How Pirate BBSs Impact on the Entire Atari Community

 This article is the result of contributions by people from every 

facet of the Atari community.  Many thanks to all the users, 

developers, sysops, and others who provided the investigators with 

information and assistance.


[Note: Stand-alone quotations are framed on the left and right by 

the "~" character.] 


                  Small Developers, Big Business

      How Pirate BBSs Impact on the Entire Atari Community

                by D.A. Brumleve, President, IAAD

                 Copyright 1993 by D.A. Brumleve


The Independent Association of Atari Developers represents over 

sixty companies supporting the Atari ST platform with commercial 

software and hardware.  Now and then a "pirate" BBS will come to 

our members' attention.  We'll capture the file areas and study 

them.  We'll cringe at the download counts and growl at the 

messages about our products.  We'll download copies of our 

products and trace the original owner.  Sometimes we'll even file 

a police report, but the pirate board stays up and callers keep 

calling, downloading, and uploading our programs.  And every time 

we leave this experience further demoralized, less enthusiastic 

about writing for the ST, less enthusiastic about programming in 

_general_.

  

Recently, the IAAD undertook a more comprehensive investigation 

of pirate BBSs in North America.  We solicited information from 

the public -- and the Atari community responded.  In spite of 

some previous experience with pirate boards, I was not at all 

prepared for the amount of pirate activity we found.

 

On each pirate BBS, we found numbers for other BBSs, many of 

which also proved to have copyrighted files.  We found 

concentrated pockets of heavy pirate activity in the Southwest, 

the East, and the Southeast, but we also found isolated pirate 

boards in just about every region of the continent.  We found 

small boards with few users and fewer files; we found big boards 

with hundreds of users offering nearly every commercial program 

on the market of current interest.  We found young teens actively 

involved in criminal activity -- and older, more experienced men 

showing them the ropes.  On every user list, I encountered folks 

I know: the doting father who bought Super Kidgrid for his 

daughter at a show, the user group officer who contacted me for 

IAAD brochures, and many, many others who chat with me from time 

to time on the major pay services.

 

Because of the scope and scale of this activity, I feel that it's 

important to share our findings with the Atari community at 

large.  What follows is the outcome of our investigation.


1. The Damage


~    This BBS DOES NOT support the transfer of any pirated      ~

~    software.                                                  ~

     -- Rats Nest BBS


~    Rats Nest always had some of the best stuff around...      ~

     --Zaphod Beeblebrox on Fawlty Towers BBS


When people pirate programs they would otherwise buy, developers 

and dealers (and distributors) lose sales.  Dealers respond to 

low sales by closing or supporting another platform.  Developers 

respond to low sales by raising their prices or by dropping the 

product; either way, the market is damaged.  


How badly damaged?  Let's take a look at just some of the 

commercial applications and utilities which were until recently 

available on the Rats Nest in Loma Alta CA.  For the sake of 

brevity, I've limited this particular list to products of IAAD 

members and Atari Corporation; thus this list does not include 

applications and utilities by publishers who are not members of 

the IAAD, public domain files, or shareware programs.

                                         _

    ____                           __   / \

   /    \                         /  \  \ /

   \  |  |          ___           |   \ / \ _____   /\  ___

   |     | __  _  __\ /__   /\    |    \| |/     \ / /__\ /__

   |    / /  \/ \/       \ / /    | |\    |   -- // //       \

   |    \| |  \ |\__   __// /     | | \   |   ___\\ \\__   __/

   | |\  | |  | |   | |   \ \     | |  \  |\_____/ \ \  | |

   | | \ |    / |   | |    \ \    | |   \_/        / /  | |

   \ /  \/\__/\./   \ /    / /    \ /             / /   \ /

   / \         |    / \   / /     / \            / /    / \

   \./         |    \./  / /      \./            \/     \./

    |                |   \/        |              |      |

    |          .     .    |        .              .      |

    .                     |                              .

                          .


  *^* (#1)  Applications  *^*


 ### | Filename.Ext   Size     Date   Brief Description                       

     |

   5 | Maxif_3A.Lzh    55665 01-03-92 MaxiFile v3.3a

  13 | Hdsentry.Lzh    33922 01-10-92 HD Sentry... HD optimizer, fixer

  18 | Xboot   .Lzh    37888 01-18-92 X-Boot, like Desk Manager

  19 | Steno   .Lzh    28885 01-18-92 STeno, from Gribnif. Sortof Flakey

  36 | Gramxprt.Lzh    84265 02-05-92 Grammer Expert

  37 | Grnslamc.Lzh    56066 02-05-92 Gran Slam!

  48 | Codeke13.Lzh    98427 02-05-92 CodeKeys v1.3 from Gribnif 

  49 | Mltdsh33.Lzh   217352 02-05-92 MultiDesk Deluxe v3.3

  56 | Knife108.Lzh    87757 02-05-92 Knife ST!

  71 | Lookpop .Lzh   109631 02-07-92 Look It! and Pop It! from Codeheads

  72 | Imagecat.Lzh   290048 02-07-92 ImageCat 2.o

 111 | Hpas_A  .Lzh   247343 02-22-92 High Speed Pascal, Disk 1 of 2

 112 | Hpas_B  .Lzh   269757 02-22-92 High Speed Pascal, Disk 2 of 2

 150 | Tos_206 .Lzh    77116 03-22-92 Tos 2.06 software vertion

 151 | Hyprlink.Lzh   271744 03-28-92 HyperLink

 164 | Chem1_2 .Lzh   217327 04-05-92 Chemistry - Arrakis educational

 165 | Chm2Sts1.Lzh   222763 04-05-92 Chemistry 2 and Stats from Arrakis

 166 | Alg11_12.Lzh   224322 04-06-92 Algebra 1 from Arrakis educational

 167 | Alg12_21.Lzh   247109 04-06-92 Algebra 2  from Arrakis

 168 | Al3_1Tr1.Zip   239499 04-06-92 Algebra 3 Trig 1 from Arrakis

 173 | Neocli  .Lzh    66076 04-19-92 NeoDesk Command Line... nice

 178 | Tos1_4  .Zip   123342 04-25-92 To let ya run those stubern 1.4 tos

soft

 197 | Xboot257.Zip    51420 05-06-92 Newest Version of X-Boot (v2.57)

 221 | Tw13E_A .Lzh   703536 05-17-92 That's Write 1.3 - English - 1/2

 222 | Tw13E_B .Lzh   703536 05-17-92 That's Write 1.3 - English - 2/2

 228 | Gen106_A.Lzh   192808 05-17-92 That's Relative 1.06 1/2  ELITE release

 229 | Gen106_B.Lzh   130361 05-17-92 That's Relative 2/2  ELITE release

 243 | P_Nix15A.Lzh   427252 05-30-92 Phoenix v.1.5 - Disk 1 of 3

 244 | P_Nix15B.Lzh   410836 05-30-92 Phoenix v.1.5 - Disk 2 of 3

 245 | P_Nix15C.Lzh   410836 05-30-92 Phoenix v.1.5 - Disk 3 of 3

 258 | Tracker .Lzh   402564 06-08-92 Rolodex/Client Tracking util

 287 | Mint80A .Lzh   503661 07-20-92 MultiTos v8.0 [1/3]

 288 | Mint80B .Lzh   181797 07-20-92 MultiTos v8.0 [2/3]

 289 | Mint80C .Lzh   263956 07-20-92 MultiTos v8.0 [3/3]

 297 | Scanlitd.Arc    33361 08-01-92 Hand Scanner software

 308 | Codehed4.Lzh   191763 08-08-92 CodeHead Utilities rel.4 (1991)

 317 | Clnup426.Lzh    91942 08-29-92 ICD CleanUP 4.26  Host required

 334 | Edhak236.Lzh    43125 09-12-92 Edhack v2.36 (patched from v2.35)

 335 | Dmd_Edge.Lzh   149439 09-13-92 Diamond Edge  1.0  ELITE release

 352 | Dback250.Lzh    85508 10-03-92 Diamond Back 2.50  latest

 356 | Warp9373.Lzh   338270 10-07-92 Warp 9 3.73  Complete Package

 374 | L_Rad_E1.Lzh   631730 10-18-92 Redacteur 3  1/4 (english) ELITE

release

 375 | L_Rad_E2.Lzh   485004 10-18-92 Redacteur 3 2/3 (eng) ELITE release

 376 | L_Rad_E3.Lzh   660252 10-18-92 Redacteur 3 3/4 (eng) ELITE release

 377 | L_Rad_E4.Lzh   525994 10-18-92 Redacteur 3 4/4 (eng) ELITE  release

 378 | Icdb604C.Lzh    12971 10-18-92 ICD Booter 6.0.4 (crack'd) by Zaphod

 388 | Harleq21.Lzh   360135 11-12-92 Harlequin 2.01  Genesis INC

release(old)

 392 | Adspeed .Lzh    95744 11-20-92 ICD Adspeed Accelerator Software.

 396 | Harl_206.Lzh   354749 11-26-92 Harlequin  vrs. 2.06

 402 | Spectre3.Zip   446203 12-02-92 Spectre 3.0 software

 403 | Xboot300.Lzh    59385 12-04-92 X-Boot v3.00

 408 | Cache_Cr.Lzh    33876 12-13-92 Cache 2.56  ELITE hacked/all features

 410 | Mvg200  .Lzh   488069 12-13-92 Multi Vue Graphica 2.0

 421 | Cardf403.Lzh   186987 01-03-93 Card File 4.03 from Gribnif lates ver

 422 | St_Sutra.Lzh   657385 01-03-93 STSutra ELITE release still beta..

 453 | Uvk5_7  .Lzh   276224 02-01-93 UVK 5.7gb  latest vr

 460 | Falcprgs.Lzh   572035 02-03-93 The Programs included with the Falcon.

 470 | Icdpro68.Lzh   528187 02-06-93 ICD Boot PRO 6.0.8!

 474 | Tos206B .Zip   148016 02-07-93 TOS 2.06 as a program!

 480 | Calpro_2.Lzh   332815 02-18-93 Calligrapher Professional [2/5].

 481 | Calpro_3.Lzh   305163 02-18-93 Calligrapher Professional [3/5].

 482 | Calpro_4.Lzh   406075 02-18-93 Calligrapher Professional [4/5].

 483 | Calpro_5.Lzh   328443 02-18-93 Calligrapher Professional [5/5].

 494 | Mint_81 .Lzh   407624 02-22-93 mint81

 502 | Neo303_1.Lzh   354937 03-06-93 NeoDesk 3.03 "MASTER" disk [1/3]

 503 | Neo303_2.Lzh   328564 03-06-93 NeoDesk 3.03 "EXTRAS" disk [2/3]

 504 | Neo303_3.Lzh    24763 03-06-93 NeoDesk 3.03 Util disk [3/3]

 514 | Cali3_2 .Lzh   273959 03-13-93 Calligrapher 3, 2/4

 515 | Cali3_3 .Lzh   309849 03-13-93 Calligrapher 3, 3/4

 516 | Cali3_4 .Lzh   504895 03-13-93 Calligrapher 3, 4/4

 531 | Cali3100.Lzh   290501 03-23-93 Caligrapher 3 Pro 100% disk 1 CO/ICS

 535 | Mt101   .Tos   294518 03-24-93 MultiTOS v.1.01

 542 | Atariwx1.Zip   285943 03-27-93 Atari Works 1/2

 543 | Atariwx2.Zip   701987 03-27-93 Atari Works 2/2


Fawlty Towers provides an example of typical desktop publishing 

products available on such BBSs:

 

       ////////////////////////         /// ///////////// ///       /// 

      ///         ///      ///         ///      ///       ///     /// 

     ///         ///      ///         ///      ///        ///   /// 

    /////////   ////////////         ///      ///         /////// 

   ///         ///      ///         ///      ///           /// 

  ///         ///      ///   ///   ///      ///           /// 

 ///         ///      ///   ///   ///      ///           /// 

///         ///      ////////////////////////////////////// 

 

\\\\\\\\\\\\\\\\\\\\\\\         \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\ 

     \\\    \\\      \\\         \\\          \\\      \\\ \\\     \\\ 

      \\\    \\\      \\\         \\\          \\\      \\\ \\\ 

       \\\    \\\      \\\         \\\\\\\\\    \\\\\\\\\\\\ \\\\\\\\\\ 

        \\\    \\\      \\\         \\\          \\\   \\\          \\\ 

         \\\    \\\      \\\   \\\   \\\          \\\    \\\        \\\ 

          \\\    \\\      \\\   \\\   \\\          \\\     \\\      \\\ 

           \\\    \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\      \\\\\\\\\\ 

 

  *^* (#8) ST DTP *^*


 ### | Filename.Ext   Size     Date   Brief Description                       

     |

   1 | Avant   .Lzh   171368 02-11-92 ADvant Vector

   8 | Dp_E1   .Lzh   343016 03-17-92 Insane!!! Didot-professional DTP [1/2]

   9 | Dp_E2   .Lzh   414822 03-17-92 The best! Didot-Professional DTP [2/2]

  10 | Siloutte.Lzh   323802 05-11-92 Sillhoutte Vector Graphics/Ray Tracer

  11 | Outline .Lzh   193536 05-13-92 Calamus Outline Art 

  16 | Pgs22_1 .Lzh   322001 07-25-92 Pagestream v2.2 [1/4].

  17 | Pgs22_2 .Lzh   379509 07-25-92 Pagestream v2.2 [2/4].

  18 | Pgs22_3 .Lzh   317627 07-25-92 Pagestream v2.2 [3/4].

  19 | Pgs22_4 .Lzh   428038 07-25-92 Pagestream v2.2 [4/4].

  27 | Ara213  .Lzh   329614 08-06-92 Aribesque 2.13

  34 | Sl_Enga .Lzh   370940 12-17-92 Calamus

  35 | Sl_Eng_B.Lzh   237849 12-17-92 Calamus

  36 | Sl_Eng_C.Lzh   318914 12-17-92 Calamus

  37 | Convec20.Lzh   311683 01-05-93 Convector 2.0

  38 | Cranach1.Lzh   282850 01-05-93 Cool

  39 | Cranach2.Lzh   153775 01-05-93 cool

  40 | Skyplot1.Lzh   248536 01-05-93 SkyPlot disk 1/2

  41 | Skyplot2.Lzh   205589 01-05-93 SkyPlot disk 2/2

  42 | Skyplot3.Lzh   323450 01-05-93 Skyplot disk 3? or 3?

  43 | Cfned22 .Lzh    17227 01-27-93 Takes Serial #'s off Calamus Fonts

  44 | Slmodul2.Lzh    90489 01-27-93 Some Moduals for Calamus

  45 | Genus   .Lzh    80305 02-01-93 Genus v1.78 - Calamus Fonteditor.

  46 | Touchup1.Lzh   362626 02-06-93 Touch Up  disk 1/2

  47 | Touchup2.Lzh   230762 02-06-93 Touch up disk 2/2

  48 | Calpro_1.Lzh   328402 02-24-93 Caligrapher Pro [1/5]

  49 | Calpro_2.Lzh   332815 02-24-93 Cal Pro [2/5]

  50 | Calpro_3.Lzh   305163 02-24-93 Cal Pro [3/5]

  51 | Calpro_4.Lzh   406075 02-24-93 Cal Pro [4/5]

  52 | Calpro_5.Lzh   328443 02-24-93 Cal Pro [5/5]


STampede offers Super Nintendo software, so it's not surprising 

to find a good many commercial ST games as well:

                                               ________  ________  ________

                                              /__   __/\/  _____/\/  _____/\

             _______  ______________          \_/  /\_\/  /\____\/__/\____\/

            /       \/              \       ___/  / / /  /_/__  _\__\/  /\

           /    ____/____     ______/\     /_______/\/_______/\/_______/ /

          /    /\___\___/    /\_____\/     \_______\/\_______\/\_______\/

         /    / /      /    / /                _  ___ __   _  ___

        /    /_/_     /    / /                 / //_ /_/   /_// /

        \____    \   /    / /                 /_/__// /   / //_/  SYSOP

         \__/    /\ /    / /_________  ______________  _____   \   PAK

           /    / //    / / __  /    \/ __ /  __/ __ \/  __/\

     _____/    / //    / / __  / / / /  __/  __/ /_/ /  __/\/

    /_________/ //____/ /_/ /_/_/_/_/__/\/____/_____/____/\/   CO-SYSOP

    \_________\/ \____\/\_\ \_\_\_\_\__\/\____\_____\____\/     SCYTHE

    ATARI ST/STE/TT                  ___  ___  _____        THE THREAT/ICS

   CONSOLES SNES/SMD                / _ \/ _ \/ ___/\         MR.FLY/ICS

U. S. ROBOTICS 14,400 HST          / _  / _  /__  /\/         SLASH/ICS

     24 HOURS A DAY               /____/____/____/ /         BELGARION/ICS

                                  \____\____\____\/            JPC/ICS


  *^* (#1)  GAMES! GAMES! GAMES!  *^*


 #### Filename.Ext   Size     Date   Brief Description                        


     1 Ox_Final.Lzh     4958  1-25-93 Crack of OXYD for ALL Tos +codes

printer

     2 Ace_Boot.Zip   2482o5  1-28-93 Space Ace II [1/6].

     3 Make1.Prg      771554  1-28-93 Space Ace II [2/6].

     4 Make2.Prg      8o174o  1-28-93 Space Ace II [3/6].

     5 Make3.Prg      757744  1-28-93 Space Ace II [4/6].

     6 Make4.Prg      816522  1-28-93 Space Ace II [5/6].

     7 Make5.Prg      773416  1-28-93 Space Ace II [6/6].

    17 Grandad.Prg    121942   2-5-93 Grandad... code revealed ClockWork/ICS

    19 Plan9_A.Lzh    446365  2-1o-93 Plan 9 From Outer Space [1/4] -=ELITE=-

    2o Plan9_B.Lzh    694644  2-1o-93 Plan 9 From Outer Space [2/4] -=ELITE=-

    21 Plan9_C.Lzh    559989  2-1o-93 Plan 9 From Outer Space [3/4] -=ELITE=-

    22 Plan9_D.Lzh    46o123  2-1o-93 Plan 9 From Outer Space [4/4] -=ELITE=-

    23 Bat2A.Lzh      494437  2-11-93 BAT II- Disk 1/5 in English

    24 Bat2B.Lzh      513453  2-11-93 BAT II- Disk 2/5

    25 Bat2C.Lzh      453112  2-11-93 BAT II- Disk 3/5

    26 Bat2D.Lzh      533968  2-11-93 BAT II- Disk 4/5

    27 Bat2E.Lzh      479446  2-11-93 BAT II- Disk 5/5

    28 Ics_Bat1.Lzh   519321  2-11-93 BAT 2 Disk 1/5 *german* +-=I.C.S=-+

    29 Ics_Bat2.Lzh   53322o  2-11-93 BAT 2 Disk 2/5

    3o Ics_Bat3.Lzh   46437o  2-11-93 BAT 2 Disk 3/5

    31 Ics_Bat4.Lzh   542978  2-11-93 BAT 2 Disk 4/5

    32 Ics_Bat5.Lzh   5o5595  2-11-93 BAT 2 Disk 5/5

    36 Ics_Sp21.Lzh   487641  2-13-93 Space Crusade II 1/2 cracked by -=ICS=-

    37 Ics_Sp22.Lzh   39834o  2-13-93 Space Crusade II 2/2

    38 Bat_Ii.Zip      1243o  2-13-93 BAT II Complete docs

    41 Ics_Dl3o.Lzh   77o5o8  2-14-93 Dragons Lair III The Curse Of Mordead

    42 Ics_Dl31.Lzh   585584  2-14-93 Dragons Lair III 2/8  -=ICS=-

    43 Ics_Dl32.Lzh   432o33  2-14-93 Dragons Lair III 3/8  -=ICS=-

    44 Ics_Dl33.Lzh   451928  2-14-93 Dragons Lair III 4/8  -=ICS=-

    45 Ics_Dl34.Lzh   517527  2-14-93 Dragons Lair III 5/8  -=ICS=-

    46 Ics_Dl35.Lzh   5o9381  2-14-93 Dragons Lair III 6/8  -=ICS=-

    47 Ics_Dl36.Lzh   6o3781  2-14-93 Dragons Lair III 7/8  -=ICS=-

    48 Ics_Dl37.Lzh   612524  2-14-93 Dragons Lair III 8/8  -=ICS=-

    51 Galaxian.Lzh   163o72  2-15-93 Galaxian

    52 Cyberlzh.Lzh   6276o5  2-16-93 Cyber Assult [ZX/ICS]  *READ FULL DESC*

    56 Ics_Cybr.Lzh   168957  2-21-93 Cyberdome Hoverjet Simulator  -=ICS=-

    58 Rebelion.Zip   33119o  2-22-93 Rebellion  D'Bug release

    64 Ics_Nigl.Lzh   763445  2-28-93 Nigel Manesll cracked by Belgarion/ICS

    65 Ics_Gob1.Lzh   537814   3-2-93 Gobliins II *THE REAL ENGLISH VERSION*

    66 Ics_Gob2.Lzh   65o934   3-2-93 Gobliins II  2/3  -=ICS=-

    67 Ics_Gob3.Lzh   6o82o1   3-2-93 Gobliins II  3/3  -=ICS=-

    72 Grav2.Zip      247252   3-7-93 Grav II

    74 Kil_Mach.Lzh   283892   3-7-93 Killing Machine

    98 Ics_Civo.Lzh   322966  3-19-93 Civilization 1/4 cr. by Belgarion/ICS

    99 Ics_Civa.Lzh   328o17  3-19-93 Civilization 2/4  -=ICS=-

   1oo Ics_Civb.Lzh   33o664  3-19-93 Civilization 3/4  -=ICS=-

   1o1 Ics_Civc.Lzh   3o3685  3-19-93 Civilization 4/4  -=ICS=-

   1o2 Civiliz.Zip     51863  3-19-93 Civilization full docs

   1o3 Civhints.Zip    15878  3-19-93 Civilization hints and tips

   1o4 Frank.Prg      1461oo  3-2o-93 Frankenstein   CyniX release

   1o5 Crys_A.Lzh     23447o  3-2o-93 CRYSTAL KINGDOM DIZZY Disk 1/2

   1o6 Crys_B.Lzh     532o62  3-2o-93 CRYSTAL KINGDOM DIZZY Disk 2/2

   114 Sleep1.Lzh     781519  3-27-93 Sleep Walker [1/3]  *-CyniX!-*

   115 Sleep2.Lzh     774173  3-27-93 Sleep Walker  [2/3]

   116 Sleep3.Lzh     8o4o2o  3-27-93 Sleep Walker [3/3]

 

I must stress that this is just a small sampling of the kinds of 

offerings we found -- and of the boards we investigated.  Most 

boards (pirate and legitimate) have separate file areas for 

different kinds of products (MIDI, DTP, Applications, Utilities, 

Games, Docs, Graphic Utilities, etc.).  A BBS which offers a 

wealth of Utilities, for example, is likely to have a strong 

database in other file categories as well.  Please note that 

these are just partial lists from a single file category on each 

of these boards.  A truly comprehensive listing would make this 

article intolerably huge.


The IAAD's membership total fluctuates, but right now we are 

holding steady around the 60-member mark.  Products owned or 

distributed by nearly every single member were found on one BBS 

or another during our investigation; some of our members were 

victimized by every pirate board we called.


The self-confessed pirate Troed says this about piracy:

 

~    I NEVER buy a program without knowing if it is what I      ~

~    want .. the ShareWare principle .. but how do I check      ~

~    that with commercial software? By pirating them, using     ~

~    them .. if I like them, I want the original + manual ..    ~

~    I buy it.                                                  ~

     -- Troed on the F-Net, ST Report Conference


but contradicts himself a paragraph later:


~    I bought my STe for $800 one year ago, if I were to        ~

~    registre/buy [sic] all the soft I use I would have to      ~

~    pay something around $10000 .. I can't afford that.        ~

     --Troed on the F-Net, ST Report Conference           


On the one hand, Troed insists that he merely tries out his 

pirated software prior to purchase -- and buys it if he wants it.  

But on the other hand, he _uses_ $10,000 worth of commercial 

products and _cannot_ afford to pay for it.  I would concede that 

it is possible that some software thieves do use their pirated 

downloads in the same way that honest people use commercial demos 

and shareware...some, but not many.


Developers are well aware of "software collectors".  These are 

folks who simply must have a copy of everything, whether it meets 

their needs or not.  The majority of software collectors want the 

real thing, manual and all.  It's our experience that, because 

pirate board users have to pay with an upload (or with money) for 

each and every download, few will bother to download programs they 

don't really want, need, and plan to use.  Because of this, the 

majority of downloads from pirate boards must be viewed as lost 

potential sales.  And those few pirates who are collectors or who 

find they don't need a particular file will hang onto it and later 

share it with others in order to earn upload credits.


We found Warp 9 on nearly every pirate board we called.  CodeHead 

had purchased the QuickST kernal used for Warp 9 from Darek 

Mihocka of Branch Always Software, and Charles Johnson worked 

very hard to refine and extend it in order to deliver to us the 

indespensible utility Warp 9 has become.  Like many CodeHead 

products, Warp 9 is so easy to use that the manual is not needed 

for basic use.  Warp 9 sells for $44.95; a purchase like this 

wouldn't put many STers in the poorhouse.  But how many people 

downloading this program from a BBS would go to the trouble of 

ordering it after "testing it out"?


A good example of the speed at which pirates can destroy the 

sales potential of a new release is shown by the upload date on 

this entry found on the Rats Nest (the notation "Off" indicates 

that this file has been removed, probably when a later version 

superceded it):


336 | Warp9370.Zip  --Off-- 09-13-92 Warp 9 v. 3.70 - Glendale Release


CodeHead released this version on Saturday, September 12, 1992 at 

the Glendale AtariFaire.  By Sunday, before the second day of the 

show was even over, it was already in distribution by pirates.  


What about more expensive products?  At $795, Calamus SL by DMC 

is one of the pricier offerings on the North American market.  

It's a high-end DTP package requiring or benefitting from an 

additional investment in sophisticated Atari hardware, 

accelerator boards, graphics cards, and a large-capacity hard 

drive.


~    It was bad enough to discover Calamus SL on just           ~

~    about every single "pirate" board that was                 ~

~    investigated; it was worse to discover a program           ~

~    written specifically to strip out our serialization.       ~

~    But the real kicker was to discover our entire 600-        ~

~    page manual available for downloading in ASCII.  The       ~

~    people that run these boards are criminals and deserve     ~

~    to be put in jail.  Their "customers", those that          ~

~    frequent these boards, are, at best, petty thieves.        ~

~    What disgusts me the most is how many of these             ~

~    "customers" would never consider themselves thieves        ~

~    even though they are stealing from me, from my family,     ~

~    from my company, and from the Atari community at large.    ~

     --Nathan Potechin of DMC


Since the manuals for such extensive programs are truly required 

in order to make good use of the product, software thieves will 

actually go to the trouble of typing them in or copying them with 

OCR software (which is also conveniently available on these 

BBSs).  Even when a manual is indispensible, the software pirate 

may have no need to actually purchase the program in order to 

make full use of it.


Expensive products get that way because of development and 

production costs.  While the raw materials in a typical software 

package may cost only a few dollars, it takes much more than 

pieces of paper and a disk to make a commercial product.  Calamus 

SL cost DMC hundreds of thousands of dollars for development 

staff alone, _not_ counting expenses related to the writing and 

production of the manual, packaging, marketing, duplication, 

overhead, etc.  A share of this expense must be borne by everyone 

who uses the program in order to recoup costs and keep 

development going.  When people use the program without paying 

for it, this simply does not happen.


Many ST development firms are essentially one-man shows; the 

programmer is also the accountant, the publisher, the editor, the 

secretary.  Developers like these are apt to take software theft 

very personally and feel the impact very intensely.  One 

developer's reaction to his product's proliferation on pirate 

boards began: "I used to be against captital punishment..."


~    ...It hurts, and I don't mean that strictly in a           ~

~    financial sense, either.  We've tried hard, I mean         ~

~    _really_ hard, to provide quality software at a            ~

~    reasonable price coupled with a customer support           ~

~    policy that is second to none...The pirate mentality       ~

~    couldn't care less about us and our ideals of customer     ~

~    service.  And that hurts.                                  ~

     --John Hutchinson of Fair Dinkum

 

~    It's very discouraging to me to see illegal copies of      ~

~    Flash II appear on these so-called pirate boards.  I       ~

~    wonder if the folks that steal our program understand      ~

~    the length of time it took to produce it?  Flash II        ~

~    ver. 2.0 took 3 years to create and spent another year     ~

~    in beta test.  Version 2.1 took close to another year      ~

~    to modify and test.  We're practically giving it away      ~

~    as it is!                                                  ~

     --John Trautschold of Missionware


Word Perfect has been public about having dropped future 

development for the ST and about the reason for that decision: 

low sales.  It can't be a coincidence that Word Perfect for the 

ST was on many boards we called.  


I doubt that STers are any less honest than owners of other 

computer brands, but ours is a small market, and piracy here can 

hurt developers much more than on more popular platforms.  If a 

platform has 10 million users and 90% of them are pirates, the 

software developers still have 1 million potential buyers.  On a 

platform like the ST, with only a few hundred thousand users at 

most by comparison, even if _no_one_ stole software, developers 

would still only have a few hundred thousand potential buyers.  In 

reality, only the most popular products are likely to sell in 

quantities greater than 1000 units in North America.  In the case 

of a coveted and respected multi-platform application like Word 

Perfect, if the program had not been pirated so many times over, 

the sales figures might well have been sufficient to justify 

further development for the benefit of ST owners.


~    I talked to a couple of shops...and...asked if they        ~

~    were interested in carrying any music education stuff.     ~

~    They said that they would love to carry some but could     ~

~    not sell any education, music, or game software due to     ~

~    the fact that if anyone wanted a copy they would pirate    ~

~    it...The only thing they have real success at selling      ~

~    is applications due to people wanting a printed manual +   ~

~    phone support...I didn't make a sale.                      ~

     --Jim Collins of chro_MAGIC


There's a small profit margin in selling computer hardware; 

dealers depend on income from software sales to sustain their 

businesses.  In every area where large pirate boards flourish, 

Atari dealers have closed their doors in spite of a comparatively 

large installed base of users.  "It got to the point where I sold 

only magazines," one former dealer complained.  "They'd buy the 

magazines to find out what programs were worth downloading."  

Honest users in these areas are likely to grumble about the loss 

of the dealers; pirates grumble, too, because their link to new

hardware, service, and magazines has been lost.  Every dealer 

lost means fewer hardware sales for Atari, fewer software sales 

for developers, fewer new members for users groups, fewer 

vendors and attendees at fewer shows.   


With the Atari user base in serious decline, it is more important 

now than ever that piracy not be tolerated.  Make no mistake 

about it: pirated software is _not_ free.


~    Wait-wait-wait... There is nothing positive piracy does    ~ 

~    for a computer company. Nor is it anything BUT negative.   ~

~    I look at it like this...We can always blame Atari for     ~

~    not advertising, but if there were no Atari pirates,       ~

~    more software would have been sold, making the computer    ~

~    more viable for software companies, which in turn makes    ~

~    the computer more desirable for a user. So, basically      ~

~    what I'm saying is, the people who love Atari the most,    ~

~    (us) are the same people who have been killing it for      ~

~    years.  And there was a time when Atari was big            ~

~    EVERYWHERE...There was even an Atari dealer here in my     ~

~    little town of Lake Wales! That's where I bought my 400!   ~

     -- Fruit-WARE Man on Excalibur II BBS


Ultimately, we all pay for piracy one way or another: Atari, 

developers, dealers, and users -- even the pirates.  


2. How it Works


For the uninitiated, let's define some terms.  A "pirate board" 

is a Bulletin Board System (BBS) on which copyrighted commercial 

files are offered to users for downloading without compensation 

for the copyright holder.  Some pirate boards are devoted to this 

activity almost exclusively, and sysops running these boards 

accept only fellow pirates as users.  Other pirate BBSs have 

pd/shareware files areas in addition to hidden commercial areas; 

honest users of such boards may have access only to the 

pd/shareware sections and may be completely unaware of the pirate 

nature of the board.  


Software pirates have a unique lexicon to describe their 

activities.  Users allowed into the commercial areas have been 

granted "elite access".  The commercial files are referred to as 

"warez"; elite file areas on some BBSs include sections on such 

related topics as pornography, defrauding long distance carriers, 

and creating one's own Super Nintendo Entertainment System 

cartridges by burning the software into EPROMs.  Callers who take 

without giving back (download without uploading) are called 

"leeches", and downloadable files may be referred to as 

"leechables".  Defrauding the phone company by using illegal 

techniques to make long distance calls is a mainstay of the art of 

"phreaking".  "Cracked" versions of programs have the copy-

protection and/or registration and serial numbers removed.  "0 

day" is the day a commercial product is officially released.  Many 

pirates have also adopted a manner of writing which flaunts the 

rules of our language, such as swapping lower and upper case, 

substituting "z" for "s" and "ph" for "f", etc.


Successful software theft has two basic requirements: a dishonest 

person willing to give away a copy of a program he has purchased 

-- and another dishonest person willing to accept it.  When this 

activity takes place on a Bulletin Board System, a given copy can 

be distributed rapidly from BBS to BBS, from user to sysop to 

user, all over the world.  One person's willingness to give away 

that first copy can lead to its possession by literally thousands 

of others.  Pirate boards succeed because there are many people 

willing to give or take the copies -- and because the sysop uses 

strategies calculated to maintain and escalate their involvement.


The pirate sysop sets up his BBS, invests in a high-speed modem 

and phone lines, and advertises his number on other BBSs.  When 

the calls start coming in, the sysop scrutinizes each would-be 

user and decides whether or not to validate the new account and 

what level of access to allow.  


~    I've seen credit applications that made more sense.        ~

     -- Sandy Wilson on GEnie, describing a brief encounter 

        with the new user questionnaire on a BBS running 

        RATSoft ST


~    Do you believe in the free distribution of software be     ~

~    it copyrighted or not?                                     ~

     -- Fawlty Towers BBS, from the new user questionnaire


The sysop has two major responsibilities: to keep the board 

running and to ensure security.  He requires full disclosure from 

his callers.  He wants his callers' real names, real addresses, 

real phones, but he is not likely to reveal his own name or 

location.  There is usually an elaborate questionnaire.  The 

sysop may call the new user's voice number to check its 

authenticity.  He may do thorough background checks with other 

information the caller has provided.  He may keep a blacklist of 

uncooperative or non-productive callers (leeches) and share it 

with other sysops.

 

~    NEW USERS: IF YOU DON'T DO A NEW USER UPLOAD YOU WILL NOT  ~

~    GET ACCESS. IF YOU DON'T KNOW WHAT A NEW USER UPLOAD IS    ~

~    YOU DON'T BELONG ON THIS BBS.                              ~

     -- PAK on STampede BBS


The callers themselves supply the warez which keep the board 

active.  They earn credits for uploading, and apply those credits 

toward future downloads.  Pressure to upload a file often begins 

immediately after a new user's account is validated.  It may even 

be part of the new user questionnaire prior to validation.  

Typically, a New User Upload is required before the new user is 

given full access, including the ability to download.  Sometimes 

the sysop will allow the new user to view the files area on the 

BBS in order to entice the caller into uploading a commercial 

file.  On other boards, the commercial files area will stay 

completely hidden from the new user until after he has proved his 

worthiness -- and incriminated himself -- by sharing a commercial 

program of his own.


Like a kid in a candy store, the caller wants one of everything, 

but to get it, he must pay the price.  So he looks at his 

collection and chooses a program he hopes will meet with the 

sysop's approval.  Merely uploading the program may not be enough 

to gain elite access; the upload may be judged on how new it is, 

whether the board already has a copy, or even whether the program 

chosen is useful or well-reviewed.


~    You Understand that you MUST keep a 'reasonable' file      ~

~    Upload/ Download ratio And  "K-Byte" ratio or your         ~

~    Access WILL be Lowered and maybe Deleted!!                 ~

     -- Gold Nugget BBS, from the new user questionnaire


~    Donate!  King Arthur has a very reasonable donation        ~

~    policy that makes it easily affordable to have             ~

~    unlimited download credits...It's so much fun on the       ~

~    Atari (and soon to be Falcon) scene now that there's       ~

~    no excuse for you to miss out!                             ~

     -- Little Flea on Excalibur II BBS


~    ...I started caring, and so the users that DID not post,   ~

~    called within 30 days, and sent new files, got kicked      ~

~    off.. YOU DONT [sic] GET NOTHING FOR FREE!!!               ~

     --The Conjurer, sysop of Outer Planes BBS, on the F-Net, 

       Elite Underground Conference


The sysop uses his warez to entice callers, but he may also 

perfunctorily ax callers who violate his rules or confidentiality 

requirements.  The threat of being cut off from the source keeps 

the callers uploading on a regular basis.  The BBS software keeps 

track of a user's download/upload ratio; ratios that are 

unacceptably high on the download side may result in censure by 

the sysop or loss of access.  If a user has no files of value 

to offer the sysop, he may be able to gain privileges by sending 

in a "donation".  Some sysops forego the euphemisms and announce 

flatly that they charge for greater access.


~    Does anyone have Trump castle? Im [sic] starting to run    ~

~    thin on other boards for credits. I would rather save      ~

~    them for the 0 days stuff. If you have it could you        ~

~    please u/l it.                                             ~

     --Shadow Master on London Smog BBS


In order to keep his account current, the user may be forced to 

call in every few weeks; each call results in a deduction from 

the user's credit total, so he's back looking for new files to 

upload.  If the caller gets those files from another BBS, he'll 

get caught up in a never-ending cycle of uploads and downloads in 

order to keep his accounts active on all the boards he calls.  

Occasionally, he may have to buy a program outright in order to 

upload it.  The caller is reminded of any deficit in his credit 

total every time he calls and may be denied access to certain 

areas until the total is in the black.


~    Well, after being away from the BBS scene for awhile, I    ~

~    have finally found an Elite BBS! (Thanks PAK! :). Anyhow,  ~

~    please send me BBS #/NUPs for boards that carry elite      ~

~    Macintosh or SNES console stuff.                           ~

     -- Nostrildomus on STampede BBS


Some pirate-only BBSs won't allow any but the most serious of 

callers.  They may require all users to have 9600-baud modems or 

greater.  They may limit 2400-baud callers to less desirable 

calling hours.  Some require would-be callers to announce their 

first upload before being allowed access; the sysop then decides 

whether or not this caller will be a valuable contributor on that 

basis.  Some require referrals from other pirate boards.  A twist 

on this is the New User Password, spread from user to user.  

Boards like the Computer Connection will ask for this "NUP" in 

the new user questionnaire.  If the caller cannot provide it, 

access is not granted.  Most boards ask at the very least for the 

names and numbers of the boards the new user already calls; a new 

user who provides incorrect numbers or fictional board names -- 

or who lists only legitimate BBSs -- may be denied access.


The sysop's users provide his warez, and the sysop is a direct 

beneficiary.  Like a golden goose, a single program keeps giving 

and giving.  One user paid for it once, but the sysop can 

distribute it to other users in trade for additional warez or 

money again and again.  The current callers spread the word about 

the BBS's offerings to others, thus increasing the number of 

users frequenting the board and providing uploads.  Some boards 

encourage this by offering download credit for user referrals.

 

While operating a BBS is the least labor-intensive way to 

accumulate warez, it may not be the most efficient way to make 

money.  After all, there's a whole market of non-modem users out 

there just waiting to be tapped.  For a tidy fee, sysops may sell 

copies of their warez via mail order; through schemes like these, 

users can obtain pirated software without the costs of a high-

speed modem and long-distance calls and the pressures of the 

upload/download ratio.


3. Paranoia Strikes Deep


All BBS sysops, even the most responsible, put themselves at some 

risk of legal complications due to messages, e-mail, and files 

posted by users.  It takes a special motivation for a sysop to 

actually promote and encourage an illegal activity which increases 

his risk and liability.  For some, money or software may be 

sufficient motivation.  Others may make up for social inadequacy 

in their offline lives by taking a leadership role online.  And 

many of these seem to enjoy the power they have over their users.  

Like schoolyard bullies, they control and police their turf with 

heavy-handed threats and zero-tolerance judgments, all with the 

protection afforded by their anonymity.  On their own BBSs, they 

call the shots -- and no caller can challenge them on that.


~       """""""""""""""""""""""""""""""""""""""""""""""         ~

~       "  Happy Hideaway BBS is protected under the  "         ~

~       "      FEDERAL COMMUNICATIONS ACT of 1986     "         ~

~       """""""""""""""""""""""""""""""""""""""""""""""         ~

~    Duplication, Re-transmission, or Distribution of any       ~

~    part(s) of this BBS is forbidden without the expressed     ~

~    written permission of the sysops.                          ~

     --Happy Hideaway BBS


~    Re-transmission of material from this BBS is strictly      ~

~    forbidden without written permission of the Sysop(s)!!!    ~

     -- The Ghetto! BBS


Some sysops are very protective of their warez.  They want their 

boards to be the best, to have the most highly-prized files, to 

attract the greatest number of active users.  The sysop may claim 

that his board is protected by international copyright laws; that 

is, he has a copyright on the _collection_ and he has a right to 

control the distribution of any part of it.  A user may download 

from his BBS, but he'd better not find that user uploading the 

same program to a competitor.  In other words, the sysop contends 

that he has exclusive rights to the black-market product!

 

~    "I agree with these conditions, and I am not a             ~

~    member/employee of ANY authority like the Police, or       ~

~    anything like that, nor am I an employee of ANY type of    ~

~    non-public domain software company, Telephone company      ~

~    security or some anti-software piracy organization. I      ~

~    hereby legally bind myself to this, by answering YES       ~

~    in [sic] at the prompt".                                   ~

     -- The Ghetto! BBS


~    This BBS is a PRIVATE SYSTEM.  Only private citizens       ~

~    who are not involved in government or law enforcement      ~

~    activities are authorized to use it...access to this       ~

~    system by ANY law enforcement agency ( Federal, State,     ~

~    Local or other), software company, telephone company,      ~

~    government agency, or anyone affiliated with the above     ~

~    is not allowed.                                            ~

     --London Smog BBS


~    Are you registering on this BBS with the sole purpose      ~

~    of entrapping or aiding in the entrapment of the SysOp?    ~

     -- DarkWorld BBS 


~    "I am not part of ANY law enforcement agency or an         ~

~    employer/employee of any NON-Public Domain software        ~

~    company, or software publisher."                           ~

~    ********************************************************   ~

~    *  By typing YES at the PASSWORD prompt you LEGALLY    *   ~

~    *  BIND yourself to the provisions listed above.       *   ~

~    ********************************************************   ~

     -- Outer Region BBS


Sysops are well aware of the illegal nature of their activity, 

and they may go to great lengths to protect themselves from legal 

action.  Most boards post disclaimers about the sysop's 

responsibility for the activities which take place there.  Others 

try to compromise the submissability of legal evidence by 

requiring investigators to reveal themselves. 


~    You have failed to answer a security validation            ~ 

~    question properly.                                         ~

     --Paris BBS


In the midst of such paranoia, it's not surprising that most 

pirate BBS callers and sysops use pseudonyms.  Frequently a user 

goes by the same pseudonym on every board he calls so that his 

online friends can identify him, send him e-mail, etc.  We've 

identified many pseudonym-users in spite of their attempts to 

hide their identity.  Here are a few examples of the thousands of 

aliases used by callers on pirate boards.  They know who they 

are.  And you may be surprised to find that _you_ know who they 

are, too:


RAHMAN                   Clockwork Orange         Stsoft

Elof                     Zaphod Beeblebrox        Troed

Hack-Hack                KG                       mr.fly/ics

Looms                    Hanzon Horizon           Sparky

Yellow Lightning         PAK                      slash/ics 

The Piper                The Parsec               The Shamus

Mouse Master             Overlord                 RoadKill

The Missing Link         Nightmare                Deadhead Ed

Little Flea              the threat/ics           jpc/ics

belgarion/ics            Disease Factory          Frosty

Sledge                   Archiver                 Spy Guy

Traveler                 The Dragon Lord          Frogger

Shadow                   Skinhead                 rhys/ics

Sparky                   KRS-ONE                  Ice Pirate

Clueman                  Arthur Dent              DANE

Goat Slayer              Norstar                  Speed Demon

Time Warp                Snow Queen               Mr.terry


Who are the people who go by these aliases?  Who calls pirate 

BBSs and who runs them?  A 16-year-old high school junior whose 

supply of British games multiplied out of control when he added a 

high-speed modem to his system?  Yes.  A 32-year-old father of 

two who in all other ways is the very model of integrity?  Yes.  

The good old boys who bring crates of software to swap at your 

users group meeting?  You know it!  A 50-year-old con artist who 

makes thousands of unreported (i.e., tax-free) dollars every year 

by convincing others to give him programs to sell?  Absolutely. 


Several hundred software thieves are so active and on so many 

BBSs that it's hard to imagine that they have time for anything 

else.  The thousands of more casual pirates may have access to 

only a few boards and call only a few times a month.  And whether 

a specific pirate BBS has 50 regular users or 500, its phone 

lines are constantly busy.


4. Organized Crime


As with other criminal activity, the big players in software 

theft have formed alliances to share files, blacklists, message 

networks, and other information.  There are dozens of these 

organizations, some international in scope.  For example, The 

Elite, with world headquarters in the Netherlands, is 

headquartered here by the Outer Region BBS in Colorado and 

Dragon's Pub in Quebec.  The Syndicate (TSC) has representative 

BBSs on three continents and in both hemispheres; the Happy 

Hideaway in Florida serves as its Eastern US headquarters and 

Outer Region as its Western base, while the Shire BBS in Chile 

and the Eagles Nest and Slime City BBSs in Sweden provide an 

international link.

 

Cracking organizations are devoted expressly to undermining copy-

protection and registration strategies used in commercial 

programs.  Outer Planes in Ohio is the world headquarters for the 

cracking ring known as CyniX.  STampede, in Plant City Florida, 

is the International Cracking Society's (ICS) US headquarters and 

features its cracked warez, but these rapidly spread to other 

BBSs across the country and so can be found on many other boards 

as well.  Cracking rings are often multi-platform in scope; 

individual crackers will work on getting around the copy-

protection on the platform of their choice.  They'll share 

cracking tips with and seek advice from ring members working on 

other platforms.  The Pompey Pirates cracking ring, headquartered 

on the Paris BBS in New York City, reportedly has just one 

cracker, who goes by the name of Alien, working routinely on the 

ST, while cracking rings like ICS include many ST enthusiasts.


ICS, MCA, Section 1, CyniX, and other crackers are very well-

connected, using ultra-high-speed modems and multi-frequency 

dialers to call all over the world without long distance fees.  

It's not unusual to find a cracker from one ring visiting the 

headquarters of another and sharing warez.  Cracking rings 

compete vigorously for the first crack of "0 day warez" (brand 

new releases), for the most successful crack, for the toughest, 

etc.


Pirate boards have aligned themselves with legitimate networks as 

well.  Many of the BBSs on which we discovered commercial files 

areas are linked to the F-Net -- and, of course, so are plenty of 

responsible BBSs.  For example, according to a CrossNet Conference 

Node Listing, The Time Warp BBS (F-Net node 99) serves as the lead 

node for the "Elite Underground" F-Net conference, which also 

includes Starlight BBS (node 287), Darkworld BBS (node 305), Outer 

Region BBS (node 469), Steal Your Face (node 489), Outer Planes 

(node 558), Gold Nugget BBS (node 622), London Smog BBS (node 

632), Million Dollar Saloon (node 639), Speedy's Raceway (node 

689) and H.B. Smog (node 712).  According to another CrossNet 

Conference Node Listing, The Gold Nugget serves as the lead node 

for The "Pompey Pirates Elite" (not directly associated with the 

Pompey Pirates cracking ring mentioned above) F-Net conference; 

The Prairie Chip II BBS (node 45), The Blackhole (node 612), The 

Temple of Doom (node 595), and Spider-man's Web (node 711) are 

among the 9 BBSs involved in this conference.  The "Upper Echelon" 

F-Net conference ties US and Canadian boards by serving callers on 

the Gold Nugget in Ohio, Steal Your Face in New Jersey, Space 

Station BBS (node 248) and London Smog in California, Million 

Dollar Saloon in Texas, Paybax BBS (node 307) in Delaware, and 

Aardvarks from Mars (node 38) and Dragon's Lair (node 87) in 

Ontario.


Conferences of this kind allow pirates from great distances to 

"get to know" each other, to exchange files as well as messages, 

to solicit calls to their favorite BBSs.  Participation in these 

conferences establishes an online identity; a pirate recognized 

from his posts on one node of a conference is likely to be 

accepted without question when logging on as a new user on 

another node in the same conference.


There are also smaller F-Net-related conferences for pirating 

discussions.  For example, according to a CrossNet Conference 

Node Listing, a Local Area Private Elite Conference with a lead 

node at the Outer Region links with three other BBSs in Colorado, 

including RingWorld (node 643), The Grave Diggers Tomb (node 

186), and BILINE BBS (node 423).  Outer Planes is the lead node 

for the 4-node "Console" conference, a message thread devoted to 

topics related to pirating SNES and other game console warez.


5. Ill-Begotten Goods, Fawlty Filez...

 

Pirating hurts the entire ST community by discouraging third-

party development, closing down dealerships, and raising software 

prices.  But is it a "good deal", at least in the short run, for 

the pirates themselves?  Let's ask 'em:

 

~    Mock me not!  Civilisation is great.. Except it is         ~

~    cracked poorly...Can't win with the Cynix crack...         ~

     --Mark Anthony on Outer Planes BBS


~    ...ok, then how do you save????? I love this game, but     ~

~    I dont know how to save it.. ahhh                          ~

     --The Conjurer on Outer Planes BBS


~    Bad news... using UVK, just found out that the disk has    ~ 

~    a VIRUS on it called the 'DIRECTORY WASTER'.  After        ~

~    twenty copies of it are made, it wipes out your disk.      ~

~    Use UVK to kill the virus, and be careful with swapping    ~

~    disks around this one.                                     ~

     --Sparky on Outer Planes BBS


~    Has anyone set up Speedo GDOS , I seam [sic] to run        ~

~    into probles .. [sic]                                      ~

     --The Mixer on Time Warp BBS


~    Can someone please send me a working ASCII import          ~

~    module for pagestream. I cant seem to get TEXT files       ~

~    to import correctly. Either the text doesnt [sic]          ~

~    fill the full width of the screen or I get no              ~

~    paragraphs(ALL run together)                               ~

     --Red Dragon on Time Warp BBS


~    Has anyone got it to work? I tried to get it to run on     ~ 

~    a Floppy based 520ST (1meg) and on my TT030 and on both    ~

~    I got 4 bombs!                                             ~

     --The Parsec on Rats Nest BBS


~    Has anyone gotten this to load? My install disk just       ~

~    freezes. Any ideas?                                        ~

     --Bullshot Xxx on the F-Net, Upper Echelon Conference


~    ...my UTIL_2.PRG doesn't work, it was corrupt in the       ~

~    original download...                                       ~

     --Jason Elite on the F-Net, Upper Echelon Conference


~    For some reason I can't get other vers. of TOS to boot     ~

~    from the HD without sticking a disk in with the HD boot    ~

~    in the Auto folder. ANYONE know how I can get TOS 1.4      ~

~    and 1.0 to off the HD and recognize the hard drive         ~

~    without sticking a disk in?...It's just a hastle [sic]     ~

~    to use the Hard Drive when you have to boot from disk      ~

~    first...                                                   ~

     --Ice Pirate on Rats Nest BBS


~    I have the two lharc's of Epic, and after lharc, they      ~ 

~    come out to 900+K MSA files... Well, MSA won't format      ~

~    a disk large enough to put them on..  What kind of         ~

~    formatting program can I use to format my disks that       ~

~    large.. Or can I?                                          ~

     --Cronos on Fawlty Towers BBS


~    I was wondering if anyone else has been messing with       ~ 

~    the latest Cubase 3 crack. I've had some success and       ~

~    have even used the SMPTE options via my C-Lab              ~

~    Unitor-N box, but when I try to use the "edit" functions   ~

~    more than a few times (sometimes even the first try),      ~

~    I get an "Internal Error" message and the program locks.   ~

     --MIDIMUCK on Fawlty Towers BBS


~    I wouldn't use it if your [sic] working on a paying gig,   ~ 

~    Just cause It's unreliable, especially when in SMPTE lock. ~

~    I've had this same problem recently, I ended up x-fering   ~

~    the stuff over to another sequencer.                       ~

     --KG on Fawlty Towers BBS, replying to MIDIMUCK about the

       cracked version of Cubase 3


~    Yes, there are 2 different cracks of version 3.x, none     ~

~    of them working properly. The best Cubase crack I know     ~

~    is version 2. I heard though that it gives problems        ~

~    when you use Midiex...                                     ~

     --X-tian on Fawlty Towers BBS


~    yeah, I would [sic] do any real work on it.  I lost 2      ~

~    songs with it.                                             ~

     --KG on STampede BBS, replying to a message about a 

       cracked version of Cubase


~    Has anybody had a problem with the Cynix crack of          ~

~    Frankenstein? I haven't been able to get it to work on     ~

~    either of my computers. It bombs badly.                    ~

     --PAK on STampede BBS


~    I've been having problems with some files I D/Led          ~

~    (Ultima 6 is flaky and Lost Vikings doesn't work at        ~

~    all).                                                      ~

     --Nostrildomus on STampede BBS


~    I sure wouldn't even attempt any 'serious' work project    ~

~    with that 'crack'...                                       ~

     --Sparky on STampede BBS


~    Do you have a version of NEW ZEALAND STORY which works     ~ 

~    past the first city?                                       ~

     --The Shamus on STampede BBS


~    HEY!! Will someone PLEASE UPLOAD a FULLY working version   ~ 

~    for KOBOLD 2 I've had so many different version from       ~

~    different people and they are  ALL bad !!!                 ~

     --Sidewinder on Outer Region BBS


~    I have an elite copy of Calligrapher and it doesn't        ~

~    support ASCII text files, so you can only work with        ~

~    .CAL files (files made by Calligrapher)  Also it doesn't   ~

~    have keyboard equivalents (a pain)                         ~

     --Frogger on the F-Net, Elite Underground Conference 


Pirates aren't entitled to support from commercial developers and 

are often working without any documentation, so they are very 

likely to encounter problems with their warez.  


The real version of Calligrapher, for example, has several import 

and export options, including ASCII.  It has configurable keyboard 

commands.  Frogger's version might have been hacked in a way which 

destroyed these capabilities, or he simply might not know how to 

take advantage of them because he has no documentation or support.  


When pirates spread disinformation about the warez they use, 

people may think they are speaking out of knowledge of the actual 

commercial release.  In this way, a pirate's ill-informed comments 

about products can discourage sales to others.


The software they use -- like the sysops and other pirates with 

whom they associate -- cannot be trusted.  Cracked software is 

prone to be flakey.  And the same type of people who think it's 

acceptable to crack and steal software are also the type who write 

viruses and unleash them on others, so even files which haven't 

been cracked must be viewed with suspicion.


In addition to the fear of loss of access, the pressure to upload 

or pay, lack of official and informed support, an online 

environment of suspicion and paranoia, and abandonment of ethical 

principles, pirates must also contend with software that is 

unreliable and potentially dangerous.  The pirate pays a heavy 

price.  Pirated software is _not_ free -- for anybody.


6. Phreaking, Copyright Infringement, Pornography, and the Law


The users pay the sysop of a pirate board, either by sending a 

check for greater access or by offering up files they've 

purchased in exchange (or both).  Heavy users must invest in 

expensive hardware, such as high-speed modems.  And for many 

callers, there's a long-distance charge.


~    If any of the USA callers has MCI you can put this bbs     ~

~    on you [sic] Friends and Family list and save yourself     ~

~    about 3 cents a minute. Just say that the phone number     ~

~    is for a data line and they usually don't ask anymore      ~

~    questions.                                                 ~

     -- PAK on STampede BBS


~    ...there are high speed users around, and considering      ~

~    other really good Atari boards are out of state, $.25      ~

~    per call is as cheap as anyone could ask for. I'm          ~

~    starting to think "elite" is dead in the Tampa area,       ~

~    as far as Atari is conserned [sic].                        ~

     --PAK on Master Lazarus BBS, explaining the poor 

       attendance rates by local pirates on local BBSs


~    Wanted... original suppliers                               ~

~              graphic artists                                  ~

~              another support bbs                              ~

~              calling card suppliers                           ~

     --Quattro of the CyniX cracking ring on the F-Net, 

       Elite Underground Conference


~    When I hit a special key, my Bluebox plays a little        ~

~    melody.....                                                ~

     -- STampede BBS


~    I call the whole world for the same price.                 ~

     -- Troed on Rats Nest BBS


Not all those living far from a BBS pay long distance charges, 

however.  Some boards share calling card numbers (belonging to 

innocent victims, presumably) so that the phone company will 

charge the users' calls to someone else.  Sometimes users as far 

away as Chile or Sweden manage to make calls at no cost by 

fooling and defrauding their long distance carriers.  In the old 

days (defined here as the 70's), this was achieved by building a 

"bluebox" and installing it in one's phone line.  Today, it's 

easily done in software.  The caller's ST simulates the tones 

recognized by the telephone system.  Calls are routed all over 

the world and back, typically through South America, in order to 

confuse the system and avoid detection.  This activity is just as 

illegal as copyright infringement, and it's also better 

understood as a crime by police.  Many times a pirate board is 

closed down not because of the illegal transfer of software, but 

rather because information on blueboxes was available for 

download.

 

~    Word is around town that there are feds looking for        ~

~    Pirate BBS's. I know weather to belive [sic] it but        ~

~    it could be time for another big bust like there was       ~

~    four years ago. Supposedly a Big BBS in OHIO just got      ~

~    nailed real bad!. Freaky as hell.                          ~

     --Mind Eye on Thieves Guild BBS


There are, in fact, many approaches to shutting down pirate 

boards.  Copyright infringement is one obvious track.  The 

Software Publishers Association is a watchdog agency which works 

with the FBI to shut down large-scale BBS operations.  There are 

legal departments at major computer, game machine, and software 

companies devoting time and effort to this task.  There's the IRS 

connection for unreported caller "donations".  Some boards come 

down because of the availability of pornography.  There are a 

variety of criminal laws related to activities common on pirate 

boards, and, especially in cases of copyright infringement, civil 

law may offer the most effective route to compensation for the 

victims.


When a board is busted by the authorities, the related equipment 

and property is usually seized.  Any records of callers, caller 

donations, etc., are seized along with that equipment.  Callers 

could be charged with conspiracy.  For this reason, it's not wise 

to have one's real name, address, and real phone show up in the 

records of a pirate board, even though the sysop adamantly 

insists upon it and uses verification checks to enforce it...  


7. Spotting a Pirate Board


~    Many people may not realize that software pirates cause    ~

~    prices to be much higher, in part, to make up for          ~

~    publisher losses from piracy.  In addition, they ruin      ~

~    the reputation of the hundreds of legitimate bulletin      ~

~    boards that serve an important function for computer       ~

~    users.                                                     ~

     --Ken Wasch, Executive Director of the SPA, as quoted in

       STR #915 


I recently logged on to the Polish Hideout BBS in Southern 

Illinois.  What a contrast it presented to the pirate boards I've 

been investigating!  The questionnaire asked only for my name, 

contact information, and type of computer.  Validation was 

immediate and I was granted access to all message bases and file 

areas on that very first call!  I wasn't under any obligation to 

upload before downloading.  There was no pressure to compromise 

my principals nor temptation to indulge in criminal activity.  

The messages from the sysop were friendly and inviting.  The 

Polish Hideout is _not_ a pirate BBS.


It can be tough to differentiate a pirate board from a legitimate 

one if one has not been granted access to the elite areas.  

Sometimes non-elite discussion or file areas can provide hints, 

but it's not sure-fire.  For example, although many pirate boards 

can boast of extensive pornography collections, some BBS sysops 

who wouldn't tolerate commercial files will nevertheless offer 

pornography; the existence of pornographic files does not in and 

of itself indicate a pirate board or clientele.  Even the 

existence of an isolated commercial file in the downloads is not 

evidence of intentional piracy.  From time to time, every BBS 

receives a commercial upload or two; sometimes the sysop overlooks 

the file or doesn't recognize it as commercial and leaves it in 

the download area.  Such oversights and accidents do not even 

remotely correspond to the kinds of activity we have encountered 

on BBSs where software theft is encouraged.


A typical pirate board includes a highly aggressive (and often 

hostile and suspicious) new user questionnaire.  It is often 

necessary to provide referrals of some kind, and the questions 

are likely to assume dishonesty on the part of the new user.  

Pirates, as a rule, are not nice guys, and the new user is 

usually made to feel very uncomfortable.  The new user may be 

required to "sign" disclaimers.  The Other BBS list is likely to 

include some other pirate boards.  If the users adopt the lexicon 

of piracy ("elite", "warez", "philez", etc.), If ThErE aRe LoTs 

Of PhRaSeS wRiTtEn LiKe ThIs, if the board associates itself with 

a pirate syndicate or network, if it has numerous known pirates 

as callers, if there is aggressive insistence on the maintenance 

of download/upload ratios, if deadbeats are threatened with loss 

of access, if phreaking files are available online, chances are 

very good that the caller has stumbled onto a pirate BBS.


There are legitimate reasons why a BBS sysop might want accurate 

contact information from his callers.  There are also good 

reasons in many cases for offering a few private file and message 

areas.  Most BBSs, pirate and legitimate, require validation, 

usually by phoning the caller's number.  Such features are not 

unusual, but if combined with heavy-handed warnings and threats, 

they tip the user off to the nature of the board.  It should be 

noted that legitimate pd/shareware BBSs far outnumber the pirate 

boards.  The confusion between the two is most unfortunate.


~    I...have callers uploading commercial software and         ~

~    giving me a hard time because I don't have an "elite"      ~

~    area, even though they see a message when they log on      ~

~    as a new caller that this board does not support           ~

~    piracy...It's a _risk_ to run a BBS, and not many ways     ~

~    to protect the investment.                                 ~

     --sysop of a legitimate BBS


If a board you call has an occasional commercial file, be sure to 

point it out to the sysop for his own protection; a responsible 

sysop will avoid commercial offerings.  PD/shareware BBSs perform 

a much-needed service in supporting our Atari community; the IAAD 

applauds and encourages this effort.


If you suspect -- or _know_ -- that a board you call offers 

numerous commercial files, however, please bring it to the 

attention of the IAAD (online addresses are available at the end 

of this article).  Your anonymity is assured.  We are already 

intimately familiar with dozens of boards, but additional 

information is always welcome.


8. The Moral Toll: As the Twig is Bent...


~    Right and wrong now seem the same                          ~

     -- Rats Nest


As a parent, I'm concerned about the numbers of young people 

logged on to pirate boards.  These kids put themselves in a very 

vulnerable position.  In earning their right to download, young 

callers are implicated in the illegal activity.  The adults who 

run and participate on these boards set an example which could, 

by extension, lead to ignoring the laws which govern other areas 

of their lives.  Do these kids also shoplift, steal from other 

kids' lockers, buy termpapers to submit as their own?  Children 

learn to run and to use pirate boards from adults whose character 

is questionable by definition.  When a child has such a sysop as 

a role model, what does that spell for his future?


Like the proverbial stranger who offers candy, these criminals 

lure teenagers and young adults with promises of free software in 

exchange for their services.  The service, of course, is to 

provide more free software -- which the sysop can then use to lure 

more callers and to keep his current clientele calling back.  The 

first step is to inspire fear; this is achieved right off the bat 

with a new user questionnaire threatening denial of access if 

caller doesn't provide just the right answers.  And the second is 

to force the caller to incriminate himself with his initial 

upload.  Once the kid begins downloading and playing commercial 

games he could never afford to buy, the pressure cycle of 

upload/download counts begins.


~           GENESIS COPIER (super magic drive)                  ~

~    My son is selling his copier for the Genesis for:          ~

~    $275.00  That includes the copier, drive and power         ~

~    supply.                                                    ~

     --Little Lulu on the F-Net, Pompey Pirates Elite

       Conference


While many of the software thieves we've encountered are young, 

in their teens and early twenties, others are old enough to be 

parents (or even grandparents!).  Few pirate boards have an 

"educational warez" category in their files areas, so my own 

products are rarely found, but parents do download plenty of 

games.  I wonder about the children who use the programs that 

Dad or Mom has stolen.  Do they know that the program could be 

purchased with a manual?  Do they learn about hidden features 

from friends who have the real thing and then wonder why their 

parents never told them they could do that?  If and when these 

children do learn that Dad has stolen some software they've 

enjoyed, do they respect and trust their father less -- or do 

they simply adopt his dishonest character as their own?


~    Pirating is dishonest.  Honorable people don't do          ~

~    dishonest things.  If you want to publicly proclaim your   ~

~    untrustworthyness [sic], go right ahead.  But don't        ~

~    expect anyone to ever trust you.  Or respect _your_        ~

~    rights.                                                    ~

     -- Myeck Waters, responding to a pro-piracy post on the 

        F-Net, ST Report Conference

 

~    BYE! (Click)                                               ~

~    NO CARRIER                                                 ~

     -- Computer Connection


_________________

The author takes no responsibility for errors in spelling, 

punctuation, judgment, or logic in quotations; these are 

reprinted as written.


Copyright 1993 by D.A. Brumleve

 

This file may be transmitted only in its entirety, with all 

portions unedited and intact.  The author reserves _all_ rights 

regarding distribution and republication, with the exception that 

this file may be posted in its entirety and without additions on 

BBSs everywhere, especially on pirate boards.  If you find it 

already posted on your local pirate board, please upload a second 

copy, and a third...


Editors and others wishing to republish this article are advised 

to contact the IAAD and the author on the major online services:

     GEnie: PERMIT$

     CIS:   76004,3655

     Delphi:DABRUMLEVE


The IAAD welcomes tips about pirate activity.  Please contact us 

at the online addresses listed above.




Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS