SOFTWARE PIRACY: AN ALTERNATIVE VIEW Jim Thomas and Gordon Meyer (5 March, 1990) ------------------------------------------------------------------- Jim Thomas is an associate professor in Sociology. Gordon Meyer received his M.A. in Sociology in 1989. They are currently researching the computer underground from which the data for this note are drawn. ------------------------------------------------------------------- The university policy against computer software piracy has been widely publicized, including in a recent issue of Computing News (December, 1989). There is no question that the university must protect itself against actions of the NIU community for which it could be held legally accountable. However, based on our current research of the "computer underground" and the active- ities of "phreaks, hackers, and pirates," we find no evidence to support the many value judgments offered in the rationale circu- lated by the university. These normative judgments contribute to law enforcement tendencies to expand the definitions of illegali- ty and, as one recent government publication has done, to place piracy in the same category of crimes as "computer theft" and "theft of trade secrets." Our intent here is neither to justify software piracy nor to challenge University policy. However, be- cause the area of copyright and "computer abuse" law is so new, and because these laws tend to rely in media and other depictions of "computer underground" activeity as criminally sanctionable, we challenge conceptions of underground activeity that seem unsub- stantiated by evidence. The university's normative justification of the University policy can be summarized in three broad principles: 1. Software piracy shows disrespect for the intellectual work and property of others and subverts the mission of higher education. 2. Software piracy deprives authors of a "fair return" for their work. 3. Software piracy is unethical. These assertions help justify criminalization and corresponding sanctions. However, The data from our research do not support these judgments for several reasons. First, software pirates make a clear distinction between "pirates," persons who collect and share software for as hobbyists akin to stamp collectors, and "bootleggers." Bootleggers are persons who distribute software for material gain. Pirates may copy and install programs, but generally their goal is to collect, and they derive satisfaction from running programs for which they have no need and that they will rarely, if ever, use. Second, software pirates--despite the claims of the SPA (Software Publishsers Association)--report spending considerably more money purchasing software than the average user. Many of these purchases are for trading, and there is a strong ethos in the pirate world that if one uses a program, one purchases it. Reasons for purchasing include documentation, acquiring informa- tion about and discounts on updates, and on-line technical sup- port. It is quite common for pirates to purchase identical pro- grams to those they have already obtained. Third, the "no return" policy of most software merchandisers makes it difficult for potential buyers to assess the ability of a program to meet their needs or work adequately on their system. Piracy creates an informed public by assuring that programs are available for pre-testing, by providing a pool of reasonably lit- erate users to publicly discuss the merits of competing products, and to even offer technical assistance to those who have pur- chased a program. In this sense, the "unauthorized" copying of software can be seen as contributing to the university mission of expanding knowledge, of preventing exploitation of consumers, and above all, to the expansion of computer literacy contributing to the free flow of information. Fourth, pirates spend a considerable sum on their hobby. Among the most active topics of discussion among pirates are those of the need to endlessly upgrade, the endless purchase of diskettes on which to store programs, and--with the popularity of 9600 baud modems--the advantages of investing between $600-900 for expanding telecommunications hardware. Because most pirates exchange software across telephone lines, piracy has benefitted telephone companies because of the growth of Bulletin Board Sys- tems (BBSs). Our data indicate that an average monthly phone bill of $200 or more is common, and active pirates easily double that cost. Fifth, there is simply no evidence to corroborate the claim that piracy deprives authors of revenue. Our data suggest that pirates annually purchase no less than three times the 1.5 pro- grams the SPA estimates for the "average" user, purchases direct- ly related to the hobby rather than a need. Further, few students or faculty could afford the price of Dbase 4 and other large pro- grams, and few people could afford to spend several thousand dol- lars a year on computer games. Traded programs would simply re- main unpurchased. Because piracy creates an interest in software, expands consumer literacy, and contributes to a "user culture" that benefits the industry as a whole, we suggest that without such a culture there would be less interest in software and, con- sequently, less revenue for authors. Sixth, the claim that piracy is unethical is usually a glib one made without a strong rationale. Although we make no metaphy- sical claims here, we do suggest that the appeal to ethic in at- tempts to criminalize piracy is far too serious to be so glibly asserted, and the underlying issues require far more research and debate. Even in the debates over VCR reproduction and photocopy- ing books or journal articles, the appeal to ethics was never ad- duced as stridently and self-righteously as in discussions of software piracy. The rapid growth of computer and telecommunications technol- ogy brings with it new ethical, legal, and practical questions of the nature of "private property," free and open access to infor- mation and resources, and definitions of "authorship." Few among us condone any form of predatory behavior. However, we find equally disturbing the tendency to assumptively assert claims and definitions that rightly should be brought into a public forum for debate rather. The University has the obligation to protect the law, but it also has an equal obligation to do so responsibly without contributing to the current hysteria surrounding alleged "computer crime." =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ The preceding article is from the Computer Underground Digest Issue #1.03 / File 5 of 6 available on USENET, BITNET, Compuserve, and various other interesting places. Gordon and I wrote the following for Northern Illinois University's THE COMPUTING NEWS. It was not published for two reasons. First, despite the fact that our comments are drawn from an on-going research project, it was considered "opinionated." We were in a catch-22 situation: We were required to work within severe space constraints, and could present neither data nor other research citations, yet, we were also advised not to make the article "too scholarly" for a general audience. Second, and apparently most important, we were told that if the article were published, it would appear to violate the NIU policy, so was inappropriate. Only through the most adept feat of intellectual aerobics could such an interpretation be made, because we were then, and our article is quite explicit that, in no way opposing the policy, but only the rhetoric in which it was presented. Our goal was to debate the rhetoric, not the policy. Such a rationale strikes us as the CHILLING EFFECT that has occured because of recent hysteria surrounding alleged computer abuses, and we find it quite ironic that a University, normally the cornerstone of debate, seems to be stifling debate on this issue. So, we present it here instead. We have seen an earlier version of this article floating around on bulletin boards, but this is the final, "official," version. Jim Thomas / Gordon Meyer ******************************************************************