| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty-One, File 5 of 13 |
|
|
| Pirates Cove |
|
|
| By Rambone |
|
|
|
|
| Welcome back to Pirates Cove. News about software piracy, its effects, and the |
| efforts of the software companies to put and end to it are now at an all time |
| high. Additionally, there is an added interest among the popular media towards |
| the other goings-on in the piracy underworld. Additionally over the past few |
| months there have been several major crackdowns around the world. Not all of |
| the news is terribly recent, but a lot of people probably didn't hear about it |
| at the time so read on and enjoy. |
|
|
| If you appreciate this column in Phrack, then also be sure to send a letter to |
| "phracksub@stormking.com" and let them know. Thanks. |
| _______________________________________________________________________________ |
|
|
| More Than $100,000 In Illegal Software Seized |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| WASHINGTON -- (BUSINESS WIRE) -- Illegal software valued in excess of $100,000 |
| was seized from an electronic bulletin board computer system (BBS) |
| headquartered in Baltimore, Maryland, marking the first U.S. case for the |
| Business Software Alliance (BSA) against a BBS for pirating software. |
|
|
| The BSA previously initiated an enforcement campaign against illegal bulletin |
| boards in Europe and is investigating illegal boards in Asia. As part of the |
| U.S. seizure, more than $25,000 worth of hardware was confiscated in accordance |
| with the court order, and the BBS, known as the APL, is no longer in operation. |
|
|
| Investigations conducted over the past several months found that, through the |
| APL BBS, thousands of illegal copies have been made of various software |
| programs. Plaintiffs in the case include six business software publishers: |
| ALDUS, Autodesk, LOTUS Development, MICROSOFT, NOVELL, and WordPerfect. The |
| action against APL was for allegedly allowing BBS users to upload and download |
| copyrighted programs. |
|
|
| Nearly 500 software programs were available for copying through the APL BBS, an |
| infringement of software publishers' copyright. In addition, BSA seized APL's |
| business records which detail members' time on the BBS and programs uploaded |
| and/or copied. BSA is currently reviewing these records for possible |
| additional legal action against system users who may have illegally uploaded or |
| downloaded copyrighted programs. |
|
|
| "Electronic bulletin boards create increasingly difficult problems in our |
| efforts to combat piracy," according to Robert Holleyman, president of the BSA. |
| "While bulletin boards are useful tools to enhance communication channels, they |
| also provide easy access for users to illegally copy software," Holleyman |
| explained. |
|
|
| Strict federal regulations prohibit the reproduction of copyrighted software. |
| Legislation passed this year by the U.S. Congress contains provisions to |
| increase the penalties against copyright infringers to up to five years |
| imprisonment and a $250,000 fine. |
|
|
| The APL investigation, conducted by Software Security International on behalf |
| of the BSA, concluded with a raid by Federal Marshals on October 1, 1992. In |
| addition to the six business software publishers, the BSA action was taken on |
| behalf of Nintendo. |
|
|
| Bulletin boards have grown in popularity over the past several years, totaling |
| approximately 2000 in the United States alone. Through a modem, bulletin board |
| users can easily communicate with other members. The BSA has recently stepped |
| up its worldwide efforts to eradicate the illegal copying of software which |
| occurs on some boards. |
|
|
| The BSA is an organization devoted to combating software theft. Its worldwide |
| campaign encompasses education, public policy, and enforcement programs in more |
| than 30 countries. The members of the BSA include: ALDUS, APPLE COMPUTER, |
| Autodesk, LOTUS Development, MICROSOFT, NOVELL, and WordPerfect. |
|
|
| The BSA operates an Anti-piracy Hotline (800-688-2721) for callers seeking |
| information about software piracy or to report suspected incidents of software |
| theft. |
|
|
| CONTACT: Diane Smiroldo, Business Software Alliance, (202)727-7060 |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Only The Beginning |
| ~~~~~~~~~~~~~~~~~~ |
| The bust of APL BBS had made unprecedented impacts in the pirate world because |
| of the implications behind the actual arrest. Business Software Alliance |
| (BSA), representing many major business software companies along with Nintendo, |
| joined forces to hit APL very hard. They joined forces to permanently shut |
| down APL and are, for the first time, trying to pursue the users that had an |
| active role in the usage of the BBS. |
|
|
| Trying to figure out who had uploaded and downloaded files through this BBS and |
| taking legal recourse against them is a very strong action and has never been |
| done before. One of the major problem I see with this is how do they know if |
| what the records show was the actual user or someone posing as another user? |
| Also, how could they prove that an actual program was downloaded by an actual |
| user and not by someone else using his account? What if one user had logged on |
| one time, never called back, and someone else had hacked their account? I'm |
| also sure a sysop has been known, on occasion, to "doctor" someone's account to |
| not allow them to download when they have been leeching. |
|
|
| The points I bring up are valid as far as I am concerned and unless the Secret |
| Service had logs and phone numbers of people actually logged on at the time, I |
| don't see how they have a case. I'm sure they have a great case against the |
| sysop and will pursue the case to the highest degree of the law, but if they |
| attempt to arrest users, I foresee the taxpayers' money going straight down the |
| drain. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| BSA Hits Europe |
| ~~~~~~~~~~~~~~~ |
| The Business Software Alliance reached their arms out across the Atlantic and |
| landed in Germany. Along with Interpol and the local police, they proceeded to |
| take down 80% of the boards in Berlin. One of the contributing factors in |
| these busts was that the majority of the boards busted were also involved in |
| toll fraud. Until recently, blue boxing was the predominate means of |
| communication with the United States and other countries in Europe. When most |
| of these sysops were arrested, they had been actively blue boxing on a regular |
| basis. Unfortunately, many parts of Germany had already upgraded their phone |
| system, and it became very risky to use a blue box. It didn't stop most people |
| and they soon became easy targets for Interpol. The other means of LD usage |
| for Germans was AT&T calling cards which now are very common. The local police |
| along with the phone company gathered months of evidence before the city wide |
| sweep of arrests. |
|
|
| The busts made a bigger impact in Europe than anyone would have imagined. Some |
| of the bigger boards in Europe have been taken down by the sysops and many will |
| never go back up. Many sysops have been arrested and fined large amounts of |
| money that they will be paying off for a long time. BSA, along with local |
| police and Interpol, has done enough damage in a few days that will change |
| European Boards for a long time. |
| _______________________________________________________________________________ |
|
|
| IBM: Free Disks For The Taking |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| In a vain effort to increase sales, IBM decided to send out 21 high density |
| diskettes to anyone who called. On these diskettes was a new beta copy of OS/2 |
| Version 2.1. They were hoping to take a cheap way out by sending a few out to |
| people who would install it and send in beta reports. What they got was |
| thousands of people calling in when they heard the word who were promptly Fed |
| Ex'ed the disks overnight. The beta was not the concern of most, just the |
| diskettes that were in the package. The actual beta copy that was sent out was |
| bug ridden anyway and was not of use on most systems. |
|
|
| When IBM finally woke up and figured out what was going on, they had already |
| sent out thousands of copies. Some even requested multiple copies. IBM then |
| proceeded to charge for the shipment and disks, but it was way too late, and |
| they had gone over budget. Way to go IBM, no wonder your stock has plummeted |
| to $55 a share. |
| _______________________________________________________________________________ |
|
|
| Users Strike Back At U.S. Robotics |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Since 1987, U.S. Robotics (USR) has been a standard among sysops and many end |
| users. With the loyal following also came terrible customer service and long |
| delays in shipments. Their modems, being in as much demand as they are, soon |
| showed the results of shortcuts in the manufacture of certain parts in some of |
| the more popular modems. The most infamous instance of this happening was the |
| Sportster model which was a V.32bis modem which could be bought at a much lower |
| price than that of the Dual Standard. The catch was that they cut some corners |
| and used that same communication board for both the Sportster and the Dual |
| Standard. They assumed they could save money by using the same board on both |
| modems. Boy were they wrong. |
|
|
| All that was done to the Sportster was to disable the HST protocol that would |
| make it into a Dual. With the proper init string, one could turn a Sportster, |
| ROM version 4.1, into a full Dual in the matter of seconds and have spent 1/3 |
| of the price of a full Dual Standard. |
|
|
| This outraged USR when they found out. They first denied that it could be |
| done. When they found out that it had gotten too wide-spread and could not be |
| stopped, they then proceeded to tell the public it was a copyright infringement |
| to use the "bogus" init string and threatened to sue anyone who attempted to |
| use it. Most people laughed at that idea and continued to use it while giving |
| "the bird" to USR. Some vendors are now even trying to make a buck and sell |
| Sportsters at a higher price, and some are even selling them as Duals. |
|
|
| Obviously, they have now discontinued making the Sportsters the cheap way and |
| are now making two separate boards for both modems. The versions with the ROM |
| 4.1 are still floating around, can be found almost anywhere, and will always |
| have the capabilities to be run as a full Dual. Better watch out though. The |
| USR police might come knocking on your door <g>. |
| _______________________________________________________________________________ |
|
|
| Warez Da Scene? |
| ~~~~~~~~~~~~~~~ |
| Over the last 6 months there have been several changing of hands in the major |
| pirate groups. One person who supplies them has bounced to 3 groups in the |
| last four months. One group fell apart because of a lack of support from the |
| major members, but is making a valiant comeback. And yet another has almost |
| split into two like AT&T stock. We'll have to see what comes of that. |
|
|
| While only about 15% or so actually doing anything for the scene, the other 85% |
| seem to complain and bitch. Either the crack doesn't work or someone forgot to |
| put in the volume labels. Jesus, how much effort does it take to say, "Hey, |
| thanks for putting this out, but...". The time and effort it takes to acquire |
| the program, check to see if it needs to be cracked, package it, and have it |
| sent out to the boards is time- and money-consuming and gets very little |
| appreciation by the majority of the users around the world. |
|
|
| Why not see some users send in donations to the group for the appreciation it |
| takes to send the files out? Why not see more users volunteer to help courier |
| the programs around? Help crack them? Make some cheats, or type of some docs? |
| Be a part of the solution instead of the problem. It would create less |
| headaches and gain more respect from the members who take the time and effort |
| to make this all possible. |
| _______________________________________________________________________________ |
|
|
| Review Of The Month |
| ~~~~~~~~~~~~~~~~~~~ |
| I usually type up a review of the best program I have seen since the last |
| issue, but since I was so disappointed with this game, I have to say something |
| about it. |
|
|
|
|
| ___________________________________________________________________________ |
| | | |
| | RELEASE INFORMATION | |
| |___________________________________________________________________________| |
| | | |
| | Supplied by : ACTION MAN & MUNCHIE ...................................... | |
| | Cracked by : HARD CORE ................................................. | |
| | Protection : Easy Password ............................................. | |
| | Date : 16th December 1992 (Still 14 days left!) .................. | |
| | Graphics : ALL ....................................................... | |
| | Sound : ALL ....................................................... | |
| | Game Size : 5 1.44Mb disks , Installation from floppies ............... | |
| |___________________________________________________________________________| |
|
|
|
|
| One of the most awaited games of the year showed up at my doorstep, just |
| itching to be installed: F15-]I[. I couldn't wait to get this installed on |
| the hard drive and didn't care how much space it took up. I was informed |
| during installation that the intro would take up over 2 megs of hard drive |
| space, but I didn't care. I wanted to see it all. Once I booted it and saw |
| the intro, I thought the game would be the best I had seen. Too bad the other |
| 8 megs turned out to be a waste of hard drive space. |
|
|
| I started out in fast mode, getting right up in the skies. Too bad that's the |
| only thing on the screen that I could recognize. Zooming down towards the |
| coast, I noticed that it looked damn close to the land and, in fact, it might |
| as well have been. The ocean consist of powder blue dots and had almost the |
| same color consistency as the land. Not finding anything in the air to shoot |
| at, I proceeded to shoot a missile at anything that I thought would blow up. |
| This turned out to be just about everything, including bridges. Let a few |
| gunshots loose on one and see a large fireworks display like you dropped a |
| nuclear bomb on it. |
|
|
| Close to 3 hours later, I finally found a jet, got it into my sights and shot 3 |
| missiles at it. A large explosion, another one, and then he flew past me |
| without even a dent showing. I shot my last 2 at it, same result. Thus my |
| conclusion: the Russians must have invincible planes. Either that or F-15 ]I[ |
| has some major bugs. I'll take a wild guess and say, hmm, bugs. |
|
|
| This game is not worth the box it comes in and I would not suggest anyone, |
| outside of a blind person, from purchasing this. I hate ratings but I'll give |
| it a 2/10. The 2 is for modem play, which is not bad, but not good enough. |
| _______________________________________________________________________________ |
|
|
| Piracy's Illegal, But Not The Scourge It's Cracked Up To Be August 9, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By T.R. Reid and Brit Hume (Chicago Tribune)(Page 7) |
|
|
| The software industry has embarked on one of its periodic public relations |
| campaigns to get people to believe it's being robbed blind by software pirates. |
| Even The New York Times took the claims seriously and ran a front-page story |
| illustrated by a picture of a cheerful computer hacker wearing a Hawaiian shirt |
| sitting in his basement surrounded by PCs and awash in piles of disks, many of |
| them containing bootleg programs. |
|
|
| With a straight face, the Times reported the industry's claim that in 1990, the |
| last year for which figures are available, programs worth $2.4 billion were |
| pirated, an amount equal to nearly half the industry's total sales of $5.7 |
| billion. In fact, the software industry has no way of knowing how much it lost |
| to illegal copying, but the $2.4 billion figure is almost certainly rot. |
| Here's why. |
|
|
| It is true that it's a snap to make an "illegal" copy of a computer program and |
| equally true that the practice is rampant. You just put a disk in the drive, |
| issue the copy command, and the computer does the rest. |
|
|
| But there is simply no way the software industry can estimate accurately how |
| many illegal copies there are, and even if it could, it couldn't possibly |
| determine how many of them represent lost sales. It does not follow that every |
| time somebody makes a bootleg copy, the industry loses a sale. That would be |
| true only if the software pirate would have paid for the program had he or she |
| not been able to get it for free. |
|
|
| Indeed, some of those illegal copies undoubtedly lead to actual sales. Once |
| users try a program, particularly a full-scale application such as a word |
| processor or database, and like it, they may decide they need the instruction |
| book and want to be able to phone for help in using the program. |
|
|
| The only way to get those things is to buy the software. If that sounds |
| pie-in-the-sky, consider that an entire branch of the industry has developed |
| around just that process. It's called shareware -- software that is offered |
| free to try. If you like it, you are asked to buy it. In return, you get a |
| bound manual and telephone support. |
|
|
| The word processor with which this column was written, PC-Write, is such a |
| program. So is the telecommunications program by which it was filed, ProComm. |
| These programs were both developed by talented independent software developers |
| who took advantage of the unprecedented opportunity the personal computer |
| provided them. All they needed was a PC, a desk, a text editor and a special |
| software tool called a "compiler." A compiler translates computer code written |
| in a language such as Basic, C or Pascal into the binary code that the computer |
| can process. |
|
|
| Once they had written their programs, they included a set of instructions in a |
| text file and a message asking those who liked the software to pay a fee and |
| get the benefits of being a "registered" user. They then passed out copies to |
| friends, uploaded them to computer bulletin boards and made them available to |
| software libraries. Everyone was encouraged to use the software -- and to pass |
| it on. |
|
|
| The ease with which the programs can be copied was, far from a problem for |
| these developers, the very means of distribution. It cost them nothing and |
| they stood to gain if people thought their program good enough to use. And |
| gain they have. Both PC-Write and ProComm have made a lot of money as |
| shareware, and advanced versions have now been released through commercial |
| channels. |
|
|
| The point here is not that it's okay to pirate software. It's not, and it's |
| particularly dishonest to use a stolen program for commercial purposes. The |
| practice of buying one copy for an entire office and having everybody copy it |
| and use the same manual is disgraceful. Software may be expensive, but it's a |
| deductible business expense and worth the price. |
|
|
| At the same time, it's not such a bad thing to use an unauthorized copy as a |
| way of trying out a program before you buy it. The shareware industry's |
| success has proved that can even help sales. |
| _______________________________________________________________________________ |
|
|
| No Hiding From The Software Police October 28, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Elizabeth Weise (The Seattle Times)(Page B9)(Associated Press) |
|
|
| One call to the Piracy Hotline is all it takes for the Software Police to come |
| knocking at your computers. Parametrix Inc. of Seattle found that out last |
| year when the Software Police, also known as the Software Publishers |
| Association, showed up with a search warrant and a U.S marshal to audit their |
| computers. The search turned up dozens of copies of unauthorized software |
| programs and meant a penalty of $350,000 for Parametrix. |
|
|
| The SPA says too many companies "softlift" -- buying only one copy of a program |
| they need and making copies for as many computers as they have. |
|
|
| It seems so easy -- and it's just as easy to get caught. |
|
|
| "It only takes one phone call to the 800 number to get the ball rolling. |
| Anyone taking that chance is living on borrowed time," said Peter Beruk, |
| litigation manager for the Washington D.C.-based SPA. "You can run, but you |
| can't hide." And the stakes are getting higher. A bill is before President |
| Bush that would elevate commercial software piracy from a misdemeanor to a |
| felony. The law would impose prison terms of up to five years and fines of up |
| to $250,000 for anyone convicted for stealing at least 10 copies of a program, |
| or more than $2,500 worth of software. |
|
|
| Those in the computer industry say softlifting will be hard to prevent unless |
| programmers are better policed. AutoDesk Retail Products in Kirkland has met |
| obstacles in educating its staff on the law. AutoDesk makes computer-assisted |
| drawing programs. "The problem is that you end up employing people who don't |
| want to follow convention," AutoDesk manager John Davison said. "We hire |
| hackers. To them it's not stealing, they just want to play with the programs. |
| "You got a computer, you got a hacker, you got a problem." Bootlegging results |
| in an estimated loss of $2.4 million to U.S. software publishers each year, |
| Beruk said. That's out of annual sales of between $6 billion and $7 billion. |
| "For every legal copy of a program sold, there's an unauthorized copy of it in |
| use on an everyday basis," Beruk said. As SPA and its member companies see it, |
| that's theft, plain and simple. |
|
|
| SPA was founded in 1984. One of its purposes: to enforce copyright |
| infringement law for software manufacturers. Since then it has conducted 75 |
| raids and filed about 300 lawsuits, Beruk said. Several of the larger raids |
| have been in the Northwest. The SPA settled a copyright lawsuit against |
| Olympia-based U.S. Intelco for $50,000 in May. Last year, the University of |
| Oregon Continuation Center in Eugene, Oregon, agreed to pay $130,000 and host a |
| national conference on copyright law and software use as part of a negotiated |
| settlement with SPA. The tip-off call often comes to SPA's toll-free Piracy |
| Hotline. It's often disgruntled employees, or ex-employees, reporting that the |
| company is running illegal copies of software programs, Beruk said. |
|
|
| At Parametrix, an investigation backed up the initial report and SPA got a |
| search warrant, Beruk said. President Wait Dalrymple said the company now does |
| a quarterly inventory of each computer. The company brings in an independent |
| company once a year to check for unauthorized programs. |
|
|
| Softlifting, Dalrymple said, can be an easy tangle to get into. "Our company |
| had had extremely rapid growth coupled with similar growth in the number of |
| computers we use," he said. "We had no policy regarding the use of our |
| software and simply didn't control what was happening." |
|
|
| Making bootleg copies of software is copyright infringement, and it's as |
| illegal -- and as easy -- as copying a cassette tape or a video tape. The |
| difference is in magnitude. A cassette costs $8, a video maybe $25, while |
| computer programs can cost hundreds and even thousands of dollars. Audio and |
| video tapes come with FBI warnings of arrest for illegal copying. Software |
| comes with a notice of copyright penalties right on the box. But despite such |
| threats, softlifting isn't taken seriously, said Julie Schaeffer, director of |
| the Washington Software Association. "It's really in the same arena of |
| intellectual property," Schaeffer said. "But people don't think about the |
| hours and hours of work that goes into writing a program." |
|
|
| The Boeing Co. in Seattle is one company that tries hard not to break the law. |
| It has a department of Software Accountability, which monitors compliance with |
| software licensing. |
|
|
| AutoDesk resorts to a physical inventory of the software manuals that go with a |
| given program. If programmers don't have the manuals in their work cubicles, |
| they can be fined $50. |
|
|
| The SPA itself said the problem is more one of education than enforcement. |
| "Because copying software is so easy and because license agreements can be |
| confusing, many people don't realize they're breaking the law," the SPA said. |
|
|
| Feigning ignorance of the law doesn't help. With Microsoft products, a user is |
| liable as soon as the seal on a package of software is broken. "At that point |
| you've agreed to Microsoft's licensing agreement under copyright law," |
| Microsoft spokeswoman Katy Erlich said. "It says so right on the package." |
| _______________________________________________________________________________ |
|
|
| Teenage Pirates and the Junior Underworld December 11, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Justin Keery (The Independent)(Page 31) |
|
|
| "By the end of the year, any schoolboy with |
| a computer who wants Sex will get it." |
|
|
| The first print-run of 100,000 copies of Madonna's Sex has sold out. A further |
| 120,000 will be printed before Christmas, and bookshops have ordered every last |
| one. But parents beware... around 5,000 school children have their own copy, |
| and the number is growing rapidly as floppy disks are circulated in |
| playgrounds. |
|
|
| Viewing the disk edition on a computer reveals television-quality images from |
| the book -- the text, it seems, is deemed superfluous. In disk form the |
| pictures can be copied and traded for video games, credibility or hard cash in |
| a thriving underground marketplace. By the end of the year, any schoolboy with |
| a computer who wants Sex will get it. The unlucky will catch a sexually |
| transmitted disease in the process -- the Disaster Master virus, found on the |
| Independent's copy. |
|
|
| Sex is a special-interest area in the thriving junior underworld of software |
| trading. Circulation of Madonna's pictures among minors with neither the |
| budget nor the facial hair to buy Sex gives Madonna's publishers little cause |
| to fear loss of sales. Neither Secker & Warburg in London nor Time-Warner in |
| New York knew of the unofficial digital edition. But the publishers of |
| computer video games have much to lose from playground transactions. |
|
|
| Sex is not doing a roaring trade, said one schoolboy trader. Video games, with |
| price-tags of up to pounds 40, are what every child wants, but few can afford. |
| But who needs to buy, when your classmates will trade copies of the latest |
| titles for another game, a glimpse of Madonna or a humble pound coin? |
|
|
| Games disks are usually uncopyable. Skilled programmers "crack" the |
| protection, as an intellectual challenge and a way of gaining respect in an |
| exclusive scene, add "training" options such as extra lives, and post this |
| version on a computer bulletin board -- a computer system attached to a |
| telephone line where people log in to trade their "wares". |
|
|
| Most bulletin boards (BBSs) are friendly places where computer freaks exchange |
| tips, messages and "public domain" programs, made available by their authors |
| free of charge. But illegitimate operators, or SysOps, look down on "lame" |
| legal boards, and "nuke" any public domain material submitted to their systems. |
|
|
| The larger pirate boards are the headquarters of a cracking group -- often in a |
| 15-year-old's bedroom. There are perhaps 100 in Britain. Cracked games and |
| "demos" publicize phone numbers, and a warning is issued that copyright |
| software should not be posted --a disclaimer of questionable legality. New |
| members are asked if they represent law enforcement agencies. According to a |
| warning message on one board, at least one BBS in the United States is operated |
| by the FBI. |
|
|
| Your account at a board may not allow you to download until you upload wares of |
| sufficient quality. Games are considered old after a week, so sexy images, |
| "demos" or lists of use to hackers are an alternative trading commodity. |
| Available this week, as well as Madonna, are: "lamer's guide to hacking PBXs", |
| "Tex" and "Grapevine" -- disk magazines for pirates; and demos -- displays of |
| graphical and sound programming prowess accompanied by bragging messages, |
| verbal assaults on rival factions and advertisements for BBSs. According to a |
| former police officer, the recipes for LSD and high explosives have circulated |
| in the past. |
|
|
| The board's "download ratio" determines how many disks are traded for every |
| contribution -- usually two megabytes are returned for every megabyte |
| contributed. "Leech accounts" (unlimited access with no quotas) are there for |
| those foolish enough to spend between pounds 1 and pounds 60 per month. But |
| children can sign on using a pseudonym, upload a "fake" -- garbage data to |
| increase their credit -- then "leech" as much as possible before they get |
| "nuked" from the user list. |
|
|
| The "modem trader" is a nocturnal trawler of BBSs, downloading wares, then |
| uploading to other boards. Current modem technology allows users to transfer |
| the contents of a disk in 10 minutes. A "card supplier" can provide a stolen |
| US or European phone credit card number. The scene knows no language barriers |
| or border checks, and international cross-fertilization adds diversity to the |
| software in circulation. |
|
|
| Through the unsociable insomniac trader, or the wealthier "lamer" with a paid- |
| up "leech account," games reach the playground. The traders and leeches gain |
| extra pocket money by selling the disks for as little as pounds 1, and from |
| there the trade begins. |
|
|
| Some market-traders have realized the profit potential, obtaining cracked |
| software through leech accounts and selling the disks on stalls. Sold at a |
| pocket-money price of pounds 1 per disk, many games reach schools. The trading |
| of copyright software is illegal but the perpetrators stand little chance of |
| getting caught and are unlikely to be prosecuted. |
|
|
| The victims, software houses, suffer real damage. Sales of Commodore Amiga |
| computers equal the dedicated games machines -- the Sega Megadrive or Nintendo, |
| yet sales of Amiga games (on disk and therefore pirate fodder) often reach only |
| one third of the volume of their copy-proof console cartridge counterparts. |
| Despite his preference for Amiga technology, Phil Thornton of System 3 Software |
| is "seriously reconsidering" future development of Amiga games. Myth, a two- |
| year project, sold pitiful amounts. Mr. Thornton was called by a pirate the |
| day it was released -- the game was available on a bulletin board. Because of |
| piracy, the sequel to the successful Putty will be mastered instead for the |
| Nintendo console. |
|
|
| This tactic may not help for long. The cracked Amiga release of Putty carried |
| an advertisement (added by pirates) for a Nintendo cartridge "backup" device. |
| Transferred to disk, a "pirate-proof" console game can be traded like any |
| other. Games for the Nintendo and Sega systems are available on most bulletin |
| boards. |
|
|
| Scotland Yard only takes an interest in bulletin boards bearing pornography, |
| though most also carry pirate software. Funded by the software industry, the |
| Federation Against Software Theft has successfully prosecuted only one board, |
| with "more pending." |
|
|
| This Christmas parents will buy hundreds of thousands of video games. Some |
| children will ask for modems; thus games will be on the bulletin boards by |
| Boxing Day, and the first day of term will see the heaviest trading of the |
| year. |
|
|
| AUTHOR'S NOTE: I considered using a pseudonym for this article. Two years |
| ago, a Newsweek reporter exposed the North American bulletin |
| board network. His credit rating, social security and bank |
| files were altered in a campaign of intimidation which included |
| death threats. Most of those responsible were 15-year-olds. |
|
|