FREE BOOKS

Author's List




PREV.   NEXT  
|<   109   110   111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133  
134   135   136   137   138   139   140   141   142   143   144   145   146   147   148   149   150   151   152   153   154   155   156   157   158   >>   >|  
agined in private hands. How do you keep people disposable, yet assure their awestruck respect for your property? It was a dilemma. Much UNIX code was public-domain, available for free. Much "proprietary" UNIX code had been extensively re-written, perhaps altered so much that it became an entirely new product--or perhaps not. Intellectual property rights for software developers were, and are, extraordinarily complex and confused. And software "piracy," like the private copying of videos, is one of the most widely practiced "crimes" in the world today. The USSS were not experts in UNIX or familiar with the customs of its use. The United States Secret Service, considered as a body, did not have one single person in it who could program in a UNIX environment--no, not even one. The Secret Service WERE making extensive use of expert help, but the "experts" they had chosen were AT&T and Bellcore security officials, the very victims of the purported crimes under investigation, the very people whose interest in AT&T's "proprietary" software was most pronounced. On February 6, 1990, Terminus was arrested by Agent Lewis. Eventually, Terminus would be sent to prison for his illicit use of a piece of AT&T software. The issue of pirated AT&T software would bubble along in the background during the war on the Legion of Doom. Some half-dozen of Terminus's on-line acquaintances, including people in Illinois, Texas and California, were grilled by the Secret Service in connection with the illicit copying of software. Except for Terminus, however, none were charged with a crime. None of them shared his peculiar prominence in the hacker underground. But that did not mean that these people would, or could, stay out of trouble. The transferral of illicit data in cyberspace is hazy and ill-defined business, with paradoxical dangers for everyone concerned: hackers, signal carriers, board owners, cops, prosecutors, even random passers-by. Sometimes, well-meant attempts to avert trouble or punish wrongdoing bring more trouble than would simple ignorance, indifference or impropriety. Terminus's "Netsys" board was not a common-or-garden bulletin board system, though it had most of the usual functions of a board. Netsys was not a stand-alone machine, but part of the globe-spanning "UUCP" cooperative network. The UUCP network uses a set of Unix software programs called "Unix-to-Unix Copy," which allows Unix systems to thr
PREV.   NEXT  
|<   109   110   111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133  
134   135   136   137   138   139   140   141   142   143   144   145   146   147   148   149   150   151   152   153   154   155   156   157   158   >>   >|  



Top keywords:

software

 

Terminus

 
people
 

Secret

 

Service

 

illicit

 

trouble

 
network
 

private

 

crimes


Netsys

 

proprietary

 

copying

 
experts
 
property
 

underground

 

transferral

 
cyberspace
 

acquaintances

 

including


Illinois
 

Legion

 
California
 

grilled

 

shared

 

peculiar

 

prominence

 

charged

 

connection

 
Except

hacker

 

prosecutors

 

functions

 
machine
 

system

 
impropriety
 
common
 

garden

 

bulletin

 
systems

called

 
programs
 
spanning
 

cooperative

 

indifference

 

ignorance

 

carriers

 
signal
 
owners
 

background