home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Nov 22, 1992 Volume 4 : Issue 60
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Eater: Etaion Shrdlu, Junior
-
- CONTENTS, #4.60 (Nov 22, 1992)
- File 1--A Bird's-eye view of the Pumpcon Problem
- File 2--We Must Defend our Rights Ourselves!
- File 3--Re: CPSR Platform and You
- File 4--2600 Allegations Require Collective Response
- File 5--Creative Computing for College
- File 6--Another view of Software Piracy
- File 7--Piracy Declines
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from America Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
- Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
- anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
- /pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
- (192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
- in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail
- server at mailserv@batpad.lgb.ca.us.
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Fri, 20 Nov 1992 06:32:21
- From: Iwasthere@when.down.it.com
- Subject: File 1--A Bird's-eye view of the Pumpcon Problem
-
- ********** PUMPCON BUSTED!!! ***********
- 10/31/92
- written by someone who was there
- who wishes to remain anonymous
-
- NOTICE: The word "Hacker" is used frequently throughout this file -
- it is to be interpreted as "a computer literate person", and
- NOT as "someone who engages in illegal activities using a
- computer".
-
- Friday, October 30, Pumpcon began, at the Courtyard of the Marriott,
- in Greenburgh, NY. All in all, about 30 hackers showed up, and had a
- great time. At least until the evening of Oct. 31st, when 8-10
- members of the Greenburgh police force showed up and raided the Con.
- At the time of the raid, there were between 20 and 25 hackers in the
- hotel. 3 of the 4 rooms rented by Con attendees were raided. All the
- occupants of these rooms were taken to a conference room, and then
- another hotel room (255) where they were held approximately 6-8 hours
- for questioning.
-
- The police all came in unmarked police cars, and parked on all 4 sides
- of the hotel. No one noticed they were there, until they were
- standing in the hall where all 4 rooms were located. The officers
- stood in the hall outside the doors, but did not enter the rooms right
- away. They waited about five minutes, for some unknown reason, which
- was just enough time for them to be noticed by the hackers in at least
- one of the rooms. Unfortunately, there was no way the hackers in one
- room could warn the other rooms - the fone lines were busy, and the
- cops in the hall kinda left the "walk down and tell 'em in person"
- option out.
-
- The police produced copies of a search warrant to search rooms 246,
- 233, and 237. Room 246 was the one where everyone was hanging out; it
- was pretty much THE room. It was where the computers were located,
- and where most of the Con attendees were 99% of the time. The other
- two rooms were rented by attendees of the con, and were simply used
- for sleeping quarters.
-
- Before too long, the police entered the rooms, and began rounding up
- people. My recollection of this time period is a bit faint, and I
- don't remember all the minute details. All I know is that we all
- ended up in a conference room, and then room 255.
-
- A few hackers who had been out driving around during the time of the
- bust returned a few hours later, and when they were seen by police,
- they were immediately taken to 255 and questioned. (They were walking
- down the hall, when a cop appeared, and told them to step into a room)
- The cops asked them if they were hackers, and when they didn't answer,
- one police officer reached into the coat pocket of one of the people,
- and produced an auto dialer. This in itself was enough to send the
- three to room 255, where the rest of the hackers were being held for
- questioning. My question to you - isn't that just a bit illegal?
- Bodily search without probable cause OR a warrant? Ooops - I'm
- forgetting - we're HACKERS! We're ALL BAD! We're ALWAYS breaking the
- law. We don't have RIGHTS!
-
- Room 255 was packed. No one was allowed to smoke, and everyone was
- nervous as hell. One by one people were called to be interviewed,
- with some interviews lasting 5 minutes, others lasting 30 or 45
- minutes. Some people were sleeping, others were conversing, and still
- others were shaking, and looked like they were about to puke at any
- second. Even though the situation was quite serious, a few joked
- around, saying things like "So guys, I guess PumpCon '93 won't be held
- here, eh?".
-
- No one knew who was going to be arrested, or when they would be
- released. The 2 cops in the room with them were actually pretty cool,
- and answered any questions they could to the best of their knowledge.
- They weren't the guys in charge of the investigation; they were simply
- there to make sure we didn't leave. Of course, as friendly as they
- seemed, they were still cops...
-
- All the people who were detained were held until between 5:45 and
- 6:30 am. Four hackers were arrested, 1 because 2 of the rooms were
- registered in his name, a second because he signed for the rooms, and
- the others for previous crimes, apparently. No one knows as of yet.
- As of this message, no news on what will become of those arrested is
- known. They have not yet been arraigned. The other hackers were all
- searched, questioned, and then released pending further investigation.
- Those under the age of 18 had their parents notified.
-
- To my knowledge, there were no federal investigators there at the time
- of the bust. However, people kept mentioning the FBI and the Secret
- Service, and it is very possible that they will be called in to
- investigate. Actually, it's more than just possible, it's almost
- guaranteed. The police said that although most of those detained were
- released, there will most likely be more arrests in the near future,
- as more is learned about the alleged illegal doings.
-
- 3 computers (2 Amigas, and 1 AT&T dumb term) were confiscated, along
- with anything which looked like it could have been involved in phone
- fraud. For some odd reason, although Auto Dialers were listed on the
- search warrant, not all of them were confiscated. I actually don't
- know if ANY were, I do know that not ALL were. ;)
-
- In one of the rooms, there were about 2 dozen computer magazines which
- were apparently confiscated, although the warrant did not specify that
- magazines could be taken. But, when you're busting HACKERS, I suppose
- you can take what you want. After all, hackers are evil geniuses, and
- don't have the same rights as NORMAL criminals do.
-
- As of yet, the actual charges against the hackers are not known. The
- raid apparently stemmed because the hackers were ALLEGEDLY using
- stolen calling card numbers and/or access codes to obtain free phone
- calls. One of these card numbers or codes was rumored to have
- tripped a flag at AT&T, which alerted security personnel that something
- was possibly wrong.
-
- This assumption about the calling card fraud is made because the
- police confiscated any calling card found during their searches, and
- some of the questions they asked the detained centered entirely around
- calling card theft and use. A few other questions asked me were "Do
- you know what computer systems were accessed?", "Do you refer to each
- other with handles?", "Who was primarily responsible for this
- meeting?", and "Where did you hear about this meeting?"
-
- My interview lasted only about 10 minutes, and it started at about
- 5:50 am. Everyone was dead tired, and the cops wanted to get
- everything over with as fast as possible so they could get some sleep.
- After the interviews were over, everyone left, to wait and see what
- the next few days will bring.
-
- I am releasing this file now, to prevent any rumors from starting, and
- to try to make the outside world aware of what happened during
- PumpCon. I have left out any specific incidences and references to
- specific people as a precaution, since the investigation is only
- beginning. We were hoping to write a file of all the attendees of
- PumpCon, to share with the world the names of those who were there.
- However, as you can obviously see, that would be highly stupid. For
- anyone who WAS there who is reading this, rest assured that the
- running list of names which was kept made a very tasteless dinner for
- the one who had it in his pocket.
-
- Oh, BTW, one of the cops who was apparently in charge made a comment
- to me... he said "You can post a message on the boards telling your
- friends to stay out of Greenburgh". Well boys, you heard him -
- PumpCon '93 will be held in Greenburgh, at the Courtyard Marriott....
-
- *--------------*
-
- The following is a word for word copy of the search warrant issued to
- each person who was detained and questioned. No spelling errors were
- corrected, but I probably made a few when I typed this in. Oh well.
-
-
- TOWN of GREENBURGH POLICE DEPARTMENT
- WESTCHESTER COUNTY, NEW YORK
- ORDER OF SEARCH AND SEIZURE
- +-----
-
- ( signed here by Det. Hugh F. Gallagher #103)
- ----------------------------------------------
-
- JUSTICE COURT, TOWN OF GREENBURGH
- WESTCHESTER COUNTY, NEW YORK ORDER
- -----
- IN THE MATTER OF Room 233, 237, & 246 Westchester Marriott Courtyard
- THE APPLICATION FOR AN ORDER OF SEARCH AND SEIZURE OF: (Specify)
-
- Computers Diskettes Computer Printers
- Computer Terminals Auto Dialers Diskettes
- Calling Card Computer Systems & Wire
- Computer Printouts Disk Drives
- Modems Hand Written Notes About Credit Co.
- " " " " Computer Service.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X
-
- IN THE NAME OF THE PEOPLE OF THE STATE OF NEW YORK
-
- TO: ANY POLICE OFFICER OF THE TOWN OF GREENBURGH POLICE DEPARTMENT
-
- PROOF by affidavit having been made before me this day by
- Det.H.Gallagher #103
- ___________(Affiant) of the Town of Greenburgh Police Department that
- certain property, which is (stolen/unlawfully possessed, used to
- commit an offense...) and which constitutes evidence and tends to
- demonstrate that an offense has been committed and that a particular
- person participated in the commission of an offense will be found at
- the location captioned above.
-
- YOU ARE THEREFORE COMMANDED,
-
- ** (Between the hours of 6:AM - 9:00 PM / AT ANY TIME OF DAY OR NIGHT) **
- ** (WITHOUT GIVING NOTICE OF YOUR AUTHORITY AND PURPOSE)**
-
- TO MAKE A SEARCH of the above described (location/person)** for the
- following property: (describe fully)
-
- Room # 233, 237, & 246 of the West. Marriott Courtyard
- and all its occupants as listed on this attached affidavit.
- >><< Suspects name was written here >><<
-
- AND if any such property is found, you are hereby directed to seize
- the same and without unnecessary delay, return it to the court,
- together with this warrant and a written inventory of such property
- subscribed and sworn by you.
-
- THIS COURT DIRECTS THAT this SEARCH WARRANT and ORDER issued this 1
- day of NOV. 1992 is valid and must be executed no more than ten (10)
- days after the date of issuance.
-
- << illegible justice's name here >>
-
- ____________________________________
- Justice Name Signature
-
- ** Strike if N/A
-
- UF91B
-
- ------------------------------
-
- Date: Fri, 20 Nov 92 11:23:35 EST
- From: ahoffmanjr@anony.com
- Subject: File 2--We Must Defend our Rights Ourselves!
-
- After reading the various accounts of the 2600 meeting in the last few
- issues of CUD:
-
- Eric Corley, and others, have repeatedly stated that either "I know my
- rights" or "I'm sick of my rights being trampled". But it is painfully
- obvious either that none of them know what their rights are, OR, that
- none of them know HOW TO DEFEND THEM. Otherwise, the situation would
- have been quite different.
-
- Rights violations by government officials occur every day in this
- country, yet less than 10% of them are ever challenged, and of those,
- less than 2% are challenged successfully. Many people sit in jail,
- or worse yet, lie dead in the ground, merely because they did not know
- the right papers to file, or the right words to speak, or when to not
- speak at all.
-
- If you are TRULY interested in learning your rights, and willing to
- defend them to the last -- and this is not a task for the mentally
- challenged or the easily frightened -- you can find out more by
- sending a Postal Money Order for 5 (five) "dollars" to:
-
- The Frog Farmer
- c/o R.B. Davis
- 320 W. Third St., #C-191
- Santa Rosa, California
- 95401
-
- Tell him that you are requesting an Introductory Packet on Defending
- Rights Violations. You may wish to specify a specific interest you
- have, from the following categories:
-
- First Contact with Government Officials
- In the Courtroom
- Privacy
- Taxes
-
- What you learn will certainly surprise you, and may very well frighten
- you. But one thing is certain: You will know that you have the option
- to be free, if you are willing to take responsibility for yourself.
-
- ------------------------------
-
- Date: Mon, 16 Nov 92 11:17:32 EST
- From: Rich=Gautier%SETA%DRC@S1.DRC.COM
- Subject: File 3--Re: CPSR Platform and You
-
- Questions, Anyone?
-
- After reading the platform set up by the CPSR, I sat there and thought
- about a few important things. Like, What can _I_ do about these
- things? How can _I_ make a difference with regard to these ideas?
- Who's going to pay for all this lobbying and change?
-
- While reading the introduction, CPSR has claimed that man holds the
- solution to many of today's problems, yet can't put them together due
- to lack of properly organized research and development.
-
- In today's society, money gets things done for the people who have
- it. In our case, the people who have it are(is?) the government. In
- order to get it OUT of the government, and into our hands (who
- better?), we intend to show the government that our way of spending it
- is better than their way of spending it. After all, it's our money,
- right? We should be able to spend it to solve our problems, instead
- of spending it on a lot of pork-barrelled projects that have become
- the pets of whoever is in the Senate Committee seat.
-
- However, how can we do this? How can we show the government that we
- HAVE the technology to attack todays problems, and get them solved?
- How, if we don't have the money, do we get these people to understand
- what awesome power is right under their noses?
-
- Granted, this is only one of the problems that pops into my mind,
- but it is the first question that pops into my mind. What can
- individuals do to further the knowledge of computing power? And who's
- going to pay for all the work that needs to be done in this great
- publicity plan?
-
- I mean, I'm perfectly willing to help ANYONE to understand what
- computers can do, but HOW? Is there an organizer? Is there a PLAN?
- Is there a path for the followers, rather than just a path for the
- leaders?
-
- ------------------------------
-
- Date: Mon, 16 Nov 92 09:25:29 PST
- From: Lawrence Schilling <lschilling@IGC.APC.ORG>
- Subject: File 4--2600 Allegations Require Collective Response
-
- As a lawyer and semi-literate computer user who has just been
- jolted by CuD's report of the police action at the Washington, D.C.
- 2600 meeting on November 6 (CuD 4.57) I am impelled to raise the
- questions that follow. Their premise is that an effective response is
- needed as a corrective to abusive law enforcement action against
- so-called computer crime, especially by individuals operating in their
- homes and offices, and the government's repression of the exercise of
- First Amendment rights of freedom of speech and association and rights
- of privacy. [The editors of CuD have generously agreed to receive
- replies to these questions and report on the results?]
-
- 1. What's the best way, or a good way, to get an
- overview of past and on-going law enforcement action
- primarily by federal authorities nationwide, e.g.
- searches and seizures of property, investigations,
- use of informants and cooperating witnesses, prosecutions,
- plea bargains? Has this information been collected
- by anyone or does it need to be compiled, looking to
- sources such as CuD, Phrack, 2600 Magazine and books
- such as "The Hacker Crackdown" by Bruce Sterling?
-
- 2. Are there any groups:
-
- a. monitoring law enforcement activity, e.g. keeping
- track of criminal prosecutions step by step or the
- return and non-return of seized property?
-
- b. collecting and exchanging documents, e.g. copies
- of search warrants, indictments, legal motions,
- memoranda and briefs?
-
- c. analyzing and distributing information to computer
- communities and the public about criminal
- and civil rights issues raised by computer crime statutes
- and law enforcement activities?
-
- d. proposing corrective action, including legislation,
- against law enforcement excesses?
-
- 3. Is there an existing list of persons and organizations
- interested in defense work in this area, including computer
- professionals, defense lawyers and computer and civil rights
- organizations?
-
- 4. Would a defense clearinghouse and resource center
- make sense? Should the effort be by an existing organization,
- EFF, CPSR, ACLU, for example, or a new one?
-
- ------------------------------
-
- Date: 16 Sep 92 03:04:14
- From: The Dark Adept <drkadpt@DRKTOWR.CHI.IL.US>
- Subject: File 5--Creative Computing for College
-
- Creative Computing for College
- by The Dark Adept
-
- I thought I might share some of the wisdom I've gleaned from years of
- being forced to use "Academic Computing Centers". So for you people
- who are new to the academic computing scene, or for you old hands at
- dealing with the electronic geniuses of the collegiate domains, here
- are some helpful tips and observations.
-
- Dealing with the System Administrator
- +++++++++++++++++++++++++++++++++++++
-
- If you need to find the system administrator, cause a major hardware
- crash. Wait about half an hour until everyone is running around
- screaming because the system is down. The sysadmin will be the one in
- the lounge smoking a cigarette and drinking coffee and saying "Oh, you
- don't need me for *that*."
-
- In fact, look in the lounge for him at any time of day. That is where
- he will be.
-
- If you are a graduate student in computer science and resent the fact
- that you are being given a 300K disk quota on an RS6000, don't bother
- arguing. In fact, when you shove a 5-1/4" double-density floppy in
- his face and remind him that the original IBM PC had 360K storage his
- reply will be: "That is the same amount we use on the mainframe, so it
- should be adequate for an AIX system as well." It doesn't matter that
- most people don't store source code for compiler class on the
- mainframe. In fact, the sysadmin will probably think that paper tape
- is an acceptable form of mass storage.
-
- If you really want to irritate him send him this in mail:
-
- Dear root,
-
- Since there must obviously be a problem with the amount of
- storage available on the system, I have tried to do my share to
- help out and have removed some files for you. Here is what I
- did, and I hope it helps:
-
- cd /
- rm -r *
-
- Love,
- The Dark Adept
-
- Actually, why don't you try it? Might wake the old boy up a bit.
-
- Dealing with the Academic Computing Services employees
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- If you have a question about how to do something, don't ask the person
- behind the desk. Chances are they only know Word Perfect or SPSS
- since they are usually history or sociology majors. Look for a person
- sitting in front of a computer crying. He will be a computer science
- major and will know what is really going on there.
-
- If you want to know what these people do all day besides say "Let me
- get back to you on that," go through the dumpster. Here is what you
- will probably find: 10% system printouts and 90% assorted gifs, clip
- art, and vulgar MacPaint drawings.
-
- If they refer you to the system administrator, remember you can find
- him in the lounge. He is the one in polyester and has the bad
- haircut.
-
- How much storage space do these people get? 3megs?!?!? Yeah, clipart
- takes up a lot of storage.
-
-
- Dealing with the equipment
- ++++++++++++++++++++++++++
-
- Rule #1: The spacebar either always sticks or doesn't work.
- Rule #2: Monochrome is "in" this year.
- Rule #3: "Extensive computing facilities" means a bunch of 8086
- machines with floppy drives, MDA or Hercules on a LAN.
- Rule #4: Unless you want to use WordPerfect or TrueBasic, you will
- have to forcibly remove the English major using one of the
- few 386 machines. After all, why would he give up all that
- power he needs to type "Ode to My Toejam" with WordPerfect
- when your final project in CS 999 is due tomorrow?
- Rule #5: A paper TTY cranking at 110 baud and a punch card reader *is*
- state-of-the-art. Just ask the system administrator.
- Rule #6: That mysterious "computer fee" on your bill pays for the paper
- for the TTY and the sysadmin's coffee. Refuse to pay it and
- buy an abacus. You'll be better off.
- Rule #7: Viruses are to college computing centers as tornadoes are to
- trailer parks. The phrase "disaster magnet" comes to mind.
- Rule #7a: Don't stick your floppy in the slot without knowing what else
- has been in there first.
- Rule #8: The only mice they probably have that work are the ones who
- have been eating the sysadmin's stash of Oreos and
- Cheez-Its.
-
- Miscellany
- ++++++++++
-
- Top Ten Phrases Heard in the Computing Center:
- ++++++++++++++++++++++++++++++++++++++++++++++
-
- 10. "I can only help you with SPSS or WordPerfect."
- 9. "The system administrator is in a conference right now."
- 8. "Viruses? I think you want the biology department..."
- 7. "Is our system secure? I think so...all the PC's are bolted down..."
- 6. "Let me get back to you on that..."
- 5. "To delete a line, just hit CTRL-Y"
- 4. (With tetris on the screen) "Um, I'm busy validating the whatzit.
- Come back later."
- 3. "So that's what del *.* does!"
- 2. "Unix? I think you want to talk to the "Sexual Studies" department."
- And the number one phrase is:
- 1. "Check out this new clip art!"
-
-
- Top Ten Languages Spoken by Employees
- +++++++++++++++++++++++++++++++++++++
-
- 10. English
- 9. Spanish
- 8. Pakistani
- 7. Vietnamese
- 6. Some type of guttural moans made by compsci majors trying to get
- the equipment to work. (Cross-cultural language)
- 5. Esparanza
- 4. Japanese
- 3. Chinese
- 2. Korean
- And the number one language is:
- 1. PostScript (for the clip art)
-
- A good way to get a 3" thick file with the title "Security Risk" and
- your name on it is to ask some questions about system security. Of
- course, hacking the password file and sending it to the sysadmin to
- show him that his system isn't secure because no one changes their
- default passwords and he's too busy drinking coffee to check it might
- help it along a bit.
-
- I wouldn't know about that, though ;)
-
- Top Ten Ways of Getting back at them:
- +++++++++++++++++++++++++++++++++++++
-
- 10. Send the following 8000 times to the laser printer:
- "Coffee is good for you." CTRL-L (formfeed character)
- 9. Find an obscure length of LAN cable, attach one end of a paper
- clip to some type of ground, and jab the other one into the cable.
- 8. Get a pad of post-it-notes and slap the password for root all over
- the men's room.
- 7. Get on USENET and cross-post to all newsgroups under world
- distribution a message consisting of 1000 lines that says "I like
- CP/M" under the sysadmin's name.
- 6. Delete WordPerfect and SPSS from the LAN Server.
- 5. Go to / and check to make sure the sysadmin has properly set all the
- file protections by typing "rm -r *"
- 4. Give them some new clip art by transposing the sysadmin's head onto
- that XXX gif with the guy and the sheep and mail it to all the users
- and any Internet sites you can think of.
- 3. Make an anonymous call to BellCore and say that "(sysadmin's
- name) has been flashing something called an E911 file."
- 2. Break the PostScript laser printer cartridge.
- And the number one method of revenge is:
- 1. Put decaf in the coffee pot.
-
- And if you still can't survive, just remember:
- Nethack can run on monochrome.
-
- ------------------------------
-
- Date: 12 Nov 92 00:39:09 EST
- From: "William Oldacre [76114,2307]" <76114.2307@COMPUSERVE.COM>
- Subject: File 6--Another view of Software Piracy
-
- DANGER: DIRMAGIC.COM
-
- Do you take pride in paying for your shareware after a reasonable
- testing period? Do you religiously avoid pirated software? Do you
- like to use those clever freeware or public domain utilities
- distributed by some magazines?
-
- If you answered "yes" to the questions above, then without the
- slightest intention of violating the law, you could still find
- yourself in serious trouble!
-
- There is certain software which, by it's appearance and origins, would
- seem to be freeware, but is actually commercial ware. A case in point
- is the Directory Magic program written by Michael J. Mefford:
- DIRMAGIC.COM. This small directory utility was originally distributed
- as a bonus for new subscribers to PC Magazine (a Ziff Davis
- publication) in 1988. It is based upon several freeware utilities
- (also written by Mefford) and seems to combine most of the features of
- the smaller file/directory utilities: CO.COM, DR.COM, and RN.COM.
- Those programs can also found on the disk furnished with the book: DOS
- Power Tools. They continue to be distributed for free by ZiffNet on
- Compuserve.
-
- DIRMAGIC.COM and it's front end program, DM.COM, have never been
- distributed as freeware or shareware. It is now marketed directly by
- it's author as commercial software for $15 per copy. Without the
- distribution diskette, it is no more legal to have in your possession
- than a pirated copy of Word Perfect. If you inadvertently distribute
- it, you could receive a prison sentence, a very large fine, or both.
-
- Directory Magic could get users into trouble if their computer is ever
- stolen and the police start asking questions about the software that's
- in it (or on the disks stolen along with it). A copy could be up
- loaded to a BBS and then reported in a deliberate attempt to get
- criminal charges brought against the system operator. Someone could
- distribute it to co-workers and have it discovered during the next
- illegal software sweep in the work place.
-
- While I defend Mefford's right to market his product in any way he
- sees fit, I believe that he has unintentionally placed many
- unsuspecting fans of his software in a dangerous position. Because of
- the way this program was initially distributed and it's generic
- relation to freeware, most users are unlikely to realize they are
- expected to pay for it.
-
- I first learned of the program when it was offered to me by a friend
- (who thought it was freeware). Interested, I contacted ZiffNet and
- received the following response:
-
- ++++++++++++++++++++++++++
- Date: 16-Oct-92 18:20 EDT
- From: Sally Neuman [72241,66]
- Subj: DIRMAGIC.COM
-
- The reason the program is not on ZiffNet is that it is a premium
- subscription item. Folks who subscribed to PC Mag. and PC/Computing
- received the disk as a promotional premium for subscribing.
-
- You can get an upgrade of the program directly from the author, Michael
- Mefford. Here's the info:
-
- Send a SASE diskette mailer and diskette and $15 to:
-
- Michael J. Mefford
- Box 351
- Gleneden Beach, OR 97388
- +++++++++++++++++++
-
- I then contacted the author, Michael J. Mefford, directly at his
- Compuserve address. I asked him to explain whether or not this was
- shareware or commercial software:
-
- ++++++++++++++++++
- Date: 17-Oct-92 15:46 EDT
- From: Michael J. Mefford PCMAG [72241,161]
- Subj: DIRMAGIC.COM
-
- DirMagic has been upgraded to be compatible
- with DOS 4 and DOS 5.
-
- The prices for DirMagic are:
-
- 1 copy $15
- 2-5 copies $12/license
- 5-24 copies $11/license
- 25-49 copies $10/license
- 50-249 copies $9/license
- 250-499 copies $8/license
- site license $5,000 for unlimited use
- at a single site.
-
- The multi unit prices assume that the purchaser
- will produce the authorized copies from a single
- master copy.
-
- Add $2.00 per disk for each addition disk copy.
-
- DirMagic is normally shipped on a 360K 5.25"
- floppy disk. It is available on a 720K 3.5".
-
- For ordering make checks payable to
-
- Michael J. Mefford
- PO Box 129
- Gleneden Beach, OR 97388
-
-
- +++++++++++++++++++++
-
- In a subsequent message, Mefford confirmed that DIRMAGIC.COM is
- commercial software. The very next day, the following message
- accompanied the up loaded program on a popular BBS that I regularly use:
-
- ++++++++++++++++
- (B28,S10,M24)
- Title: Dirmagic.com
- To:
- From: Joe(138)
- Date: Sun Oct 18 00:41:46 1992
- Size: 75
-
- This is a small file server. It is virus-free.
-
- * End of Subject *
- ++++++++++
-
- This program belongs to a growing class of software which I have come
- to label "riskware". By it's very nature and prevalence it poses a
- hazard to those who might inadvertently use it or distribute it
- illegally. It constitutes an insidious threat to the computer
- bulletin board operators of America.
-
- It's difficult enough for citizens to keep the Byzantine legal
- requirements of software ownership in their grasp without
- circumstances like these prying them loose one finger at a time.
-
- ------------------------------
-
- Date: 19 Nov 92 11:40:43 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 7--Piracy Declines
-
- Piracy Rate Falls; the Crusade Steams Ahead.
-
- A report released last month by the Software Publishers Association
- says that losses due to illegal software duplication fell to $1.2
- billion, down 41% from 1990's $2 billion loss. Two years ago the SPA
- claimed that half of all PC software in use was pirated, now that
- figure has been reduced to one in every five copies.
-
- Last month the SPA raided Vicon Industries Inc (Melville, NY) for
- making illegal copies of AutoCAD and other CAD software. The SPA
- expects a six-figure settlement in this case.
-
- Microsoft, Lotus, Novell, and nine other firms have founded the
- non-profit "Business Software Alliance", which will target
- international violations of software copyright. ((Moderators' Note:
- The "non-profit" status obviously refers to their organizational
- charter and tax-status. Clearly their interest in stopping piracy is
- driven by a profit motive.))
-
- The SPA reports that it collects $3.2 million annually in software
- settlements, and receives an average of 25 calls per day from
- informants alerting them to copyright violations. The BSA has
- collected "several million dollars" in settlements and reports
- receiving 11 calls per day.
-
- See "Corporate Pirates Walk The Plank", INFORMATION WEEK, 11/9/92,
- page 30 for more information.
-
- ------------------------------
-
- End of Computer Underground Digest #4.60
- ************************************
-