MESSAGE
DATE | 2001-12-26 |
FROM | Ruben Safir
|
SUBJECT | Subject: [hangout] Lock up all the youngen ones now
|
http://www.nytimes.com/2001/12/25/technology/25HACK.html?pagewanted=print
Trying to Keep Young Internet Users From a Life of Piracy
By JOHN SCHWARTZ
hen law enforcement agents seized 129 computers in 27 cities recently in a coordinated assault on online piracy, they focused much of their effort on colleges like Duke, the Massachusetts Institute of Technology and the University of California at Los Angeles.
They were probably too late.
As children have access to computers earlier and earlier in their educational careers, experts in piracy, hacking and other forms of Internet mischief say that any effort to tackle the illicit trade in digital goods - including video games, computer software, music and even movies - should be looking at a younger crowd.
"By the time we get them, they already believe it's right," said David J. Farber, a professor of computer science at the University of Pennsylvania and the former chief technologist of the Federal Communications Commission "If you're willing to bootleg music, you're willing to bootleg anything."
In fact, America's rush to the online world has created an enormous population of ever-younger computer pirates, say experts in the field. They compare the situation with giving every student a car without providing drivers' education classes.
"We've got to focus on preparing kids to use the Internet in a safe and responsible manner," said Nancy E. Willard, director of the Responsible Netizen Center for Advanced Technology in Education at the University of Oregon. She has prepared course materials and guides for teaching computer ethics in secondary schools to help them meet the requirements of the Children's Internet Protection Act of 2000. The law, which requires schools and libraries to use filters or similar technology to protect children from objectionable materials, also requires an "Internet safety policy" to prevent "unauthorized access, including so-called `hacking,' and other unlawful activities by minors online."
Online, the searching and trading for wares goes on day and night. In an online discussion last week using technology known as Internet Relay Chat, the "warez" channel, or chat room, was busy. Warez is slang for software that has been "liberated" from encryption. On the channel, rapid-fire bursts of messages requesting digital goods - games, DVD's, business software - were interspersed among the random comments and insults:
Queball: "Anyone know where I can a copy Sybex virtual lab . . ."
Porrin: "-at-find 3d studio para *pc*."
Nellie: "Anyone here have save the last dance movie. msg me."
The patter and trading are constant, yet this is small time. Far bigger players operate quietly with vast storage and bandwidth, cracking the copyright protection that keep the strings of ones and zeroes that underlie everything from the video game Tomb Raider to the movie "Harry Potter and the Sorcerer's Stone" and making them available in a limitless five-finger discount store in the ether.
The recent raids focused mainly on the networks of hard-core traders in a handful of groups with names like DrinkOrDie, which tended to trade for fun and not for profit. Among the computers seized were ones belonging to business executives and administrators of computer networks.
Unauthorized copying and distribution of software is a global headache for the industry, which claims that more than a third of all business software used is pirated, according to an annual report commissioned by the Business Software Alliance, a trade group. In fact, the situation has improved markedly since 1995, when the figure was closer to half of all software. In the United States the figure has dropped to 24 percent, the software. In the United States the figure has dropped to 24 percent, the lowest rate in the world, because of a vigorous education and enforcement efforts and until recently a strong economy.
Over all, the cost of business software piracy alone was $11.75 billion in 2000, the group reported, although this amount assumes that any illicitly used software would otherwise have been bought by users.
The greatest incidence of software piracy, according to industry experts, occurs in business, where many employees of a firm will share a single copy of a program. Internet trading pales by comparison, said Bob Kruger, vice president for enforcement at the Business Software Alliance. But it constitutes "the biggest threat in the future," he said, "as people become more accustomed to getting digital works online."
The software industry does not break out the statistics for piracy in higher education, but "anecdotally, we see a lot of activity coming out of university areas," said Ric Hirsch, senior vice president for intellectual property enforcement at the Interactive Digital Software Association, the trade association representing computer and video game publishers.
Eugene H. Spafford, a professor of computer science and director of Purdue University's Center for Education and Research in Information Assurance and Security, said if students lack the ethical preparation when they begin using the Internet, things quickly spiral out of control when they reach college, where they have lots of free time, peers they want to impress and high bandwidth.
That is to be expected, Professor Spafford said, since college is a time for testing boundaries. "We do encourage them to try new things, meet new people," he said. "It's not that surprising that they try to break some of the bounds, and not just in computing."
But fixing the problem would be expensive and intrusive, he said. He questions whether the monitoring required might be worse than the disease.
"When you have one person who goes bad out of 40,000, do you want to watch that other 39,999 to catch that one?" Professor Spafford asked. "To find the people doing the bad things might involve violating the privacy of all those other people. As a society is that the kind of trade-off we want to make?"
Professor Farber agreed. Closely monitor students, he warned, and "pretty soon you'll be looking at what they write and what they read."
Some experts say they wish the corporations pushing for ethical behavior among customers would show more of it themselves.
Many students bristle at the newest legal tool for protecting copyright, the Digital Millennium Copyright Act. It has been criticized as heavy handed, tipping the balance of copyright law away from principles such as fair use.
Many also note, Professor Willard said, a federal court ruling that Microsoft (news/quote) had abused its monopoly power.
That is how "Incursion" sees it. The Internet name belonged to a college student from Texas, who was looking for games recently on the Warez channel. The student said he generally pays for the software he uses but does like to sample the goods before buying. "If I feel it's a quality game," he said, "I'll buy it."
Asked whether using software without paying for it is wrong, he replied, "depends what you consider wrong." Pressed for further explanation, he wrote, "A monopoly is wrong."
Taking apart rationalizations like that one are part of what Professor Willard tries to do in materials that she has prepared for teenagers.
But she added that the argument has power - and that recklessness and rebellion are not just part of adolescence but of the American character. "We applaud the U.S. patriots," she said, "who hacked onto the British tea ship and destroyed their product."
Ultimately, time might be on the companies' side. The environment changes so quickly that even would- be pirates say they find it hard to keep up.
Jeremy, who goes by the online name "Xelsed" and asks that only his first name be used, insisted that he did not trade software any more - which did not explain what he was doing in the Warez channel typing "!gimme stuff," a request he saw others type and which he figured could lead to offers. Even if he wanted to, though, he was out of touch, he said, having not visited the site in several months.
The old formula for a request for software - typing "/xdcc" and then the name of a program - did not seem to resonate in the current slang. "Now I really dont know what to do," he types in the hasty, error- riddled style of instant messages. "I have to face the fact that well i'm dated."
Jeremy said he was 27 and out of college and added that he feels he has outgrown the warez world.
"To be frank," he wrote, "I think its probably alot easer to buy the game then to spend the hours neccacery to make `friends' and get into the sceen."
-- __________________________
Brooklyn Linux Solutions __________________________ http://www.mrbrklyn.com - Consulting http://www.brooklynonline.com - For the love of Brooklyn http://www.nylxs.com - Leadership Development in Free Software http://www.nyfairuse.org - The foundation of Democracy http://www2.mrbrklyn.com/resources - Unpublished Archive or stories and articles from around the net http://www2.mrbrklyn.com/mp3/hooked.mp3 - Spring is coming.... http://www2.mrbrklyn.com/downtown.html - See the New Downtown Brooklyn....
1-718-382-5752
____________________________ New Yorker Linux Users Scene Fair Use - because it's either fair use or useless....
|
|