Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 01 Issue 19

  



****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.19 (June 26, 1990) **
** SPECIAL ISSUE: MALICE IN WONDERLAND: THE E911 CHARGES **
****************************************************************************

MODERATORS: Jim Thomas (Sole moderator: Gordon Meyer on vacation)
REPLY TO: TK0JUT2@NIU.bitnet

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------

This issue is the concept outline of one section of a paper to be submitted
to the Midwest Sociological Society's annual meetings in 1991 and will
ultimately be submitted for publication. The intent of the paper is to
develop a discourse analysis of how "social facts" are given "legal
meanings." The saliency of the current crackdown on alleged "computer
crime" seems an excellent way of tapping the clash between new meanings and
old definitions, and how courts become the battlefield for over these
meanings.
This draft is not copy-protected and may be used as appropriate.
The prose and ideas here remain tentative and incomplete, and will be refined.
It is circulated for conceptual, theoretical, and bibliographic
comments.

********************************************************************



THE SECRET SERVICE, E911, AND LEGAL RHETORIC:
MALICE IN WONDERLAND?


Jim Thomas
Department of Sociology
Northern Illinois University
DeKalb, IL 60115
(28 June, 1990)






________
Concept outline for larger paper to be submitted at the Midwest
Sociological Society annual meetings, 1991.




THE SECRET SERVICE, E911, AND LEGAL RHETORIC:
MALICE IN WONDERLAND?

"When I use a word," Humpty Dumpty said, in rather a scornful
tone, "it means just what I choose it to mean--neither more nor
less."

"The question is," said Alice, "whether you can make words mean
so many different things."

"The question is," said Humpty Dumpty, "which is to be
master--that's all" (Carroll, 1981: 169).


Law is more than simply assuring public order. It is also, as White (1984)
argues, "action with words." The rhetoric of law is played out in the
drama of the courtroom, and the denouement of the play is scripted by the
language of statutory and case law, indictments, and the talk of the
courtroom performers (Nichols, 1990; Thomas, 1983, 1989).

- 1 -


Part of this language game involves a battle over competing definitions,
meanings, and nuances that may be unrelated to "facts," and instead
replaces facts with rhetoric, or a style of persuasion. The language of
indictments and how evidence is presented provides one window through which
to observe this rhetorical battle. Indictments are the means by which a
"bad act" is transformed into a formally sanctionable one by creatively
linking the act to the law that it ostensibly violates. A recent federal
indictment of an alleged computer hacker provides on example (U.S. v. Rigs
and Neidorf, 90-CR-0070, Northern District of Illinois, Eastern Division).
(For a background on the issues involved, see especially Barlow, (1990),
Denning, (1990), Goldstein, (1990), Markoff, (1990), and Schwartz (1990).

This outline is divided into two parts. Section one first presents formal
"indictment talk" and that to which it speaks. The second section, not
included here, will provide a semiotic/deconstructionist analysis.

The indictment begins with a degradation game, one in which the credibility
and character of the defendant is attacked because of a presumed deviant
behavior and association with deviant groups. The goal is to stigmatize
hackers such that prejudicial meanings are imposed. It is a clever
linguistic trick that creates a tautology that defines the guilt of the
defendant by recursing back to the allegation in a manner that produces
linguistic "evidence of guilt." This would be analogous to calling an
alleged murder a "murderer" in court, rather than requiring that the label
must first be demonstrated to be true. In short, the "thing" becomes the
"name:"
- 2 -



5. _Computer Hackers_ - As used here, computer hackers are
individuals involved with the unauthorized access of computer
systems by various means. Computer hackers commonly identify
themselves by aliases or "hacker handles" when communicating with
other hackers.

The rhetoric first attempts to transform the conventional and broader image
of "hacker" into one that is malignant in a way that will allow anyone
associated with the label to be, by definition, stigmatized as a criminal.
Yet, there is considerable evidence that the term does not, in itself,
refer to an illegal activity, and that many who consider themselves
"computer hackers" do not engage in computer trespass, whether unauthorized
or not.

The assumption that all computer hackers are intent on committing criminal
trespass or fraud distorts the nature of the activity. Only the most
extreme examples come to the attention of law enforcement officials and the
public, and this obscures the complexity both of hacking and of the CU. In
its broadest sense, hacking is the dual process of obtaining and using
sufficient mastery of computers and programs to allow resolution of a
computer problem for which no previous knowledge or guidance exists. The
Hacker's Dictionary, a text file widely circulated on BBSs, provides this
definition:


- 3 -


HACKER %originally, someone who makes furniture with an axe% n.
1. A person who enjoys learning the details of programming
systems and how to stretch their capabilities, as opposed to most
users who prefer to learn only the minimum necessary. 2. One who
programs enthusiastically, or who enjoys programming rather than
just theorizing about programming. 3. A person capable of
appreciating hack value (q.v.). 4. A person who is good at
programming quickly. Not everything a hacker produces is a hack.
5. An expert at a particular program, or one who frequently does
work using it or on it; example: "A SAIL hacker". (Definitions 1
to 5 are correlated, and people who fit them congregate.) 6. A
malicious or inquisitive meddler who tries to discover
information by poking around. Hence "password hacker", "network
hacker".

A computer programmer's attempt to help a colleague enter a system when a
password has been lost or forgotten, de-bugging a copyright software
program, or testing a system's security are examples for which a benign
form of hacking is both required and considered acceptable. Nonetheless,
this deceptive definition was successful, for it convinced Judge Nicholas
Bua that the prosecutor's definition was the most common, would be unlikely
to confuse a jury, and was not prejudicial (See Memorandum Order in CuD
1.16).

Another rhetorical ploy in this same passage is the attempt to connect the
use of aliases with deviant activity. Pseudonyms are widely used on BBSs,
and their use reflects a cultural practice including, but hardly limited
to, members of the computer underground. Yet, clever rhetorical twists
distort the cultural meaning and impute to it one totally at odds with
reality by playing on the myth that pseudonyms reflect attempts to hide
"bad acts."

- 4 -


A third rhetorical ploy in this section of the indictment associates the
defendant with a loosely connected group known as "Legion of Doom," which
was a small collection of people who shared technical knowledge between
themselves and others. Without presenting any evidence whatsoever, and
without citing an indictment, on-going case, or justifying the claims, the
indictment asserts that the group was "closely knit" and involved in
disrupting telecommunications, bank fraud and other serious felonious
behavior. Because of its amorphous nature and ambiguous boundaries
defining "affiliation," the indictment's language offers little means to
resist the imposition of its "legal meaning:"

6. _Legion of Doom_ - As used here the Legion of Doom
(LOD) was a closely knit group of computer hackers involved in:
a. Disrupting telecommunications by entering
computerized telephone switches and changing
the routing on the circuits of the computerized
switches.
b. Stealing proprietary computerized information
from companies and individuals.
c. Stealing and modifying credit information on
individuals maintained in credit bureau
computers.
d. Fraudulently obtaining money and property from
companies by altering the computerized
information used by the companies.
e. Sharing information with respect to their
methods of attacking computers with other
computer hackers in an effort to avoid law
enforcement agencies and telecommunication
experts from focusing on them, alone.


- 5 -


The indictment itself focuses on the alleged "theft" and dissemination of
an E911 document from Bell South. Although those close to the case indicate
that only a small portion of a training document was at issue, the language
of the indictment attempts to link this document and its possession and
dissemination to severe threats to the commonweal:

22. It was further part of the scheme that on or about
February 24, 1989 defendant NEIDORF disseminated the disguised E911
text file in issue 24 of "PHRACK" newsletter.

23. It was further part of the scheme that the
defendant NEIDORF would disseminate and disclose this information to
others for their own use, including to other computer hackers who
could use it to illegally manipulate the emergency 911 computer
systems in the United States and thereby disrupt or halt 911 service
in portions of the United States.

Such rhetoric raises the spectre of people dying, and one news story
actually wrote that there was no evidence of any deaths as the result of
the behavior, thus re-inforcing the apparent danger to the public. The
rhetoric sounds serious. But, what in fact is the evidence? The PHRACK
file reprinted here is as it appeared in the original issue. The
indictment indictates it *IS NOT* the same as the one that has allegedly
been stolen, because it has been "edited," "retyped," and "disguised."

- 6 -


--------------------------------------------------------------------

==Phrack Inc.==

Volume Two, Issue 24, File 6 of 13


E911 - Enhanced 911: Features available include selective routing,
selective transfer, fixed transfer, alternate routing, default
routing, Automatic Number Display, Automatic Location
Identification, night service, default routing, call detail
record.

End Office - Telephone central office which provides dial tone to the
subscriber calling 911. The "end office" provides ANI
(Automatic Number Identification) to the tandem office.

Tandem Office - Telephone central office which serves as a tandem (or
hub) for all 911 calls. Must be a 1AESS type of
central office. The tandem office translations
contain the TN/ESN relationships which route the 911
call to the proper SAP. The tandem office looks up
the ANI (TN) that it receives from the end office and
finds the ESN (routing information) which corresponds
to a seven digit number ringing in at a PSAP.

PSAP - Public Safety Answering Point, usually the police, fire and/or
rescue groups as determined by the local municipalities. A
"ringing" will not have ANI or ALI capabilities, but just
receives calls or transferred calls from another PSAP.

ESN - Emergency Service Number (XXX) that is assigned to the
subscriber's telephone number in the tandem office translations
The ESN represents a seven digit number by which the tandem
office routes the call to the proper PSAP. PSAPs with ALI
capabilities also receive a display of the ESN information which
shows which police, fire and rescue agency serves the telephone
number calling 911. An ESN is a unique combination of police,
fire, and rescue service for purposes of routing the E911 call.

ANI - Automatic Number Identification corresponds to the subscriber's
seven digit telephone number. The ANI displays at the PSAP on
the digital ANI display console.

ALI - Automatic Location Identification provides for an address
display of the subscriber calling 911. With ALI, the PSAP
receives the ANI display and an ALI display on a screen. The
ALI display includes the subscriber's address, community, state,
type of service and if a business, the name o the business. The
PSAP will also get a display of the associated ESN information
(police, fire, rescue).

Selective Routing - The capability to route a call to the particular
PSAP serving the address associated with the TN
making the 911 call. Selective routing is
achieved by building TN/ESN translations in the
tandem central office. These translations are
driven by the E911 data base which assign the ESN
to each telephone number based on the customer's
address. Service order activity keeps the E911
data base updated. The E911 data base, in turn,
generates recent change to the tandem office
(through the SCC or RCMAC) to update the TN/ESN
translations in the tandem data base.

Selective Transfer - Provides the PSAP with the ability to transfer
the incoming 911 call to a fire or rescue service
for the particular number calling 911 by pushing
one button for fire or rescue. For example, if
an incoming 911 call was reporting a fire, the
PSAP operator would push the fire button on the
ANI console; the call would go back to the tandem
office, do a lookup for the seven digit number
associated with fire department, for the ESN
assigned to the calling TN, and automatically
route the call to that fire department. This
differs from "fixed" transfer which routes every
call to the same fire or rescue number whenever
the fire or rescue button is pushed. The PSAP
equipment is optioned to provide either fixed or
selective transfer capabilities.

Alternate Routing - Alternate routing provides for a predetermined
routing for 911 calls when the tandem office is
unable to route the calls over the 911 trunks for
a particular PSAP due to troubles or all trunks
busy.

Default Routing - Provides for routing of 911 calls when there is an
ANI failure. The call will be routed to the
"default" ESN associated with the he NNX the caller
is calling from. Default ESNs are preassigned in
translations and are usually the predominant ESN for
a given wire center.

Night Service - Night service works the same as alternate routing in
that the calls coming into a given PSAP will
automatically be routed to another preset PSAP when
all trunks are made busy due to the PSAP closing down
for the night.

Call Detail Record - When the 911 call is terminated by the PSAP
operator, the ANI will automatically print-out on
the teletypewriter located at the PSAP. The
printout will contain the time the call came into
the PSAP, the time it was picked up by an
operator, the operator number, the time the call
was transferred, if applicable, the time the call
was terminated and the trunk group number
associated with the call. Printouts of the ALI
display are now also available, if the PSAP has
purchased the required equipment.

ANI Failure - Failure of the end office to identify the call and
provide the ANI (telephone number) to the tandem office;
or, an ANI failure between the tandem office and the
PSAP.

Misroute - Any condition that results in the 911 call going to the
wrong PSAP. A call can be misrouted if the ESN and
associated routing information are incorrect in the E911
data base and/or tandem data base. A call can also be
misrouted if the call is an ANI failure, which
automatically default routes.

Anonymous Call - If a subscriber misdials and dials the seven digit
number associated with the PSAP position, they will
come in direct and ANI display as 911-0000 which will
ALI as an anonymous call. The seven digit numbers
associated with the PSAP positions are not published
even to the PSAPs.

Spurious 911 Call - Occasionally, the PSAP will get a call that is not
associated with a subscriber dialing 911 for an
emergency. It could be a subscriber who has not
dialed 911, but is dialing another number, or has
just picked up their phone and was connected with
the PSAP. These problems are equipment related,
particularly when the calls originate from
electromechanical or step by step offices, and are
reported by the E911 Center to Network Operations
upon receipt of the PSAP inquiry reporting the
trouble. The PSAP may get a call and no one is
there; if they call the number back, the number
may be disconnected or no one home Again these are
network troubles and must be investigated.
Cordless telephones can also generate "spurious"
calls in to the PSAPs. Generally, the PSAP will
hear conversation on the line, but the subscribers
are not calling 911. The PSAP may report spurious
calls to to repair if they become bothersome, for
example, the same number ringing in continually.

No Displays - A condition where the PSAP ALI display screen is blank.
This type of trouble should be reported immediately to
the SSC/MAC. If all screens at the PSAP are blank, it
is an indication that the problem is in the circuits
from the PSAP to the E911 computer. If more than one
PSAP is experiencing no display, it may be a problem
with the Node computer or the E911 computer. The
SSC/MAC should contact the MMOC to determine the health
of the HOST computer.

Record Not Found - If the host computer is unable to do a look up on a
given ANI request from the PSAP, it will forward a
Record Not Found message to the PSA ALI screen.
This is caused by service order activity for a
given subscriber not being processed into the E911
data base, or HOST computer system problems whereby
the record cannot be accessed at that point in time.

No ANI - This condition means the PSAP received a call, but no
telephone number displayed on the ANI console. The PSAP
should report this condition immediately to the SSC/MAC.

PSAP Not Receiving Calls - If a PSAP cannot receive calls or request
retrieval from the E911 host computer,
i.e., cable cut, the calls into that PSAP
must be rerouted to another PSAP. The
Switching Control Center must be notified
to reroute the calls in the tandem office
E911 translations.

MSAG - Master Street Address Guide. The MSAG ledgers are controlled
by the municipality which has purchased the E911 ALI service,
in that they assign which police, fire or rescue agency will
serve a given street an number range. They do this by
assigning an ESN to each street range, odd, even, community
that is populated in the county or municipality served. These
MSAGs are then used as a filter for service order activity into
the E911 computer data base to assign ESNs to individual TN
records. This insures that each customer will be routed to the
correct agency for their particular address. In a non-ALI
County, TAR codes are used by the Telephone company to assign
ESNs to service conductivity and the County does not control
the ESN assignment. TAR codes represent the taxing authority
for the given subscriber which should correspond to their
police, fire and rescue agencies. The MG method, of course, is
more accurate because it is using the actual service address of
the customer to route the call and provides the county with
more flexibility in assigning fire and rescue district, etc The
Customer Services E911 Group maintains the E911 computer data
base and interfaces with the County (customer) on all MSAG or
data base activity.
___________________________________________________________________________

What in fact is this document? It is simply a partial glossary available
from other sources, and hardly of any technical value. It presents 22
terms, six of which are found in at least one public book (e.g., Ambrosch,
Maher and Sasscer, 1989), and the rest found either in the text of that
work (see esp. Chapter 9) or readily found elsewhere. Further, if this
document can be deciphered as potentially dangerous, then what is one to
make of the Amborsch, Maher and Sasscer volume itself, which not only
provides several hundred definitions, but also includes detailed technical
information and diagrams about the operation, administration, and
functioning of Bell systems? There is nothing in the PHRACK document, or in
any of the so-called "phreak/hacker" magazines that is not available in
more detail from any work found in the classroom or library.

A cursory reading of Ambrosch, Maher, and Sasscer (1989) provides
references to many of these definitions, and we have seen others in the
"chat" section of public BBSs. Below we provide a sample of terms readily
available to the public. Those without a reference are either common terms
or are readily deducible from the referenced items:

Alternate Routing
Anonymous Call
- 14 -


ALI (Glossary, 285; pp 173-175; throughout)
ANI (Glossary, p. 285 and throughout)
ANI Failure
Call Detail Record
Default Routing (referenced on p. 166)
End Office (Standard communications term)
ESN
E911 (Standard definition, ubiquitous)
Misroute
MSAG (Definition found on BBSs)
Night Service
No ANI
No Displays
PSAP (Glossary, p. 287)
PSAP Not Receiving Calls
Record Not Found
Selective Routing (reference on p. 166)
Selective Transfer
Spurious 911
Tandem Office

Despite the banality of these terms, the indictment's discourse was
sufficiently clever to convince Judge Bua that the information was indeed
"valuable," and "confidential," and despite its public availability, is
"property" that deprives Bell South of "something of value." However, the
judge seems taken in by the chicanery of the prosecutor's linguistic

- 15 -


distortion that manipulates the symbols of PHRACK's style to create an
alternative reality that is, at best, questionable. Consider, for example,
the following passage. First assume it appears in a scholarly article
explaining the basic service of E911:

With the non-IN Emergency Response Service (ERS), the caller
dials a special emergency number (very short, usually three
digits) which is uniform within a country, (for example, 911 in
the USA, and in West Germany 110/0110 for police and 112/0112 for
fire or ambulance) (Ambrosch, Maher and Sasscer, 1989: 162).

Now, re-frame the same passage, but preface it with a sentence like: "At
the last hackers' convention, Holly Hackwood described the E911 basic
service like this: (and now re-read the passage)." Is the E911 document
illegal when published in PHRACK (for that is what the indictment charges),
but legal when published in a library book or a research paper? The point
is that it is not only possession of public information that is being
prosecuted, but the manner in which the symbols are packaged.

In CuD 1.17, we cited a California law that makes it a felony to merely
POSSESS certain types of information, whether that information is used or
communicated to others or not. The "crime" of the "hacker" seems to be not
only possession of information freely available to the public, but also of
presenting relatively innocuous information in the discourse of an
anti-establishment ethos. More simply, the "crime" is that of speaking a
different language than law enforcement officials who seem willing to
distort that language with rhetorical ploys of their own.
- 16 -



White (1984) suggests that, in legal discourse, "words lose their meaning"
and that law is as much a language game as it is the application of
statutes and cases to behavior. The resulting danger is that language
becomes a weapon to subvert freedom of speech. In an era when most people
are not "culturally literate" in the nuances of techno-speak, the ease of
distortion puts defendants at risk in bench or jury trials where a common
framework of meaning is intentionally obscured in the battle over symbolic
terrain. In the next section the language of law as reflected in the
indictment will be "deconstructed," and the logic and imagery made more
apparent.
(End this section)

BIBLIOGRAPHY

Ambrosch, W.D., A. Maher and B. Sasscer (Eds.). 1989. The Intelligent
Network: A Joint Study by Bell Atlantic, IBM and Siemens. Berlin:
Springer-Verlag.

Barlow, John Perry. 1990 (forthcoming). "Crime and Puzzlement." The
Whole Earth Review.

Denning, Dorothy. 1990. "Concerning Hackers Who Break into Computer
Systems." Paper presented at the 13th National Computer Security
Conference, Washington, D.C., Oct. 1-4.
- 17 -



Goldstein, Emmanuel. 1990. Editorial Commentary on "Operation Sun Devil."
2600 Magazine, /Spring.

Markoff, John. 1990. "Drive to Counter Computer Crime Aims at Invaders."
The New York Times, /June 3: 1, 21.

Nichols, Lawrence T. 1990 (forthcoming). "Discovering Hutton: Expression
Gaming and Congressional Definitions of Deviance." Pp. *-* in N. Denzin
(ed.), Studies in Symbolic Interaction, Vol. 11. Greenwich (Conn.): JAI
Press.

Thomas, Jim. 1989. Prisoner Litigation: The Paradox of the Jailhouse
Lawyer. Totowa (N.J.), Aldine.

_____. 1983. "Justice as Interaction:: Loose Coupling and Mediations in
the Adversary Process." Symbolic Interaction, 6(Fall): 243-260.

White, James Boyd. 1984. When Words Lose their Meaning: Constitutions and
Reconstructions of Language, Character, and Community. Chicago: University
of Chicago Press.



!

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...

guest's profile picture
@guest
2 Nov 2024
What is certain is that the first Greek geographer to clearly place the Pillars of Hercules at Gibraltar was Eratosthenes (who lived between ...

guest's profile picture
@guest
1 Nov 2024
Disquieting thc drinks has been quite the journey. As someone keen on unpretentious remedies, delving into the in every respect of hemp has ...

guest's profile picture
@guest
29 Oct 2024
hi Good day I am writing to inform you of recent developments that may impact our ongoing operations. This morning, global news outlets hav ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT