**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 1, Issue #1.19 (June 26, 1990) ** ** SPECIAL ISSUE: MALICE IN WONDERLAND: THE E911 CHARGES ** **************************************************************************** MODERATORS: Jim Thomas (Sole moderator: Gordon Meyer on vacation) REPLY TO: TK0JUT2@NIU.bitnet COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. -------------------------------------------------------------------- DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. -------------------------------------------------------------------- This issue is the concept outline of one section of a paper to be submitted to the Midwest Sociological Society's annual meetings in 1991 and will ultimately be submitted for publication. The intent of the paper is to develop a discourse analysis of how "social facts" are given "legal meanings." The saliency of the current crackdown on alleged "computer crime" seems an excellent way of tapping the clash between new meanings and old definitions, and how courts become the battlefield for over these meanings. This draft is not copy-protected and may be used as appropriate. The prose and ideas here remain tentative and incomplete, and will be refined. It is circulated for conceptual, theoretical, and bibliographic comments. ******************************************************************** THE SECRET SERVICE, E911, AND LEGAL RHETORIC: MALICE IN WONDERLAND? Jim Thomas Department of Sociology Northern Illinois University DeKalb, IL 60115 (28 June, 1990) ________ Concept outline for larger paper to be submitted at the Midwest Sociological Society annual meetings, 1991. THE SECRET SERVICE, E911, AND LEGAL RHETORIC: MALICE IN WONDERLAND? "When I use a word," Humpty Dumpty said, in rather a scornful tone, "it means just what I choose it to mean--neither more nor less." "The question is," said Alice, "whether you can make words mean so many different things." "The question is," said Humpty Dumpty, "which is to be master--that's all" (Carroll, 1981: 169). Law is more than simply assuring public order. It is also, as White (1984) argues, "action with words." The rhetoric of law is played out in the drama of the courtroom, and the denouement of the play is scripted by the language of statutory and case law, indictments, and the talk of the courtroom performers (Nichols, 1990; Thomas, 1983, 1989). - 1 - Part of this language game involves a battle over competing definitions, meanings, and nuances that may be unrelated to "facts," and instead replaces facts with rhetoric, or a style of persuasion. The language of indictments and how evidence is presented provides one window through which to observe this rhetorical battle. Indictments are the means by which a "bad act" is transformed into a formally sanctionable one by creatively linking the act to the law that it ostensibly violates. A recent federal indictment of an alleged computer hacker provides on example (U.S. v. Rigs and Neidorf, 90-CR-0070, Northern District of Illinois, Eastern Division). (For a background on the issues involved, see especially Barlow, (1990), Denning, (1990), Goldstein, (1990), Markoff, (1990), and Schwartz (1990). This outline is divided into two parts. Section one first presents formal "indictment talk" and that to which it speaks. The second section, not included here, will provide a semiotic/deconstructionist analysis. The indictment begins with a degradation game, one in which the credibility and character of the defendant is attacked because of a presumed deviant behavior and association with deviant groups. The goal is to stigmatize hackers such that prejudicial meanings are imposed. It is a clever linguistic trick that creates a tautology that defines the guilt of the defendant by recursing back to the allegation in a manner that produces linguistic "evidence of guilt." This would be analogous to calling an alleged murder a "murderer" in court, rather than requiring that the label must first be demonstrated to be true. In short, the "thing" becomes the "name:" - 2 - 5. _Computer Hackers_ - As used here, computer hackers are individuals involved with the unauthorized access of computer systems by various means. Computer hackers commonly identify themselves by aliases or "hacker handles" when communicating with other hackers. The rhetoric first attempts to transform the conventional and broader image of "hacker" into one that is malignant in a way that will allow anyone associated with the label to be, by definition, stigmatized as a criminal. Yet, there is considerable evidence that the term does not, in itself, refer to an illegal activity, and that many who consider themselves "computer hackers" do not engage in computer trespass, whether unauthorized or not. The assumption that all computer hackers are intent on committing criminal trespass or fraud distorts the nature of the activity. Only the most extreme examples come to the attention of law enforcement officials and the public, and this obscures the complexity both of hacking and of the CU. In its broadest sense, hacking is the dual process of obtaining and using sufficient mastery of computers and programs to allow resolution of a computer problem for which no previous knowledge or guidance exists. The Hacker's Dictionary, a text file widely circulated on BBSs, provides this definition: - 3 - HACKER %originally, someone who makes furniture with an axe% n. 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value (q.v.). 4. A person who is good at programming quickly. Not everything a hacker produces is a hack. 5. An expert at a particular program, or one who frequently does work using it or on it; example: "A SAIL hacker". (Definitions 1 to 5 are correlated, and people who fit them congregate.) 6. A malicious or inquisitive meddler who tries to discover information by poking around. Hence "password hacker", "network hacker". A computer programmer's attempt to help a colleague enter a system when a password has been lost or forgotten, de-bugging a copyright software program, or testing a system's security are examples for which a benign form of hacking is both required and considered acceptable. Nonetheless, this deceptive definition was successful, for it convinced Judge Nicholas Bua that the prosecutor's definition was the most common, would be unlikely to confuse a jury, and was not prejudicial (See Memorandum Order in CuD 1.16). Another rhetorical ploy in this same passage is the attempt to connect the use of aliases with deviant activity. Pseudonyms are widely used on BBSs, and their use reflects a cultural practice including, but hardly limited to, members of the computer underground. Yet, clever rhetorical twists distort the cultural meaning and impute to it one totally at odds with reality by playing on the myth that pseudonyms reflect attempts to hide "bad acts." - 4 - A third rhetorical ploy in this section of the indictment associates the defendant with a loosely connected group known as "Legion of Doom," which was a small collection of people who shared technical knowledge between themselves and others. Without presenting any evidence whatsoever, and without citing an indictment, on-going case, or justifying the claims, the indictment asserts that the group was "closely knit" and involved in disrupting telecommunications, bank fraud and other serious felonious behavior. Because of its amorphous nature and ambiguous boundaries defining "affiliation," the indictment's language offers little means to resist the imposition of its "legal meaning:" 6. _Legion of Doom_ - As used here the Legion of Doom (LOD) was a closely knit group of computer hackers involved in: a. Disrupting telecommunications by entering computerized telephone switches and changing the routing on the circuits of the computerized switches. b. Stealing proprietary computerized information from companies and individuals. c. Stealing and modifying credit information on individuals maintained in credit bureau computers. d. Fraudulently obtaining money and property from companies by altering the computerized information used by the companies. e. Sharing information with respect to their methods of attacking computers with other computer hackers in an effort to avoid law enforcement agencies and telecommunication experts from focusing on them, alone. - 5 - The indictment itself focuses on the alleged "theft" and dissemination of an E911 document from Bell South. Although those close to the case indicate that only a small portion of a training document was at issue, the language of the indictment attempts to link this document and its possession and dissemination to severe threats to the commonweal: 22. It was further part of the scheme that on or about February 24, 1989 defendant NEIDORF disseminated the disguised E911 text file in issue 24 of "PHRACK" newsletter. 23. It was further part of the scheme that the defendant NEIDORF would disseminate and disclose this information to others for their own use, including to other computer hackers who could use it to illegally manipulate the emergency 911 computer systems in the United States and thereby disrupt or halt 911 service in portions of the United States. Such rhetoric raises the spectre of people dying, and one news story actually wrote that there was no evidence of any deaths as the result of the behavior, thus re-inforcing the apparent danger to the public. The rhetoric sounds serious. But, what in fact is the evidence? The PHRACK file reprinted here is as it appeared in the original issue. The indictment indictates it *IS NOT* the same as the one that has allegedly been stolen, because it has been "edited," "retyped," and "disguised." - 6 - -------------------------------------------------------------------- ==Phrack Inc.== Volume Two, Issue 24, File 6 of 13 E911 - Enhanced 911: Features available include selective routing, selective transfer, fixed transfer, alternate routing, default routing, Automatic Number Display, Automatic Location Identification, night service, default routing, call detail record. End Office - Telephone central office which provides dial tone to the subscriber calling 911. The "end office" provides ANI (Automatic Number Identification) to the tandem office. Tandem Office - Telephone central office which serves as a tandem (or hub) for all 911 calls. Must be a 1AESS type of central office. The tandem office translations contain the TN/ESN relationships which route the 911 call to the proper SAP. The tandem office looks up the ANI (TN) that it receives from the end office and finds the ESN (routing information) which corresponds to a seven digit number ringing in at a PSAP. PSAP - Public Safety Answering Point, usually the police, fire and/or rescue groups as determined by the local municipalities. A "ringing" will not have ANI or ALI capabilities, but just receives calls or transferred calls from another PSAP. ESN - Emergency Service Number (XXX) that is assigned to the subscriber's telephone number in the tandem office translations The ESN represents a seven digit number by which the tandem office routes the call to the proper PSAP. PSAPs with ALI capabilities also receive a display of the ESN information which shows which police, fire and rescue agency serves the telephone number calling 911. An ESN is a unique combination of police, fire, and rescue service for purposes of routing the E911 call. ANI - Automatic Number Identification corresponds to the subscriber's seven digit telephone number. The ANI displays at the PSAP on the digital ANI display console. ALI - Automatic Location Identification provides for an address display of the subscriber calling 911. With ALI, the PSAP receives the ANI display and an ALI display on a screen. The ALI display includes the subscriber's address, community, state, type of service and if a business, the name o the business. The PSAP will also get a display of the associated ESN information (police, fire, rescue). Selective Routing - The capability to route a call to the particular PSAP serving the address associated with the TN making the 911 call. Selective routing is achieved by building TN/ESN translations in the tandem central office. These translations are driven by the E911 data base which assign the ESN to each telephone number based on the customer's address. Service order activity keeps the E911 data base updated. The E911 data base, in turn, generates recent change to the tandem office (through the SCC or RCMAC) to update the TN/ESN translations in the tandem data base. Selective Transfer - Provides the PSAP with the ability to transfer the incoming 911 call to a fire or rescue service for the particular number calling 911 by pushing one button for fire or rescue. For example, if an incoming 911 call was reporting a fire, the PSAP operator would push the fire button on the ANI console; the call would go back to the tandem office, do a lookup for the seven digit number associated with fire department, for the ESN assigned to the calling TN, and automatically route the call to that fire department. This differs from "fixed" transfer which routes every call to the same fire or rescue number whenever the fire or rescue button is pushed. The PSAP equipment is optioned to provide either fixed or selective transfer capabilities. Alternate Routing - Alternate routing provides for a predetermined routing for 911 calls when the tandem office is unable to route the calls over the 911 trunks for a particular PSAP due to troubles or all trunks busy. Default Routing - Provides for routing of 911 calls when there is an ANI failure. The call will be routed to the "default" ESN associated with the he NNX the caller is calling from. Default ESNs are preassigned in translations and are usually the predominant ESN for a given wire center. Night Service - Night service works the same as alternate routing in that the calls coming into a given PSAP will automatically be routed to another preset PSAP when all trunks are made busy due to the PSAP closing down for the night. Call Detail Record - When the 911 call is terminated by the PSAP operator, the ANI will automatically print-out on the teletypewriter located at the PSAP. The printout will contain the time the call came into the PSAP, the time it was picked up by an operator, the operator number, the time the call was transferred, if applicable, the time the call was terminated and the trunk group number associated with the call. Printouts of the ALI display are now also available, if the PSAP has purchased the required equipment. ANI Failure - Failure of the end office to identify the call and provide the ANI (telephone number) to the tandem office; or, an ANI failure between the tandem office and the PSAP. Misroute - Any condition that results in the 911 call going to the wrong PSAP. A call can be misrouted if the ESN and associated routing information are incorrect in the E911 data base and/or tandem data base. A call can also be misrouted if the call is an ANI failure, which automatically default routes. Anonymous Call - If a subscriber misdials and dials the seven digit number associated with the PSAP position, they will come in direct and ANI display as 911-0000 which will ALI as an anonymous call. The seven digit numbers associated with the PSAP positions are not published even to the PSAPs. Spurious 911 Call - Occasionally, the PSAP will get a call that is not associated with a subscriber dialing 911 for an emergency. It could be a subscriber who has not dialed 911, but is dialing another number, or has just picked up their phone and was connected with the PSAP. These problems are equipment related, particularly when the calls originate from electromechanical or step by step offices, and are reported by the E911 Center to Network Operations upon receipt of the PSAP inquiry reporting the trouble. The PSAP may get a call and no one is there; if they call the number back, the number may be disconnected or no one home Again these are network troubles and must be investigated. Cordless telephones can also generate "spurious" calls in to the PSAPs. Generally, the PSAP will hear conversation on the line, but the subscribers are not calling 911. The PSAP may report spurious calls to to repair if they become bothersome, for example, the same number ringing in continually. No Displays - A condition where the PSAP ALI display screen is blank. This type of trouble should be reported immediately to the SSC/MAC. If all screens at the PSAP are blank, it is an indication that the problem is in the circuits from the PSAP to the E911 computer. If more than one PSAP is experiencing no display, it may be a problem with the Node computer or the E911 computer. The SSC/MAC should contact the MMOC to determine the health of the HOST computer. Record Not Found - If the host computer is unable to do a look up on a given ANI request from the PSAP, it will forward a Record Not Found message to the PSA ALI screen. This is caused by service order activity for a given subscriber not being processed into the E911 data base, or HOST computer system problems whereby the record cannot be accessed at that point in time. No ANI - This condition means the PSAP received a call, but no telephone number displayed on the ANI console. The PSAP should report this condition immediately to the SSC/MAC. PSAP Not Receiving Calls - If a PSAP cannot receive calls or request retrieval from the E911 host computer, i.e., cable cut, the calls into that PSAP must be rerouted to another PSAP. The Switching Control Center must be notified to reroute the calls in the tandem office E911 translations. MSAG - Master Street Address Guide. The MSAG ledgers are controlled by the municipality which has purchased the E911 ALI service, in that they assign which police, fire or rescue agency will serve a given street an number range. They do this by assigning an ESN to each street range, odd, even, community that is populated in the county or municipality served. These MSAGs are then used as a filter for service order activity into the E911 computer data base to assign ESNs to individual TN records. This insures that each customer will be routed to the correct agency for their particular address. In a non-ALI County, TAR codes are used by the Telephone company to assign ESNs to service conductivity and the County does not control the ESN assignment. TAR codes represent the taxing authority for the given subscriber which should correspond to their police, fire and rescue agencies. The MG method, of course, is more accurate because it is using the actual service address of the customer to route the call and provides the county with more flexibility in assigning fire and rescue district, etc The Customer Services E911 Group maintains the E911 computer data base and interfaces with the County (customer) on all MSAG or data base activity. ___________________________________________________________________________ What in fact is this document? It is simply a partial glossary available from other sources, and hardly of any technical value. It presents 22 terms, six of which are found in at least one public book (e.g., Ambrosch, Maher and Sasscer, 1989), and the rest found either in the text of that work (see esp. Chapter 9) or readily found elsewhere. Further, if this document can be deciphered as potentially dangerous, then what is one to make of the Amborsch, Maher and Sasscer volume itself, which not only provides several hundred definitions, but also includes detailed technical information and diagrams about the operation, administration, and functioning of Bell systems? There is nothing in the PHRACK document, or in any of the so-called "phreak/hacker" magazines that is not available in more detail from any work found in the classroom or library. A cursory reading of Ambrosch, Maher, and Sasscer (1989) provides references to many of these definitions, and we have seen others in the "chat" section of public BBSs. Below we provide a sample of terms readily available to the public. Those without a reference are either common terms or are readily deducible from the referenced items: Alternate Routing Anonymous Call - 14 - ALI (Glossary, 285; pp 173-175; throughout) ANI (Glossary, p. 285 and throughout) ANI Failure Call Detail Record Default Routing (referenced on p. 166) End Office (Standard communications term) ESN E911 (Standard definition, ubiquitous) Misroute MSAG (Definition found on BBSs) Night Service No ANI No Displays PSAP (Glossary, p. 287) PSAP Not Receiving Calls Record Not Found Selective Routing (reference on p. 166) Selective Transfer Spurious 911 Tandem Office Despite the banality of these terms, the indictment's discourse was sufficiently clever to convince Judge Bua that the information was indeed "valuable," and "confidential," and despite its public availability, is "property" that deprives Bell South of "something of value." However, the judge seems taken in by the chicanery of the prosecutor's linguistic - 15 - distortion that manipulates the symbols of PHRACK's style to create an alternative reality that is, at best, questionable. Consider, for example, the following passage. First assume it appears in a scholarly article explaining the basic service of E911: With the non-IN Emergency Response Service (ERS), the caller dials a special emergency number (very short, usually three digits) which is uniform within a country, (for example, 911 in the USA, and in West Germany 110/0110 for police and 112/0112 for fire or ambulance) (Ambrosch, Maher and Sasscer, 1989: 162). Now, re-frame the same passage, but preface it with a sentence like: "At the last hackers' convention, Holly Hackwood described the E911 basic service like this: (and now re-read the passage)." Is the E911 document illegal when published in PHRACK (for that is what the indictment charges), but legal when published in a library book or a research paper? The point is that it is not only possession of public information that is being prosecuted, but the manner in which the symbols are packaged. In CuD 1.17, we cited a California law that makes it a felony to merely POSSESS certain types of information, whether that information is used or communicated to others or not. The "crime" of the "hacker" seems to be not only possession of information freely available to the public, but also of presenting relatively innocuous information in the discourse of an anti-establishment ethos. More simply, the "crime" is that of speaking a different language than law enforcement officials who seem willing to distort that language with rhetorical ploys of their own. - 16 - White (1984) suggests that, in legal discourse, "words lose their meaning" and that law is as much a language game as it is the application of statutes and cases to behavior. The resulting danger is that language becomes a weapon to subvert freedom of speech. In an era when most people are not "culturally literate" in the nuances of techno-speak, the ease of distortion puts defendants at risk in bench or jury trials where a common framework of meaning is intentionally obscured in the battle over symbolic terrain. In the next section the language of law as reflected in the indictment will be "deconstructed," and the logic and imagery made more apparent. (End this section) BIBLIOGRAPHY Ambrosch, W.D., A. Maher and B. Sasscer (Eds.). 1989. The Intelligent Network: A Joint Study by Bell Atlantic, IBM and Siemens. Berlin: Springer-Verlag. Barlow, John Perry. 1990 (forthcoming). "Crime and Puzzlement." The Whole Earth Review. Denning, Dorothy. 1990. "Concerning Hackers Who Break into Computer Systems." Paper presented at the 13th National Computer Security Conference, Washington, D.C., Oct. 1-4. - 17 - Goldstein, Emmanuel. 1990. Editorial Commentary on "Operation Sun Devil." 2600 Magazine, /Spring. Markoff, John. 1990. "Drive to Counter Computer Crime Aims at Invaders." The New York Times, /June 3: 1, 21. Nichols, Lawrence T. 1990 (forthcoming). "Discovering Hutton: Expression Gaming and Congressional Definitions of Deviance." Pp. *-* in N. Denzin (ed.), Studies in Symbolic Interaction, Vol. 11. Greenwich (Conn.): JAI Press. Thomas, Jim. 1989. Prisoner Litigation: The Paradox of the Jailhouse Lawyer. Totowa (N.J.), Aldine. _____. 1983. "Justice as Interaction:: Loose Coupling and Mediations in the Adversary Process." Symbolic Interaction, 6(Fall): 243-260. White, James Boyd. 1984. When Words Lose their Meaning: Constitutions and Reconstructions of Language, Character, and Community. Chicago: University of Chicago Press. !