AOH :: P32-03.TXT

Concerning Hackers Who Break Into Computer Systems



                              ==Phrack Classic==

                     Volume Three, Issue 32, File #3 of 12

              Concerning Hackers Who Break into Computer Systems

                              Dorothy E. Denning
               Digital Equipment Corp., Systems Research Center
                   130 Lytton Ave., Palo Alto, CA 94301
                     415-853-2252, denning@src.dec.com


Abstract

A diffuse group of people, often called ``hackers,'' has been
characterized as unethical, irresponsible, and a serious danger to
society for actions related to breaking into computer systems.  This
paper attempts to construct a picture of hackers, their concerns,
and the discourse in which hacking takes place.  My initial findings
suggest that hackers are learners and explorers who want to help
rather than cause damage, and who often have very high standards
of behavior.  My findings also suggest that the discourse surrounding
hacking belongs at the very least to the gray areas between larger
conflicts that we are experiencing at every level of society and
business in an information age where many are not computer literate.
These conflicts are between the idea that information cannot be owned
and the idea that it can, and between law enforcement and the First
and Fourth Amendments.  Hackers have raised serious issues about
values and practices in an information society.  Based on my findings,
I recommend that we work closely with hackers, and suggest several
actions that might be taken.


1.  Introduction

The world is crisscrossed with many different networks that are used
to deliver essential services and basic necessities -- electric power,
water, fuel, food, goods, to name a few.  These networks are all
publicly accessible and hence vulnerable to attacks, and yet virtually
no attacks or disruptions actually occur.

The world of computer networking seems to be an anomaly in the
firmament of networks.  Stories about attacks, breakins, disruptions,
theft of information, modification of files, and the like appear
frequently in the newspapers.  A diffuse group called ``hackers''
is often the target of scorn and blame for these actions.  Why are
computer networks any different from other vulnerable public networks?
Is the difference the result of growing pains in a young field?
Or is it the reflection of deeper tensions in our emerging information
society?

There are no easy or immediate answers to these questions.  Yet it
is important to our future in a networked, information-dependent
world that we come to grips with them.  I am deeply interested in
them.  This paper is my report of what I have discovered in the early
stages of what promises to be a longer investigation.  I have
concentrated my attention in these early stages on the hackers
themselves.  Who are they?  What do they say?  What motivates them?
What are their values?  What do that have to say about public policies
regarding information and computers?  What do they have to say about
computer security?

From such a profile I expect to be able to construct a picture of
the discourses in which hacking takes place.  By a discourse I mean
the invisible background of assumptions that transcends individuals
and governs our ways of thinking, speaking, and acting.  My initial
findings lead me to conclude that this discourse belongs at the very
least to the gray areas between larger conflicts that we are
experiencing at every level of society and business, the conflict
between the idea that information cannot be owned and the idea that
it can, and the conflict between law enforcement and the First and
Fourth Amendments.

But, enough of the philosophy.  On with the story!


2.  Opening Moves

In late fall of 1989, Frank Drake (not his real name), editor of
the now defunct cyberpunk magazine W.O.R.M., invited me to be
interviewed for the magazine.  In accepting the invitation, I hoped
that something I might say would discourage hackers from breaking
into systems.  I was also curious about the hacker culture.  This
seemed like a good opportunity to learn about it.

The interview was conducted electronically.  I quickly discovered
that I had much more to learn from Drake's questions than to teach.
For example, he asked: ``Is providing computer security for large
databases that collect information on us a real service?  How do
you balance the individual's privacy vs. the corporations?''  This
question surprised me.  Nothing that I had read about hackers ever
suggested that they might care about privacy.  He also asked: ``What
has (the DES) taught us about what the government's (especially NSA's)
role in cryptography should be?''  Again, I was surprised to discover
a concern for the role of the government in computer security.  I
did not know at the time that I would later discover considerable
overlap in the issues discussed by hackers and those of other computer
professionals.

I met with Drake to discuss his questions and views.  After our
meeting, we continued our dialog electronically with me interviewing
him.  This gave me the opportunity to explore his views in greater
depth.  Both interviews appear in ``Computers Under Attack,''
edited by Peter Denning (DenningP90).

My dialog with Drake increased my curiosity about hackers.  I read
articles and books by or about hackers.  In addition, I had discussions
with nine hackers whom I will not mention by name.  Their ages ranged
from 17 to 28.

The word ``hacker'' has taken on many different meanings ranging
from 1) ``a person who enjoys learning the details of computer systems
and how to stretch their capabilities'' to 2) ``a malicious or
inquisitive meddler who tries to discover information by poking around
... possibly by deceptive or illegal means ...'' (Steele83).  The
hackers described in this paper are both learners and explorers who
sometimes perform illegal actions.  However, all of the hackers I
spoke with said they did not engage in or approve of malicious acts
that damage systems or files.  Thus, this paper is not about malicious
hackers.  Indeed, my research so far suggests that there are very
few malicious hackers.   Neither is this paper about career criminals
who, for example, defraud businesses, or about people who use stolen
credit cards to purchase goods.  The characteristics of many of the
hackers I am writing about are summed up in the words of one of the
hackers: ``A hacker is someone who experiments with systems...
(Hacking) is playing with systems and making them do what they were
never intended to do.  Breaking in and making free calls is just
a small part of that.  Hacking is also about freedom of speech and
free access to information -- being able to find out anything.  There
is also the David and Goliath side of it, the underdog vs. the system,
and the ethic of being a folk hero, albeit a minor one.''

Richard Stallman, founder of the Free Software Foundation who calls
himself a hacker according to the first sense of the word above,
recommends calling security-breaking hackers ``crackers''
(Stallman84).  While this description may be more accurate, I shall
use the term ``hacker'' since the people I am writing about call
themselves hackers and all are interested in learning about computer
and communication systems.  However, there are many people like
Stallman who call themselves hackers and do not engage in illegal
or deceptive practices; this paper is also not about those hackers.

In what follows I will report on what I have learned about hackers
from hackers.  I will organize the discussion around the principal
domains of concerns I observed.  I recommend Meyer's thesis (Meyer89)
for a more detailed treatment of the hackers' social culture and
networks, and Meyer and Thomas (MeyerThomas90) for an interesting
interpretation of the computer underground as a postmodernist rejection
of conventional culture that substitutes ``rational technological
control of the present for an anarchic and playful future.''

I do not pretend to know all the concerns that hackers have, nor
do I claim to have conducted a scientific study.  Rather, I hope
that my own informal study motivates others to explore the area
further.  It is essential that we as computer security professionals
take into account hackers' concerns in the design of our policies,
procedures, laws regulating computer and information access, and
educational programs.  Although I speak about security-breaking hackers
as a group, their competencies, actions, and views are not all the
same.  Thus, it is equally important that our policies and programs
take into account individual differences.

In focusing on what hackers say and do, I do not mean for a moment
to set aside the concerns of the owners and users of systems that
hackers break into, the concerns of law enforcement personnel, or
our own concerns as computer security professionals.  But I do
recommend that we work closely with hackers as well as these other
groups to design new approaches and programs for addressing the
concerns of all.   Like ham radio operators, hackers exist, and it
is in our best interest that we learn to communicate and work with
them rather than against them.

I will suggest some actions that we might consider taking, and I
invite others to reflect on these and suggest their own.  Many of
these suggestions are from the hackers themselves; others came from
the recommendations of the ACM Panel on Hacking (Lee86) and from
colleagues.

I grouped the hackers' concerns into five categories: access to
computers and information for learning; thrill, excitement and
challenge; ethics and avoiding damage; public image and treatment;
and privacy and first amendment rights.  These are discussed in
the next five subsections.  I have made an effort to present my
findings as uncritical observations.  The reader should not infer
that I either approve or disapprove of actions hackers take.


3.  Access to Computers and Information for Learning

Although Levy's book ``Hackers'' (Levy84) is not about today's
security-breaking hackers, it articulates and interprets a ``hacker
ethic'' that is shared by many of these hackers.  The ethic includes
two key principles that were formulated in the early days of the
AI Lab at MIT: ``Access to computers -- and anything which might
teach you something about the way the world works -- should be
unlimited and total,'' and ``All information should be free.''  In
the context in which these principles were formulated, the computers
of interest were research machines and the information was software
and systems information.

Since Stallman is a leading advocate of open systems and freedom
of information, especially software, I asked him what he means by
this.  He said: ``I believe that all generally useful information
should be free. By `free' I am not referring to price, but rather
to the freedom to copy the information and to adapt it to one's own
uses.''  By ``generally useful'' he does not include confidential
information about individuals or credit card information, for example.
He further writes: ``When information is generally useful,
redistributing it makes humanity wealthier no matter who is
distributing and no matter who is receiving.''  Stallman has argued
strongly against user interface copyright, claiming that it does
not serve the users or promote the evolutionary process (Stallman90).

I asked hackers whether all systems should be accessible and all
information should be free.  They said that it is OK if some systems
are closed and some information, mainly confidential information
about individuals, is not accessible.  They make a distinction between
information about security technology, e.g., the DES, and confidential
information protected by that technology, arguing that it is the
former that should be accessible.   They said that information hoarding
is inefficient and slows down evolution of technology.  They also
said that more systems should be open so that idle resources are
not wasted.  One hacker said that the high costs of communication
hurts the growth of the information economy.

These views of information sharing seem to go back at least as far
as the 17th and 18th centuries.  Samuelson (Samuelson89) notes that
``The drafters of the Constitution, educated in the Enlightenment
tradition, shared that era's legacy of faith in the enabling powers
of knowledge for society as well as the individual.''  She writes
that our current copyright laws, which protect the expression of
information, but not the information itself, are based on the belief
that unfettered and widespread dissemination of information promotes
technological progress. (Similarly for patent laws which protect
devices and processes, not the information about them.)  She cites
two recent court cases where courts reversed the historical trend
and treated information as ownable property.  She raises questions
about whether in entering the Information Age where information is
the source of greatest wealth, we have outgrown the Enlightenment
tradition and are coming to treat information as property.

In a society where knowledge is said to be power, Drake expressed
particular concern about what he sees as a growing information gap
between the rich and poor.  He would like to see information that
is not about individuals be made public, although it could still
be owned.  He likes to think that companies would actually find it
to their advantage to share information.  He noted how IBM's disclosure
of the PC allowed developers to make more products for the computers,
and how Adobe's disclosure of their fonts helped them compete against
the Apple-Microsoft deal.  He recognizes that in our current political
framework, it is difficult to make all information public, because
complicated structures have been built on top of an assumption that
certain information will be kept secret.  He cites our defense policy,
which is founded on secrecy for military information, as an example.

Hackers say they want access to information and computing and network
resources in order to learn.  Both Levy (Levy84) and Landreth
(Landreth89) note that hackers have an intense, compelling interest
in computers and learning, and many go into computers as a profession.
Some hackers break into systems in order to learn more about how
the systems work.  Landreth says these hackers want to remain
undiscovered so that they can stay on the system as long as possible.
Some of them devote most of their time to learning how to break the
locks and other security mechanisms on systems; their background
in systems and programming varies considerably.  One hacker wrote
``A hacker sees a security hole and takes advantage of it because
it is there, not to destroy information or steal.  I think our
activities would be analogous to someone discovering methods of
acquiring information in a library and becoming excited and perhaps
engrossed.''

We should not underestimate the effectiveness of the networks in
which hackers learn their craft.  They do research, learn about
systems, work in groups, write, and teach others.  One hacker said
that he belongs to a study group with the mission of churning out
files of information and learning as much as possible.  Within the
group, people specialize, collaborate on research projects, share
information and news, write articles, and teach others about their
areas of specialization.  Hackers have set up a private system of
education that engages them, teaches them to think, and allows them
to apply their knowledge in purposeful, if not always legal,
activity.   Ironically, many of our nation's classrooms have been
criticized for providing a poor learning environment that seems to
emphasize memorization rather than thinking and reasoning.  One hacker
reported that through volunteer work with a local high school, he
was trying to get students turned on to learning.

Many hackers say that the legitimate computer access they have through
their home and school computers do not meet their needs.  One student
told me that his high school did not offer anything beyond elementary
courses in BASIC and PASCAL, and that he was bored by these.  Hans
Huebner, a hacker in Germany who goes by the name Pengo, wrote in
a note to the RISKS Forum (Huebner89) : ``I was just interested in
computers, not in the data which has been kept on their disks. As
I was going to school at that time, I didn't even have the money
to buy my own computer.  Since CP/M (which was the most sophisticated
OS I could use on machines which I had legal access to) didn't turn
me on anymore, I enjoyed the lax security of the systems I had access
to by using X.25 networks.  You might point out that I should have
been patient and waited until I could go to the university and
use their machines.  Some of you might understand that waiting was
just not the thing I was keen on in those days.''

Brian Harvey, in his position paper (Harvey86) for the ACM Panel on
Hacking, claims that the computer medium available to students, e.g.,
BASIC and floppy disks, is inadequate for challenging intellectual
work.  His recommendation is that students be given access to real
computing power, and that they be taught how to use that power
responsibly.  He describes a program he created at a public high school
in Massachusetts during the period 1979-1982.  They installed a
PDP-11/70 and let students and teachers carry out the administration
of the system.  Harvey assessed that putting the burden of dealing
with the problems of malicious users on the students themselves was
a powerful educational force.  He also noted that the students who
had the skill and interest to be password hackers were discouraged
from this activity because they also wanted to keep the trust of
their colleagues in order that they could acquire ``superuser'' status
on the system.

Harvey also makes an interesting analogy between teaching computing
and teaching karate.  In karate instruction, students are introduced
to the real, adult community.  They are given access to a powerful,
deadly weapon, and at the same time are taught discipline and
responsibility.  Harvey speculates that the reason that students
do not misuse their power is that they know they are being trusted
with something important, and they want to live up to that trust.
Harvey applied this principle when he set up the school system.

The ACM panel endorsed Harvey's recommendation, proposing a
three-tiered computing environment with local, district-wide, and
nation-wide networks.  They recommended that computer professionals
participate in this effort as mentors and role models.   They also
recommended that government and industry be encouraged to establish
regional computing centers using donated or re-cycled equipment;
that students be apprenticed to local companies either part-time
on a continuing basis or on a periodic basis; and, following a
suggestion from Felsenstein (Felsenstein86) for a ``Hacker's League,''
that a league analogous to the Amateur Radio Relay League be
established to make contributed resources available for educational
purposes.

Drake said he liked these recommendations.  He said that if hackers
were given access to powerful systems through a public account system,
they would supervise themselves.  He also suggested that Computer
Resource Centers be established in low-income areas in order to help
the poor get access to information.  Perhaps hackers could help run
the centers and teach the members of the community how to use the
facilities.  One of my colleagues suggested cynically that the hackers
would only use this to teach the poor how to hack rich people's
systems.  A hacker responded by saying this was ridiculous; hackers
would not teach people how to break into systems, but rather how
to use computers effectively and not be afraid of them.
In addition, the hackers I spoke with who had given up illegal
activities said they stopped doing so when they got engaged in other
work.

Geoff Goodfellow and Richard Stallman have reported that they have
given hackers accounts on systems that they manage, and that the
hackers have not misused the trust granted to them.  Perhaps
universities could consider providing accounts to pre-college students
on the basis of recommendations from their teachers or parents.
The students might be challenged to work on the same homework problems
assigned in courses or to explore their own interests.  Students
who strongly dislike the inflexibility of classroom learning might
excel in an environment that allows them to learn on their own, in
much the way that hackers have done.

4.  Thrill, Excitement, and Challenge


One hacker wrote that ``Hackers understand something basic about
computers, and that is that they can be enjoyed.  I know none who
hack for money, or hack to frighten the company, or hack for anything
but fun.''

In the words of another hacker, ``Hacking was the ultimate cerebral
buzz for me.  I would come home from another dull day at school,
turn my computer on, and become a member of the hacker elite.  It
was a whole different world where there were no condescending adults
and you were judged only by your talent.  I would first check in
to the private Bulletin Boards where other people who were like me
would hang out, see what the news was in the community, and trade
some info with people across the country.  Then I would start actually
hacking.  My brain would be going a million miles an hour and I'd
basically completely forget about my body as I would jump from one
computer to another trying to find a path into my target.  It was
the rush of working on a puzzle coupled with the high of discovery
many magnitudes intensified.  To go along with the adrenaline rush
was the illicit thrill of doing something illegal. Every step I made
could be the one that would bring the authorities crashing down on
me.  I was on the edge of technology and exploring past it, spelunking
into electronic caves where I wasn't supposed to be.''

The other hackers I spoke with made similar statements about the
fun and challenge of hacking.  In SPIN magazine (Dibbel90), reporter
Julian Dibbell speculated that much of the thrill comes from the
dangers associated with the activity, writing that ``the technology
just lends itself to cloak-and-dagger drama,'' and that ``hackers
were already living in a world in which covert action was nothing
more than a game children played.''

Eric Corley (Corley89) characterizes hacking as an evolved form of
mountain climbing.  In describing an effort to construct a list of
active mailboxes on a Voice Messaging System, he writes ``I suppose
the main reason I'm wasting my time pushing all these buttons is
simply so that I can make a list of something that I'm not supposed
to have and be the first person to accomplish this.''  He said that
he was not interested in obtaining an account of his own on the system.
Gordon Meyer says he found this to be a recurring theme: ``We aren't
supposed to be able to do this, but we can'' -- so they do.

One hacker said he was now working on anti-viral programming.  He
said it was almost as much fun as breaking into systems, and that
it was an intellectual battle against the virus author.


5.  Ethics and Avoiding Damage


All of the hackers I spoke with said that malicious hacking was morally
wrong.  They said that most hackers are not intentionally malicious,
and that they themselves are concerned about causing accidental
damage.  When I asked Drake about the responsibility of a person
with a PC and modem, his reply included not erasing or modifying
anyone else's data, and not causing a legitimate user on a system
any problems.  Hackers say they are outraged when other hackers cause
damage or use resources that would be missed, even if the results
are unintentional and due to incompetence.  One hacker wrote ``I
have ALWAYS strived to do NO damage, and to inconvenience as few people
as possible.  I NEVER, EVER, EVER DELETE A FILE.  One of the first
commands I do on a new system is disable the delete file command.''
Some hackers say that it is unethical to give passwords and similar
security-related information to persons who might do damage.  In
the recent incident where a hacker broke into Bell South and downloaded
a text file on the emergency 911 service, hackers say that there
was no intention to use this knowledge to break into or sabotage
the 911 system.  According to Emmanuel Goldstein (Goldstein90), the
file did not even contain information about how to break into the
911 system.

The hackers also said that some break-ins were unethical, e.g.,
breaking into hospital systems, and that it is wrong to read
confidential information about individuals or steal classified
information.  All said it was wrong to commit fraud for personal
profit.

Although we as computer security professionals often disagree with
hackers about what constitutes damage, the ethical standards listed
here sound much like our own.  Where the hackers' ethics differ from
the standards adopted by most in the computer security community
is that hackers say it is not unethical to break into many systems,
use idle computer and communications resources, and download system
files in order to learn.  Goldstein says that hacking is not wrong:
it is not the same as stealing, and uncovers design flaws and security
deficiencies (Goldstein89).

Brian Reid, a colleague at Digital who has spoken with many hackers,
speculates that a hacker's ethics may come from not being raised
properly as a civilized member of society, and not appreciating the
rules of living in society.  One hacker responded to this with ``What
does `being brought up properly' mean?  Some would say that it is
`good' to keep to yourself, mind your own business.  Others might
argue that it is healthy to explore, take risks, be curious and
discover.'' Brian Harvey (Harvey86) notes that many hackers are
adolescents, and that adolescents are at a less advanced stage of
moral development than adults, where they might not see how the effects
of their actions hurt others.  Larry Martin (Martin89) claims that
parents, teachers, the press, and others in society are not aware
of their responsibility to contribute to instilling ethical values
associated with computer use.  This could be the consequence of the
youth of the computing field; many people are still computer illiterate
and cultural norms may be lagging behind advances in technology and
the growing dependency on that technology by businesses and society.
Hollinger and Lanza-Kaduce (HollingerLanza-Kaduce88) speculate that
the cultural normative messages about the use and abuse of computer
technology have been driven by the adoption of criminal laws in the
last decade.  They also speculate that hacking may be encouraged
during the process of becoming computer literate.  Some of my
colleagues say that hackers are irresponsible.  One hacker responded
``I think it's a strong indication of the amount of responsibility
shown that so FEW actually DAMAGING incidents are known.''

But we must not overlook that the differences in ethics also reflect
a difference in philosophy about information and information handling
resources; whereas hackers advocate sharing, we seem to be advocating
ownership as property.  The differences also represent an opportunity
to examine our own ethical behavior and our practices for information
sharing and protection.  For example, one hacker wrote ``I will accept
that it is morally wrong to copy some proprietary software, however,
I think that it is morally wrong to charge $6000 for a program that
is only around 25K long.''  Hence, I shall go into a few of the ethical
points raised by hackers more closely.  It is not a simple case of
good or mature (us) against bad or immature (hackers), or of teaching
hackers a list of rules.

Many computer professionals such as Martin (Martin89) argue the moral
questions by analogy.  The analogies are then used to justify their
judgment of a hacker's actions as unethical.  Breaking into a system
is compared with breaking into a house, and downloading information
and using computer and telecommunications services is compared with
stealing tangible goods.  But, say hackers, the situations are not
the same.  When someone breaks into a house, the objective is to
steal goods, which are often irreplaceable, and property is often
damaged in the process.  By contrast, when a hacker breaks into a
system, the objective is to learn and avoid causing damage.  Downloaded
information is copied, not stolen, and still exists on the original
system.  Moreover, as noted earlier, information has not been
traditionally regarded as property.  Dibbel (Dibbel90) says that
when the software industries and phone companies claim losses of
billions of dollars to piracy, they are not talking about goods that
disappear from the shelves and could have been sold.

We often say that breaking into a system implies a lack of caring
for the system's owner and authorized users.  But, one hacker says
that the ease of breaking into a system reveals a lack of caring
on the part of the system manager to protect user and company assets,
or failure on the part of vendors to warn managers about the
vulnerabilities of their systems.  He estimated his success rate
of getting in at 10-15%, and that is without spending more than an
hour on any one target system.  Another hacker says that he sees
messages from vendors notifying the managers, but that the managers
fail to take action.

Richard Pethia of CERT (Computer Emergency Response Team) reports
that they seldom see cases of malicious damage caused by hackers,
but that the break-ins are nevertheless disruptive because system
users and administrators want to be sure that nothing was damaged.
(CERT suggests that sites reload system software from secure backups
and change all user passwords in order to protect against possible
back doors and Trojan Horses that might have been planted by the
hacker.  Pethia also noted that prosecutors are generally called
for government sites, and are being called for non-government sites
with increasing frequency.)  Pethia says that break-ins also generate
a loss of trust in the computing environment, and may lead to adoption
of new policies that are formulated in a panic or management edicts
that severely restrict connectivity to outside systems.   Brian Harvey
says that hackers cause damage by increasing the amount of paranoia,
which in turn leads to tighter security controls that diminish the
quality of life for the users.  Hackers respond to these points by
saying they are the scapegoats for systems that are not adequately
protected.  They say that the paranoia is generated by ill-founded
fears and media distortions (I will return to this point later),
and that security need not be oppressive to keep hackers out; it
is mainly making sure that passwords and system defaults are
well chosen.

Pethia says that some intruders seem to be disruptive to prove a
point, such as that the systems are vulnerable, the security personnel
are incompetent, or ``it's not nice to say bad things about hackers.''
In the N.Y. Times, John Markoff (Markoff90) wrote that the hacker
who claimed to have broken into Cliff Stoll's system said he was
upset by Stoll's portrayal of hackers in ``The Cuckoo's Egg''
(Stoll90).   Markoff reported that the caller said: ``He (Stoll)
was going on about how he hates all hackers, and he gave pretty much
of a one-sided view of who hackers are.''

``The Cuckoo's Egg'' captures many of the popular stereotypes of
hackers.  Criminologist Jim Thomas criticizes it for presenting a
simplified view of the world, one where everything springs from the
forces of light (us) or of darkness (hackers) (Thomas90).  He claims
that Stoll fails to see the similarities between his own activities
(e.g., monitoring communications, ``borrowing'' monitors without
authorization, shutting off network access without warning, and lying
to get information he wants) and those of hackers.  He points out
Stoll's use of pejorative words such as ``varmint'' to describe
hackers, and Stoll's quote of a colleague: ``They're technically
skilled but ethically bankrupt programmers without any respect for
others' work -- or privacy.  They're not destroying one or two
programs.  They're trying to wreck the cooperation that builds our
networks,'' (Stoll90, p. 159).  Thomas writes ``at an intellectual
level, it (Stoll's book) provides a persuasive, but simplistic, moral
imagery of the nature of right and wrong, and provides what -- to
a lay reader -- would seem a compelling justification for more statutes
and severe penalties against the computer underground.  This is
troublesome for two reasons.  First, it leads to a mentality of social
control by law enforcement during a social phase when some would
argue we are already over-controlled.  Second, it invokes a punishment
model that assumes we can stamp out behaviors to which we object
if only we apprehend and convict a sufficient number of violators.
...  There is little evidence that punishment will in the long run
reduce any given offense, and the research of Gordon Meyer and I
suggests that criminalization may, in fact, contribute to the growth
of the computer underground.''


6. Public Image and Treatment


Hackers express concern about their negative public image and
identity.  As noted earlier, hackers are often portrayed as being
irresponsible and immoral.  One hacker said that ``government
propaganda is spreading an image of our being at best, sub-human,
depraved, criminally inclined, morally corrupt, low life.  We need
to prove that the activities that we are accused of (crashing systems,
interfering with life support equipment, robbing banks, and jamming
911 lines) are as morally abhorrent to us as they are to the general
public.''

The public identity of an individual or group is generated in part
by the actions of the group interacting with the standards of the
community observing those actions.  What then accounts for the
difference between the hacker's public image and what they say about
themselves?  One explanation may be the different standards.  Outside
the hacking community, the simple act of breaking into systems is
regarded as unethical by many.  The use of pejorative words like
``vandal'' and ``varmint'' reflect this discrepency in ethics.  Even
the word ``criminal'' carries with it connotations of someone evil;
hackers say they are not criminal in this sense.  Katie Hafner notes
that Robert Morris Jr., who was convicted of launching the Internet
worm, was likened to a terrorist even though the worm did not destroy
data (Hafner90)

Distortions of events and references to potential threats also create
an image of persons who are dangerous.  Regarding the 911 incident
where a hacker downloaded a file from Bell South, Goldstein reported
``Quickly, headlines screamed that hackers had broken into the 911
system and were interfering with emergency telephone calls to the
police.  One newspaper report said there were no indications that
anyone had died or been injured as a result of the intrusions.  What
a relief.  Too bad it wasn't true,'' (Goldstein90).  In fact, the
hackers involved with the 911 text file had not broken into the 911
system.  The dollar losses attributed to hacking incidents also are
often highly inflated.

Thomas and Meyer (ThomasMeyer90) say that the rhetoric depicting
hackers as a dangerous evil contributes to a ``witch hunt'' mentality,
wherein a group is first labeled as dangerous, and then enforcement
agents are mobilized to exorcise the alleged social evil.  They see
the current sweeps against hackers as part of a reaction to a broader
fear of change, rather than to the actual crimes committed.

Hackers say they are particularly concerned that computer security
professionals and system managers do not appear to understand hackers
or be interested in their concerns.  Hackers say that system managers
treat them like enemies and criminals, rather than as potential helpers
in their task of making their systems secure.  This may reflect
managers' fears about hackers, as well as their responsibilities
to protect the information on their systems.  Stallman says that
the strangers he encounters using his account are more likely to
have a chip on their shoulder than in the past; he attributes this
to a harsh enforcer mentality adopted by the establishment.  He says
that network system managers start out with too little trust and
a hostile attitude toward strangers that few of the strangers deserve.
One hacker said that system managers show a lack of openness to those
who want to learn.

Stallman also says that the laws make the hacker scared to communicate
with anyone even slightly ``official,'' because that person might
try to track the hacker down and have him or her arrested.  Drake
raised the issue of whether the laws could differentiate between
malicious and nonmalicious hacking, in support of a ``kinder, gentler''
relationship between hackers and computer security people.  In fact,
many states such as California initially passed computer crime laws
that excluded malicious hacking; it was only later that these laws
were amended to include nonmalicious actions (HollingerLanza-Kaduce88).
Hollinger and Lanza-Kaduce speculate that these amendments and other
new laws were catalyzed mainly by media events, especially the reports
on the ``414 hackers'' and the movie ``War Games,'' which created
a perception of hacking as extremely dangerous, even if that perception
was not based on facts.

Hackers say they want to help system managers make their systems
more secure.  They would like managers to recognize and use their
knowledge about system vulnerabilities.   Landreth (Landreth89)
suggests ways in which system managers can approach hackers in order
to turn them into colleagues, and Goodfellow also suggests befriending
hackers (Goodfellow83).  John Draper (Cap'n Crunch) says it would
help if system managers and the operators of phone companies and
switches could cooperate in tracing a hacker without bringing in
law enforcement authorities.

Drake suggests giving hackers free access in exchange for helping
with security, a suggestion that I also heard from several hackers.
Drake says that the current attitude of treating hackers as enemies
is not very conducive to a solution, and by belittling them, we only
cause ourselves problems.

I asked some of the hackers whether they'd be interested in breaking
into systems if the rules of the ``game'' were changed so that instead
of being threatened by prosecution, they were invited to leave a
``calling card'' giving their name, phone number, and method of
breaking in.  In exchange, they would get recognition and points
for each vulnerability they discovered.  Most were interested in
playing; one hacker said he would prefer monetary reward since he
was supporting himself.  Any system manager interested in trying
this out could post a welcome message inviting hackers to leave their
cards.  This approach could have the advantage of not only letting
the hackers contribute to the security of the system, but of allowing
the managers to quickly recognize the potentially malicious hackers,
since they are unlikely to leave their cards.  Perhaps if hackers
are given the opportunity to make contributions outside the
underground, this will dampen their desire to pursue illegal activities.

Several hackers said that they would like to be able to pursue their
activities legally and for income.  They like breaking into systems,
doing research on computer security, and figuring out how to protect
against vulnerabilities.  They say they would like to be in a position
where they have permission to hack systems.  Goodfellow suggests
hiring hackers to work on tiger teams that are commissioned to locate
vulnerabilities in systems through penetration testing.  Baird
Info-Systems Safeguards, Inc., a security consulting firm, reports
that they have employed hackers on several assignments (Baird87).
They say the hackers did not violate their trust or the trust of
their clients, and performed in an outstanding manner.  Baird believes
that system vulnerabilities can be better identified by employing
people who have exploited systems.

One hacker suggested setting up a clearinghouse that would match
hackers with companies that could use their expertise, while
maintaining anonymity of the hackers and ensuring confidentiality
of all records.  Another hacker, in describing an incident where
he discovered a privileged account without a password, said ``What
I (and others) wish for is a way that hackers can give information
like this to a responsible source, AND HAVE HACKERS GIVEN CREDIT
FOR HELPING! As it is, if someone told them that `I'm a hacker, and
I REALLY think you should know...' they would freak out, and run
screaming to the SS (Secret Service) or the FBI. Eventually, the
person who found it would be caught, and hauled away on some crazy
charge.  If they could only just ACCEPT that the hacker was trying
to help!''  The clearinghouse could also provide this type of service.

Hackers are also interested in security policy issues.  Drake expressed
concern over how we handle information about computer security
vulnerabilities.  He argues that it is better to make this information
public than cover it up and pretend that it does not exist, and cites
the CERT to illustrate how this approach can be workable.  Other
hackers, however, argue for restricting initial dissemination of
flaws to customers and users.  Drake also expressed concern about
the role of the government, particularly the military, in
cryptography.  He argues that NSA's opinion on a cryptographic standard
should be taken with a large grain of salt because of their code
breaking role.

Some security specialists are opposed to hiring hackers for security
work, and Eugene Spafford has urged people not to do business with
any company that hires a convicted hacker to work in the security
area (ACM90).  He says that ``This is like having a known arsonist
install a fire alarm.''   But, the laws are such that a person can
be convicted for having done nothing other than break into a system;
no serious damage (i.e., no ``computer arson'') is necessary.  Many
of our colleagues, including Geoff Goodfellow (Goodfellow83) and
Brian Reid (Frenkel87), admit to having broken into systems in the
past.  Reid is quoted as saying that because of the knowledge he gained
breaking into systems as a kid, he was frequently called in to help
catch people who break in.  Spafford says that times have changed,
and that this method of entering the field is no longer socially
acceptable, and fails to provide adequate training in computer science
and computer engineering (Spafford89).  However, from what I have
observed, many hackers do have considerable knowledge about
telecommunications, data security, operating systems, programming
languages, networks, and cryptography.  But, I am not challenging
a policy to hire competent people of sound character.  Rather, I
am challenging a strict policy that uses economic pressure to close
a field of activity to all persons convicted of breaking into
systems.   It is enough that a company is responsible for the behavior
of its employees.  Each hacker can be considered for employment based
on his or her own competency and character.

Some people have called for stricter penalties for hackers, including
prison terms, in order to send a strong deterrent message to hackers.
John Draper, who was incarcerated for his activities in the 1970's,
argues that in practice this will only make the problem worse.  He
told me that he was forced under threat to teach other inmates his
knowledge of communications systems.  He believes that prison sentences
will serve only to spread hacker's knowledge to career criminals.
He said he was never approached by criminals outside the prison,
but that inside the prison they had control over him.

One hacker said that by clamping down on the hobbyist underground,
we will only be left with the criminal underground.  He said that
without hackers to uncover system vulnerabilities, the holes will
be left undiscovered, to be utilized by those likely to cause real
damage.

Goldstein argues that the existing penalties are already way out
of proportion to the acts committed, and that the reason is because
of computers (Goldstein89).  He says that if Kevin Mitnick had
committed crimes similar to those he committed but without a computer,
he would have been classified as a mischief maker and maybe fined
$100 for trespassing; instead, he was put in jail without bail
(Goldstein89).  Craig Neidorf, a publisher and editor of the electronic
newsletter ``Phrack,'' faces up to 31 years and a fine of $122,000
for receiving, editing, and transmitting the downloaded text file
on the 911 system (Goldstein90). (Since the time I wrote this, a new
indictment was issued with penalties of up to 65 years in prison.
Neidorf went on trial beginning July 23.  The trial ended July 27
when the government dropped all charges.  DED)

7.  Privacy and the First and Fourth Amendments

The hackers I spoke with advocated privacy protection for sensitive
information about individuals.   They said they are not interested
in invading people's privacy, and that they limited their hacking
activities to acquiring information about computer systems or how
to break into them.  There are, of course, hackers who break into
systems such as the TRW credit database.  Emanuel Goldstein argues
that such invasions of privacy took place before the hacker arrived
(Harpers90).  Referring to credit reports, government files, motor
vehicle records, and the ``megabytes of data piling up about each
of us,'' he says that thousands of people legally can see and use
this data, much of it erroneous.  He claims that the public has been
misinformed about the databases, and that hackers have become
scapegoats for the holes in the systems.  One hacker questioned the
practice of storing sensitive personal information on open systems
with dial-up access, the accrual of the information, the methods
used to acquire it, and the purposes to which it is put.  Another
hacker questioned the inclusion of religion and race in credit records.
Drake told me that he was concerned about the increasing amount of
information about individuals that is stored in large data banks,
and the inability of the individual to have much control over the
use of that information.  He suggests that the individual might be
co-owner of information collected about him or her, with control
over the use of that information.  He also says that an individual
should be free to withhold personal information, of course paying
the consequences of doing so (e.g., not getting a drivers license
or credit card).  In fact, all Federal Government forms are required
to contain a Privacy Act Statement that states how the information
being collected will be used and, in some cases, giving the option
of withholding the information.

Goldstein has also challenged the practices of law enforcement agencies
in their attempt to crack down on hackers (Goldstein90).  He said
that all incoming and outgoing electronic mail used by ``Phrack''
was monitored before the newsletter was shutdown by authorities.
``Had a printed magazine been shut down in this fashion after having
all of their mail opened and read, even the most thick-headed
sensationalist media types would have caught on: hey, isn't that
a violation of the First Amendment?''  He also cites the shutdown
of several bulletin boards as part of Operation Sun Devil, and quotes
the administrator of the bulletin board Zygot as saying ``Should
I start reading my users' mail to make sure they aren't saying anything
naughty?  Should I snoop through all the files to make sure everyone
is being good?  This whole affair is rather chilling.''  The
administrator for the public system The Point wrote ``Today, there
is no law or precedent which affords me ... the same legal rights
that other common carriers have against prosecution should some other
party (you) use my property (The Point) for illegal activities.
That worries me ...''

About 40 personal computer systems and 23,000 data disks were seized
under Operation Sun Devil, a two-year investigation involving the
FBI, Secret Service, and other federal and local law enforcement
officials.  In addition, the Secret Service acknowledges that its
agents, acting as legitimate users, had secretly monitored computer
bulletin boards (Markoff90a).  Markoff reports that California
Representative Don Edwards, industry leader Mitchell Kapor, and civil
liberties advocates are alarmed by these government actions, saying
that they challenge freedom of speech under the First Amendment and
protection against searches and seizures under the Fourth Amendment.
Markoff asks: ``Will fear of hackers bring oppression?''

John Barlow writes ``The Secret Service may actually have done a
service for those of us who love liberty.  They have provided us
with a devil.  And devils, among their other galvanizing virtues,
are just great for clarifying the issues and putting iron in your
spine,'' (Barlow90).  Some of the questions that Barlow says need
to be addressed include ``What are data and what is free speech?
How does one treat property which has no physical form and can be
infinitely reproduced?  Is a computer the same as a printing press?''
Barlow urges those of us who understand the technology to address
these questions, lest the answers be given to us by law makers and
law enforcers who do not.   Barlow and Kapor are constituting a
foundation to ``raise and disburse funds for education, lobbying,
and litigation in the areas relating to digital speech and the
extension of the Constitution into Cyberspace.''

8.  Conclusions


Hackers say that it is our social responsibility to share information,
and that it is information hoarding and disinformation that are the
crimes.  This ethic of resource and information sharing contrasts
sharply with computer security policies that are based on authorization
and ``need to know.'' This discrepancy raises an interesting question:
Does the hacker ethic reflect a growing force in society that stands
for greater sharing of resources and information -- a reaffirmation
of basic values in our constitution and laws?  It is important that
we examine the differences between the standards of hackers, systems
managers, users, and the public.  These differences may represent
breakdowns in current practices, and may present new opportunities
to design better policies and mechanisms for making computer resources
and information more widely available.

The sentiment for greater information sharing is not restricted to
hackers.  In the best seller, ``Thriving on Chaos,'' Tom Peters
(Peters87) writes about sharing within organizations: ``Information
hoarding, especially by politically motivated, power-seeking staffs,
has been commonplace throughout American industry, service and
manufacturing alike.  It will be an impossible millstone around the
neck of tomorrow's organizations.  Sharing is a must.''  Peters argues
that information flow and sharing is fundamental to innovation and
competitiveness.  On a broader scale, Peter Drucker (Drucker89) says
that the ``control of information by government is no longer possible.
Indeed, information is now transnational.  Like money, it has no
`fatherland.' ''

Nor is the sentiment restricted to people outside the computer security
field.  Harry DeMaio (DeMaio89) says that our natural urge is to
share information, and that we are suspicious of organizations and
individuals who are secretive.  He says that information is exchanged
out of ``want to know'' and mutual accommodation rather than ``need
to know.''  If this is so, then some of our security policies are
out of step with the way people work.  Peter Denning (DenningP89)
says that information sharing will be widespread in the emerging
worldwide networks of computers and that we need to focus on ``immune
systems'' that protect against mistakes in our designs and recover
from damage.

I began my investigation of hackers with the question, who are they
and what is their culture and discourse?  My investigation uncovered
some of their concerns, which provided the organizational structure
to this paper, and several suggestions for new actions that might
be taken.  My investigation also opened up a broader question:  What
conflict in society do hackers stand at the battle lines of?  Is
it owning or restricting information vs. sharing information -- a
tension between an age-old tradition of controlling information as
property and the Englightenment tradition of sharing and disseminating
information?  Is it controlling access based on ``need to know,''
as determined by the information provider, vs. ``want to know,''
as determined by the person desiring access?   Is it law enforcement
vs. freedoms granted under the First and Fourth Amendments?  The
answers to these questions, as well as those raised by Barlow on
the nature of information and free speech, are important because
they tell us whether our policies and practices serve us as well
as they might.  The issue is not simply hackers vs. system managers
or law enforcers; it is a much larger question about values and
practices in an information society.


Acknowledgments

I am deeply grateful to Peter Denning, Frank Drake, Nathan Estey,
Katie Hafner, Brian Harvey, Steve Lipner, Teresa Lunt, Larry Martin,
Gordon Meyer, Donn Parker, Morgan Schweers, Richard Stallman, and
Alex for their comments on earlier versions of this paper and helpful
discussions; to Richard Stallman for putting me in contact with
hackers; John Draper, Geoff Goodfellow, Brian Reid, Eugene Spafford,
Dave, Marcel, Mike, RGB, and the hackers for helpful discussions;
and Richard Pethia for a summary of some of his experiences at CERT.
The opinions expressed here, however, are my own and do not necessarily
represent those of the people mentioned above or of Digital Equipment
Corporation.


References


ACM90
  ``Just say no,'' Comm. ACM, Vol. 33, No. 5, May 1990, p. 477.

Baird87
  Bruce J. Baird, Lindsay L. Baird, Jr., and Ronald P. Ranauro, ``The
  Moral Cracker?,'' Computers and Security, Vol. 6, No. 6, Dec. 1987,
  p. 471-478.

Barlow90
  John Barlow, ``Crime and Puzzlement,'' June 1990, to appear in Whole
  Earth Review.

Corley89
  Eric Corley, ``The Hacking Fever,'' in Pamela Kane, V.I.R.U.S.
  Protection, Bantam Books, New York, 1989, p. 67-72.

DeMaio89
  Harry B. DeMaio, ``Information Ethics, a Practical Approach,''
  Proc. of the 12th National Computer Security Conference, 1989,
  p. 630-633.

DenningP89
  Peter J. Denning, ``Worldnet,'' American Scientist, Vol. 77, No. 5,
  Sept.-Oct., 1989.

DenningP90
  Peter J. Denning, Computers Under Attack, ACM Press, 1990.

Dibbel90
  Julian Dibbel, ``Cyber Thrash,'' SPIN, Vol. 5, No. 12, March 1990.

Drucker89
  Peter F. Drucker, The New Realities, Harper and Row, New York, 1989.

Felsenstein86
  Lee Felsenstein, ``Real Hackers Don't Rob Banks,'' in full report on
  ACM Panel on Hacking (Lee86).

Frenkel87
  Karen A. Frenkel, ``Brian Reid, A Graphics Tale of a Hacker
  Tracker,'' Comm. ACM, Vol. 30, No. 10, Oct. 1987, p. 820-823.

Goldstein89
  Emmanuel Goldstein, ``Hackers in Jail,'' 2600 Magazine, Vol. 6, No. 1,
  Spring 1989.

Goldstein90
  Emmanuel Goldstein, ``For Your Protection,'' 2600 Magazine, Vol. 7,
  No. 1, Spring 1990.

Goodfellow83
  Geoffrey S. Goodfellow, ``Testimony Before the Subcommittee on
  Transportation, Aviation, and Materials on the Subject of
  Telecommunications Security and Privacy,'' Sept. 26, 1983.

Hafner90
  Katie Hafner, ``Morris Code,'' The New Republic, Feb. 16, 1990,
  p. 15-16.

Harpers90
  ``Is Computer Hacking a Crime?" Harper's, March 1990, p. 45-57.

Harvey86
  Brian Harvey, ``Computer Hacking and Ethics,'' in full report on
  ACM Panel on Hacking (Lee86).

HollingerLanza-Kaduce88
  Richard C. Hollinger and Lonn Lanza-Kaduce, ``The Process of
  Criminalization: The Case of Computer Crime Laws,'' Criminology,
  Vol. 26, No. 1, 1988, p. 101-126.

Huebner89
  Hans Huebner, ``Re: News from the KGB/Wiley Hackers,'' RISKS Digest,
  Vol. 8, Issue 37, 1989.

Landreth89
  Bill Landreth, Out of the Inner Circle, Tempus, Redmond, WA, 1989.

Lee86
  John A. N. Lee, Gerald Segal, and Rosalie Stier, ``Positive
  Alternatives: A Report on an ACM Panel on Hacking,'' Comm. ACM,
  Vol. 29, No. 4, April 1986, p. 297-299; full report available from
  ACM Headquarters, New York.

Levy84
  Steven Levy, Hackers, Dell, New York, 1984.

Markoff90
  John Markoff, ``Self-Proclaimed `Hacker' Sends Message to Critics,''
  The New York Times, March 19, 1990.

Markoff90a
  John Markoff, ``Drive to Counter Computer Crime Aims at Invaders,''
  The New York Times, June 3, 1990.

Martin89
  Larry Martin, ``Unethical `Computer' Behavior: Who is Responsible?,''
  Proc. of the 12th National Computer Security Conference, 1989.

Meyer89
  Gordon R. Meyer, The Social Organization of the Computer Underground,
  Master's thesis, Dept. of Sociology, Northern Illinois Univ., Aug.
  1989.

MeyerThomas90
  Gordon Meyer and Jim Thomas, ``The Baudy World of the Byte Bandit:
  A Postmodernist Interpretation of the Computer Underground,'' Dept.
  of Sociology, Northern Illinois Univ., DeKalb, IL, March 1990.

Peters87
  Tom Peters, Thriving on Chaos, Harper & Row, New York, Chapter VI, S-3,
  p. 610, 1987.

Spafford89
  Eugene H. Spafford, ``The Internet Worm, Crisis and Aftermath,''
  Comm. ACM, Vol. 32, No. 6, June 1989, p. 678-687.

Stallman84
  Richard M. Stallman, Letter to ACM Forum, Comm. ACM, Vol. 27,
  No. 1, Jan. 1984, p. 8-9.

Stallman90
  Richard M. Stallman, ``Against User Interface Copyright'' to appear
  in Comm. ACM.

Steele83
  Guy L. Steele, Jr., Donald R. Woods, Raphael A. Finkel, Mark R.
  Crispin, Richard M. Stallman, and Geoffrey S. Goodfellow,  The
  Hacker's Dictionary, Harper & Row, New York, 1983.

Stoll90
  Clifford Stoll, The Cuckoo's Egg, Doubleday, 1990.

Thomas90
  Jim Thomas, ``Review of The Cuckoo's Egg,'' Computer Underground
  Digest, Issue #1.06, April 27, 1990.

ThomasMeyer90
  Jim Thomas and Gordon Meyer, ``Joe McCarthy in a Leisure Suit:
  (Witch)Hunting for the Computer Underground,''  Unpublished
  manuscript, Department of Sociology, Northern Illinois University,
  DeKalb, IL, 1990; see also the Computer Underground Digest, Vol.
  1, Issue 11, June 16, 1990.

_______________________________________________________________________________

AOH Site layout & design copyright © 2006 AOH