| ==Phrack Inc.== | |
| Volume Two, Issue 22, File 7 of 12 | |
| [][][][][][][][][][][][][][][][][][][][][][][][][][][][] | |
| [] [] | |
| [] Computer Hackers Follow A Guttman-Like Progression [] | |
| [] [] | |
| [] by Richard C. Hollinger [] | |
| [] University Of Florida [] | |
| [] [] | |
| [] April, 1988 [] | |
| [] [] | |
| [][][][][][][][][][][][][][][][][][][][][][][][][][][][] | |
| Little is known about computer "hackers," those who invade the privacy of | |
| somone else's computer. This pretest gives us reason to believe that their | |
| illegal activities follow a Guttman-like involvement in deviance. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Computer crime has gained increasing attention, from news media to the | |
| legislature. The nation's first computer crime statute passed unanimously in | |
| the Florida Legislature during 1978 in response to a widely publicized incident | |
| at the Flagler Dog Track near Miami where employees used a computer to print | |
| bogus winning trifecta tickets (Miami Herald, 1977a and 1977b; Underwood, | |
| 1979). Forty-seven states and the federal government have enacted some | |
| criminal statue prohibiting unauthorized computer access, both malicious and | |
| non-malicious (BloomBecker, 1986; Scott, 1984; U.S. Public Law 98-4733, 1984; | |
| U.S. Public Law 99-474, 1986). Although some computer deviance might already | |
| have been illegal under fraud or other statutes, such rapid criminalization of | |
| this form of deviant behavior is itself an interesting social phenomenon. | |
| Parker documented thousands of computer-related incidents (1976; 1979; 1980a; | |
| 1980b; and 1983), arguing that most documented cases of computer abuse were | |
| discovered by accident. He believed that these incidents represent the tip of | |
| the iceberg. Others counter that many of these so-called computer crimes are | |
| apocryphal or not uniquely perpetrated by computer (Taber, 1980; Time, 1986). | |
| Parker's work (1976; 1983) suggests that computer offenders are typically males | |
| in the mid-twenties and thirties, acting illegally in their jobs, but others | |
| may be high school and college students (New York Times, 1984b; see related | |
| points in Hafner, 1983; Shea, 1984; New York Times, 1984a). | |
| Levy (1984) and Landreth (1985) both note that some computer aficionados have | |
| developed a "hacker ethic" allowing harmless computer exploration, including | |
| free access to files belonging to other users, bypassing passwords and security | |
| systems, outwitting bureaucrats preventing access, and opposing private | |
| software and copy protection schemes. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| This research on computer hackers is based on a small number of semi-structured | |
| two-hour interviews covering many topics, including ties to other users, | |
| computer ethics, knowledge of computer crime statutes, and self-reports of | |
| using computers in an illegal fashion. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Such acts include these ten: | |
| 1. Acquiring another user's password. | |
| 2. Unauthorized use of someone else's computer account. | |
| 3. Unauthorized "browsing" among other user's computer files. | |
| 4. Unauthorized "copying" of another user's computer files. | |
| 5. Unauthorized file modification. | |
| 6. Deliberate sabotage of another user's programs. | |
| 7. Deliberately "crashing" a computer system. | |
| 8. Deliberate damage or theft of computer hardware. | |
| 9. Making an unauthorized or "pirated" copy of proprietary computer software | |
| for another user. | |
| 10. Receiving an unauthorized or "pirated" copy of proprietary computer | |
| software from another user. | |
| In 1985, a group of five students took unauthorized control of the account | |
| management system on one of the University of Florida's Digital VAX computers. | |
| They were able to allocate new accounts to each other and their friends. In | |
| addition, they browsed through other users' accounts, files and programs, and | |
| most importantly, they modified or damaged a couple of files and programs on | |
| the system. All first-time offenders, three of the five performed "community | |
| service" in consenting to being interviewed for this paper. Eight additional | |
| interviews were conducted with students selected randomly from an computer | |
| science "assembler" (advanced machine language) class. These students are | |
| required to have a working knowledge of both mainframe systems and micro | |
| computers, in addition to literacy in at least two other computer languages. | |
| The State Attorney's decision not to prosecute these non-malicious offenders | |
| under Florida's Computer Crime Act (Chapter 815) may reflect a more general | |
| trend. From research on the use (actually non-use) of computer crime statutes | |
| nationally, both BloomBecker (1986) and Pfuhl (1987) report that given the lack | |
| of a previous criminal record and the generally "prankish" nature of the vast | |
| majority of these "crimes," very few offenders are being prosecuted with these | |
| new laws. | |
| The three known offenders differed little from four of the eight computer | |
| science students in their level of self-reported computer deviance. The | |
| interviews suggest that computer deviance follows a Guttman-like progression of | |
| involvement. Four of the eight computer science respondents (including all | |
| three females) reported no significant deviant activity using the computer. | |
| They indicated no unauthorized browsing or file modification and only isolated | |
| trading of "pirated" proprietary software. When asked, none of these | |
| respondents considered themselves "hackers." However, two of the eight | |
| computer science students admitted to being very active in unauthorized use. | |
| Respondents who admitted to violations seem to fit into three categories. | |
| PIRATES reported mainly copyright infringements, such as giving or receiving | |
| illegally copied versions of popular software programs. In fact, pirating | |
| software was the most common form of computer deviance discovered, with | |
| slightly over half of the respondents indicating some level of involvement. In | |
| addition to software piracy, BROWSERS gained occasional unauthorized access to | |
| another user's university computer account and browsed the private files of | |
| others. However, they did not damage or copy these files. CRACKERS were most | |
| serious abusers. These five individuals admitted many separate instances of | |
| the other two types of computer deviance, but went beyond that. They reported | |
| copying, modifying, and sabotaging other user's computer files and programs. | |
| These respondents also reported "crashing" entire computer systems or trying to | |
| do so. | |
| Whether for normative or technical reaspons, at least in this small sample, | |
| involvement in computer crime seems to follow a Guttman-like progression. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| REFERENCES | |
| BloomBecker, Jay. 1986. Computer Crime Law Reporter: 1986 Update. Los | |
| Angeles: National Center for Computer Crime Data. | |
| Florida, State of. 1978. Florida Computer Crimes Act Chapter 815.01-815.08. | |
| Hafner, Katherine. 1983. "UCLA student penetrates DOD Network," InfoWorld | |
| 5(47): 28. | |
| Landreth, Bill. 1985. Out of the Inner Circle: A Hacker's Guide to Computer | |
| Security. Bellevue, Washington: Microsoft Press. | |
| Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. New York: | |
| Doubleday. | |
| Miami Herald. 1977a-. "Dog players bilked via computer," (September | |
| 20):1,16. | |
| --1977b "Why Flagler Dog Track was easy pickings," (September 21): 1,17. | |
| Newsweek. 1983a. "Beware: Hackers at play," (September 5): 42-46,48. | |
| --1983b. "Preventing 'WarGames'," (September 5): 48. | |
| New York Times. 1984a. "Low Tech" (January 5): 26. | |
| --1984b. "Two who raided computers pleading guilty," (March 17): 6. | |
| Parker, Donn B. 1976. Crime By Computer. New York: Charles Scribner's Sons. | |
| --1979. Computer Crime: Criminal Justice Resource Manual. Washington, D.C.: | |
| U.S. Government Printing Office. | |
| --1980a. "Computer abuse research update," Computer/Law Journal 2: 329-52. | |
| --1980b. "Computer-related white collar crime," In Gilbert Geis and Ezra | |
| Stotland (eds.), White Collar Crime: Theory and Research. Beverly Hills, | |
| CA.: Sage, pp. 199-220. | |
| --1983. Fighting Computer Crime. New York: Charles Scribner's Sons. | |
| Pful, Erdwin H. 1987. "Computer abuse: problems of instrumental control. | |
| Deviant Behavior 8: 113-130. | |
| Scott, Michael D. 1984. Computer Law. New York: John Wiley and Sons. | |
| Shea, Tom. 1984. "The FBI goes after hackers," Infoworld 6 (13): | |
| 38,39,41,43,44. | |
| Taber, John K. 1980. "A survey of computer crime studies," Computer/Law | |
| Journal 2: 275-327. | |
| Time. 1983a. "Playing games," (August 22): 14. | |
| --1983b. "The 414 gang strikes again," (August 29): 75. | |
| --1986. "Surveying the data diddlers," (February 17): 95. | |
| Underwood, John. 1979. "Win, place... and sting," Sports Illustrated 51 | |
| (July 23): 54-81+. | |
| U.S. Public Law 98-473. 1984. Counterfeit Access Device and Computer Fraud | |
| and Abuse Act of 1984. Amendment to Chapter 47 of Title 18 of the United | |
| States Code, (October 12). | |
| U.S. Public Law 99-474. 1986. Computer Fraud and Abuse Act of 1986. | |
| Amendment to Chapter 47 of Title 18 of the United States Code, (October | |
| 16). | |
| _______________________________________________________________________________ | |