home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
cud3
/
cud316f.txt
< prev
next >
Wrap
Text File
|
1992-09-11
|
3KB
|
67 lines
------------------------------
From: Moderators
Subject: A Few Observations on Prodigy
Date: 8 May, 1991
********************************************************************
*** CuD #3.16: File 6 of 6: A Few Observations on Prodigy ***
********************************************************************
Prodigy customers can decide for themselves whether they are satisfied
with the service, and the internal policies of a commercial system are
normally of little direct CU interest. Here, however, we see at least
two issues that potentially touch the rest of us.
First, whatever the inadequacy of Prodigy's software or the tarnish on
their public image, the stage.dat case raises the same issues that
"hackers" have been raising for over a year. The legitimate concerns
of users regarding the potential danger to privacy seem over-ridden by
the same hysteria and "lynch mob" mentality that has accompanied law
enforcement attention to the CU. Prodigy may not be the most
sympathetic of victims, but they seem to be victimized by the same
excesses, this time from the private sector, as other individuals
received from law enforcement. Prodigy management may not handle its
crises well, but this is not a crime, and using a flaw in a program to
impute broader motives reminds us of how prosecutors distorted the
significance of the E911 files, how AT&T fabricated the value of
"losses," or how prosecutors creatively misconstrued facts or legal
language to finagle a version of reality to their liking.
A second issue, one more chilling, was raised by Emmanuel Goldstein of
2600 Magazine. If user-interface software can access information ona
hard drive, consider this scenario: A serial killer is suspected of
being a computerophile. A "psychological profile" has narrowed down
possible suspects who may have an account on a system (like Prodigy)
that essentially takes temporary control of a system while the user is
logged on. Under existing law, can investigators use such such
systems to "invade" the hard drives of suspects looking for potential
evidence? And, if so, how can this evidence be used? Now, substitute
"serial killer" for "hacker," "pirate," or "marijuana user."
Take another example. If the Secret Service engages in video taping of
the kind it did in Summercon '88 without significant public outcry,
how hard would it be to engage in comparable monitoring of "suspects"
hard drives? We have seen from Sun Devil and other operations (eg,
Steve Jackson Games) how easily search or seizure affidavits can
distort "reality." A year ago we would have thought the possibility of
hard drive snooping absurd. But, we also would have disbelieved that
the SS would poke holes in motel rooms to video tape 15 hours of
people eating pizza and drinking beer.
The crucial question of Prodigy's stage.dat is not an individual
company's policies, but rather the ability for such programs to be
used by those with the power to abuse it.
********************************************************************
********************************************************************
------------------------------
**END OF CuD #3.16**
********************************************************************