The Dark Adept
Email:  Ripco BBS (312)-528-5020


********************************************************************

------------------------------

                           **END OF CuD #2.18**
********************************************************************