home *** CD-ROM | disk | FTP | other *** search
- ------------------------------
-
- From: Moderators
- Subject: A Few Observations on Prodigy
- Date: 8 May, 1991
-
- ********************************************************************
- *** CuD #3.16: File 6 of 6: A Few Observations on Prodigy ***
- ********************************************************************
-
-
- Prodigy customers can decide for themselves whether they are satisfied
- with the service, and the internal policies of a commercial system are
- normally of little direct CU interest. Here, however, we see at least
- two issues that potentially touch the rest of us.
-
- First, whatever the inadequacy of Prodigy's software or the tarnish on
- their public image, the stage.dat case raises the same issues that
- "hackers" have been raising for over a year. The legitimate concerns
- of users regarding the potential danger to privacy seem over-ridden by
- the same hysteria and "lynch mob" mentality that has accompanied law
- enforcement attention to the CU. Prodigy may not be the most
- sympathetic of victims, but they seem to be victimized by the same
- excesses, this time from the private sector, as other individuals
- received from law enforcement. Prodigy management may not handle its
- crises well, but this is not a crime, and using a flaw in a program to
- impute broader motives reminds us of how prosecutors distorted the
- significance of the E911 files, how AT&T fabricated the value of
- "losses," or how prosecutors creatively misconstrued facts or legal
- language to finagle a version of reality to their liking.
-
- A second issue, one more chilling, was raised by Emmanuel Goldstein of
- 2600 Magazine. If user-interface software can access information ona
- hard drive, consider this scenario: A serial killer is suspected of
- being a computerophile. A "psychological profile" has narrowed down
- possible suspects who may have an account on a system (like Prodigy)
- that essentially takes temporary control of a system while the user is
- logged on. Under existing law, can investigators use such such
- systems to "invade" the hard drives of suspects looking for potential
- evidence? And, if so, how can this evidence be used? Now, substitute
- "serial killer" for "hacker," "pirate," or "marijuana user."
-
- Take another example. If the Secret Service engages in video taping of
- the kind it did in Summercon '88 without significant public outcry,
- how hard would it be to engage in comparable monitoring of "suspects"
- hard drives? We have seen from Sun Devil and other operations (eg,
- Steve Jackson Games) how easily search or seizure affidavits can
- distort "reality." A year ago we would have thought the possibility of
- hard drive snooping absurd. But, we also would have disbelieved that
- the SS would poke holes in motel rooms to video tape 15 hours of
- people eating pizza and drinking beer.
-
- The crucial question of Prodigy's stage.dat is not an individual
- company's policies, but rather the ability for such programs to be
- used by those with the power to abuse it.
-
- ********************************************************************
- **END OF CuD #3.16**
- ********************************************************************
-
-