home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
cud1
/
cud100c.txt
< prev
next >
Wrap
Text File
|
1992-09-26
|
6KB
|
102 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.00 (March 28, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer
REPLY TO: TK0JUT2@NIU.bitnet
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------
===================================================
=== Computer Underground Digest - File 3 of 5 ===
===================================================
There has been some debate about the use of "handles" (or "aliases") in the
BBS world. A few commentators have questioned their appropriateness, and there
seems to be a tendency for government law enforcement agents to interpret the
use of handles as a sign of "conspiracy" or "hiding intents."
The use of handles to disguise identity has a long and honorable tradition in
the U.S. It was Publius, after all (the "handle" of those notorious
subversives and 18th century deviants John Jay, James Madison, and Alexander
Hamilton) who wrote THE FEDERALIST PAPERS, the basis of our Constitution.
In the BBS world, handles provide not only a sense of anonymity, but serve
also as a symbolic identity. In a current research project, we find that for
serious BBS hobbyists, handles encapsulate an ethos reflected by a fictional
(usually science fiction) hero, a literary genre, music or media characters,
or public figures. Handles connote particular cultural meanings, and these
meanings can be "read off" as a short hand summary of the character,
interests, or political ideology of the user.
The anonymity provided by handles serves several purposes. First, it allows
the user, for better or worse, a sense of freedom to express ideas that might
otherwise subject him/her to ridicule. Second, analysis of BBS message logs
suggests that women, especially, feel freer to participate in discussions
without fear of gender games that might occur in face-to-face interaction.
Third, concealing one's identity provides limited freedom from kooks,
merchandise hucksters, and other snoopers. In a society in which making,
maintaining, and disseminating lists is common place, protecting one's
identity hardly seems unreasonable.
There is a fourth reason why handles are increasingly necessary. As Gordon
Meyer cogently suggested in his recent comment, prosecutors are not unwilling
to confiscate e-mail, BBS message logs, or other "evidence" of identity.
These, in turn, are easily used to obtain information on innocent parties. To
those who have continually argued, or who actually believe, the federal agents
"know what they're doing," or are are too "professional" to abuse their
powers, I remind you of the witch hunts against "subversives" who opposed the
Viet Nam war, the FBI's COINTEL-PRO, and other gross abuses of power in recent
years. Attorney Gerry Spence is currently defending Friends of the Earth
against a "set-up" by federal agents that, unfortunately for the agents, was
captured on tape. It was, after all, the FBI who attempted to coerce Martin
Luther King to commit suicide! There is voluminous literature, including the
Church Committee's Report in the 1970s, and other research (including my own)
that documents these abuses. In short, despite protections, our enforcement
agents have a rather sorry record of following the law to enforce the law (see
the corpus of Gary Marx's work for further documentation).
Especially at a time when laws related to computer technology are vague,
inconsistent, occasionally Draconian, and not yet tested in court, and when
one's computer system can be confiscated on mere suspicion, and when a BBS can
be threatened by the FBI or Secret Service (as the sysop of the world's
largest BBS was) merely for posting LICIT hacker-type text files, a chilling
affect occurs that stifles not only free speech, but free revelation of
identity. I used my real name in corresponding with the PHRACK folk at the
University of Missouri, and my name, documents, and other information--none
illicit--is now in the hands of federal prosecutors. Call it paranoia, but
from past experiences with federal agents, I have no confidence that they will
abide by rules of honor in using this information.
There are two ironies associated with the use of handles. First, those who use
them are generally sufficiently open to either self-identity when sufficient
trust has been built, or to provide enough identifying information that
identities can be determined. Second, and more important, in a "free" society
built around open and unconstrained information flow, forces operate to
restrict openness. Therefore, to be open requires concealment. Rather than
grip about the use of handles, doesn't it make more sense to examine the
factors that impel their use?
Jim Thomas
Sociology/Criminal Justice
Northern Illinois University
DeKalb, IL (60115) (815) 753-6438
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+ END THIS FILE +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+