The Battalion. (College Station, Tex.) 1893-current, November 06, 2000, Image 9

Below is the OCR text representation for this newspapers page. It is also available as plain text as well as XML.

    Page 9
Jonday, November 6, 2000
THE BATTALION
euen trade?
'’his rate a J
1 additional
i end to (pi-1
r ote-swapping Websites could affect election; authorities should back off
J ANTED
is aaeptr^i
- assistant. j:-i
690-09W.
ng DJ sJ te
rOpmorcali
30-1:30. Frc'
No phone cad
aalified parHri]
i hours. Peitr:
r son 352W.L-
JCkPrai
ANEOU:!
CYCLE
exhaust. Ires
Vote, 26W6-
3ats, Dogs
makes, ra»6
755.
gray Swtiit
5/each, 364-a
ned with into :|
)3.|i
ATES
ring semes*I
i/2bth, ond
)drm/1btha
260/mo.
, no bills.
aster. Nid
iy. 3bdrm2|
ant paid t
semester r >1
bus routs l
g suNsisr*
ly, new i
:es
.ols-ol* 11 ' 7 '
sount. tr'Y
(6pm4P*l®
Inside H*'
.oweslf® 1 *’
046-6ltf >
"he newest
wave in
American In-
^rnet culture is
[ote-swapping.
Like most new
Jlements of soci
ety, it is under le-
^al fire, specifi-
fally from the
(tate of California.
Vote-swapping is legal under
federal law and should not be
Prohibited by any state’s legal
[iroceedings.
It should be
dewed as an
Igreement be-
Iween citizens to
ichieve their
toals.
Vote-swapping
Concerns the left
[ide of the politi
cal model. Sup-
jorters of
preen Party
:andidate
talph Nader
In toss up
Itates sign up
|o vote for
he Democra-
|ic Party can-
lidate A1
lore.
Their votes are
iwapped for.Nader
rotes in states either
lolidly behind Gore or
Republican Party candi-
late George W. Bush.
This could help Nader toward his
;oal of 5 percent of the popular
'ote, the threshold needed for the
[Green Party to obtain federal match
ing funds for the 2004 presidential
election.
Nadertrader.com encourages
•swappers to “Think locally. Vote
nationally.”
However, the state of California
does not see the vote-swapping phe
nomenon this way.
On Oct. 30, Voteswap2000.com
was closed by California Secretary
of State Bill Jones.
The letter from Jones’ office stat
ed, “The right to free and fair elec
tions is a cornerstone of American
democracy.”
“Any person or entity that tries to
exchange votes or brokers the ex
change of votes will be pursued with
the utmost vigor.”
The basis of closing the site is a
California election law that says
inducing a person to vote a partic-
State helping out Bush.”
American University law pro
fessor Jamie Raskin, whose com
mentary in the Oct. 24 edition of
Slate popularized the idea, has also
implied that Jones’ motivation for
closing the site has Republican
roots.
The creators of the
Voteswap2000.com site have said
they will not relaunch the Web
site, even if political pressure is
eased.
However, numerous other sites.
ular way
is illegal.
This
enables the
state to pros
ecute anyone
who swaps votes.
In a Nov. 1
CNET.com article, attorney Brian
Maas of Sacramento stated, “I
doubt it will hold up in court.
This is a Republican Secretary of
such as Nadertrader.com, continue
operation.
A Justice Department spokesper
son, Chris Watney, said, “In gener
al, it’s a crime to promise voters
anything of value if they vote a cer
tain way. So this system, where
no money is exchanged, is OK.”
Last Thursday, the American Civ
il Liberties Union (ACLU) filed suit
against California Secretary of State
Bill Jones.
The ACLU accuses Jones of
creating a climate of fear to inhib
it free speech by accusing Web
sites that promote interstate “vote-
swapping” of criminal activity
that “corrupts the election
process.”
. The suit is on behalf of anoth
er Californian vote-swapping
Website, Voteexchange2000.com,
that shut down for fear of legal
action after the
Voteswap2000.com shutdown.
Despite the situation in Califor
nia, vote-swapping sites have flour
ished in their two-week existence.
Nadertrader.com reported more than
119,437 hits on Oct. 31.
The site Winchell.com states that
almost 5,000 people have signed up
to swap votes on its Website.
Thanks to the Electoral College,
these small amounts of people swap
ping votes could make a big differ-'
ence in the long run.
In 1960 and" 1976, just 12,000 and
9,000 votes, respectively, could have
changed who was elected president.
In this regard, the state of Califor
nia should change its electoral rules
to mimic federal electoral laws that
do not consider it a crime to swap
votes.
The movement of trading votes
boasts a registered number of users
who could, in theory, swing this
election.
However, like most po
litical campaigns the end
‘result of tactics, such
as vote-swapping,
can never be pre
cisely mea
sured and
thus, their
impact
cannot be
totally un
derstood.
In light of this, California should
back off of vote-swapping sites and
their users.
Reid Bader is a junior
political science major.
Mail Call
Student Senate passage
of Bonfire Resolution
jourse.con’ ;
^^meaningless, hypocritical
ID
Jail 1-80#*
$342/n»’ 1
Jail 268-43®
sts.
me $$. cal11
dahomaP
)SS
h Lowe' 8^1
leeks, i
In response to Chad Wagner’s Nov. 3 Mail Call.
After the Bonfire Resolution was passed, I
had a member of the Student Senate come up
to me and ask, “You mean there are people
who do not agree with Bowen?”
He asked the question with all sincerity —
he simply did not know that there were peo
ple who wanted to have a Bonfire this very
year.
It leaves me wondering how it can be that
a senator, a representative of the student
body, simply did not know about opposition
to Bowen.
I hope this was only one person, but I fear
that it was not.
I do not believe that the percentage of
people against the resolution was only 17.4
percent.
I also do not believe that the sources of in
formation on campus painted an accurate pic
ture of the Bonfire situation, including Bowen’s
plan and the other options.
The spread of anti-Keep The Fire Burning
(KTFB) half-truths is only one example of this
perhaps unintentional propaganda campaign.
In my experience, when explained based on
facts, KTFB looked like a very good idea to
most students.
Finally, I find it laughable that the Student
Senate and other organizations call for unity
among the Aggies when they themselves are
passing the motions causing the rifts.
They start the arguments and then blame
others for continuing them.
Considering the controversy that it possibly
knew would come about — at least, it should
have known if they had listened to their con
stituency — the Student Senate should have
taken a hands-off approach to the whole is
sue.
What good did it do to pass this resolution?
Absolutely none.
It only ended up casting various groups, in
cluding the Student Senate, into bad light.
In my opinion, the Bonfire Resolution was a
meaningless move that only broadened divi
sions and initiated a slew of mudslinging.
It was a bad move for the Student Senate
and definitely hints at a lack of knowledge of
the wishes of the students of Texas A&M.
Chris Carlin
Class of ’03
Unregulated display of
pornography in campus
dormitories disturbing
Pornography is easily accessed through the
University’s computer network.
Evidently, there is no filter in place.
Porn parties are held in dorm rooms. Doors
are left open, allowing passersby to hear the au
dio, and on-screen views are easily seen from
the hallway.
Some perverts even put the computer
speakers in the doorway so the sounds can
clearly be heard up and down the hall.
I would like to know what the University’s poli- *
cy is by allowing porn to be carried on its system.
Illegal material should be filtered. I request
that someone in authority take a careful review
of this matter.
What is the University’s policy if the porn is
purchased as a videotape or CD and is played
in the dorm room?
I was told there are. smoking and alcohol reg
ulation of the dorms.
What rule prohibits pornography and how is
that rule enforced?
Carrilyn Baker
Wichita Falls
Stude”'
99-200"
VIcDof
checks.
The Battalion en
courages letters to the
editor. Letters must be
300 words or less and
Include the author’s
name, class and phone
number.
The opinion editor re
serves the right to edit
letters for length, style,
and accuracy.
Letters may be sub
mitted in person at 014
Reed McDonald with a
valid student ID. Letters
may also be mailed to:
The Battalion - Mail Call
014 Reed McDonald
Texas A&M University
1111TAMU
College Station, Texas
77843
Campus Mail: 1111
Fax: (979) 845-2647
E-mail: battletters@hot-
mail.com
Columns and letters
appearing in The Battalion
express the opinion of the
authors only.
They do not neces
sarily reflect the opinion
of other Battalion staff
members, the Texas
A&M student body, re
gents, administrators,
faculty or staff.
Hacker, Schmacker
Actions promote improved network security
W ith the recent breach of Microsoft’s net
work and the possible seizure of valuable
source codes of Microsoft programs, the
activities of hackers have been brought back into
the media spotlight. Hackers have been a hot
topic over the past few months as several major
Websites like CNET and Yahoo were temporari
ly shutdown when their servers were over
loaded, producing a “denial of service.”
, In truth, throughout the history of personal
computers (which were invented by hackers), the term “hacker” has
been viewed negatively in public opinion. Hackers have been seen as
malicious self-assured parasites engaging in criminal activity. While
this is a fair description of some hackers, it overlooks the benefit to
the digital world.
As society continues to become more dependent on computers
and an increasing number of people put their faith in network securi
ty, it is necessary to clear up some misconceptions about hackers.
First off, it is important to note that most people involved in the
so-called “computer underground” make a very sharp distinction be
tween the terms “hacker” and “cracker.”
In his book Maximum Security: A Hacker’s Guide to Protecting
Your Internet Site and Network, Mark Taber outlines the difference
between the two types of people. Taber writes that hackers are peopfe
who are “intensely interested in the ... workings of any computer op
erating system” and who constantly explore data systems for weak
points, gaining knowledge in the process.
A cracker, on the other hand, is “a person who breaks into or oth
erwise violates the system integrity of remote machines, with mali
cious intent.” While this may seem empty rhetoric put out by the ac
cused to arbitrarily separate themselves from the true criminals, it is
an important distinction most people do not make.
For the most part, hackers (used in the broad sense) are not out to
steal Microsoft’s source code for profit or shut down Yahoo, causing
stock-holders to lose thousands of dollars by the minute.
Anybody who, as a kid, took apart Transformers figures or even
Dad’s electric drill knows the thrill of discovery. Learning how
things work, be it a 7-inch figure of Megatron or a complex, multi-
hubbed T3-routed computer network, is what makes most hackers
tick. Crackers are out to break the world; hackers just want to know
how it works.
As society continues to become more de
pendent on computers and an increasing
number of people put their faith in network
security it is necessary to clear up some
misconceptions about hackers.
Another major misconception is the motivation people have for
breaking into computer networks.
The reward for most hackers is not embarrassing sites like Yahoo
and making them lose revenue, but rather the accomplishipent of
knowing that they were able to find a loophole in a network’s securi
ty and beat the best efforts of highly paid company programmers.
Viewed in that context, hackers usually do not consider their ac
tivities illegal, even though those actions, in legal terms and prece
dents, are. In hackers’ opinion, the crime is not that they broke into a
network, but rather that they were able to break into it in the first
place.
CNN recently held an email interview with the editor of 2600, a
hacker Website and quarterly magazine. The editor, who goes by the
aliens Emmanuel Goldstein, described hackers as having an “idealistic
naivete.” Rather than malevolence, the idealistic notion that every
last network should be completely impenetrable drives a hacker to
find out if one really is.
In his emails to CNN, Goldstein used the example of cracking on
line privacy to support this kinder view of hackers’ motivation. He
wrote “It’s interesting that hackers are the ones who are-always push
ing strong encryption” and “if we were truly interested in getting into
everyone’s personal affairs, it’s unlikely we’d try and show them
how to stay secure.”
A dam without a river behind it will show no cracks. Then, when
the water does flow, all its weak points become apparent.
The crackers who broke into Microsoft and conducted the “denial
of service” attacks should be prosecuted. Their actions go beyond cu
riosity and cross into criminality.
However, the world needs hackers. As data transmissions evolve
from pictures of the grandkids to more valuable information like credit
card numbers, the need for networks to be tested by people outside of
the networks increases. A digital society cannot rely on those who built
a network to find all its loopholes.
The future of hackers and established Websites could be prosper
ous for both. As one anonymous hacker put it in an interview with
ZDTV, the two sides need to communicate with each other. Hackers
run their own Websites and hold conventions that are rarely attended
by non-hackers.
As record companies have found out in their legal battle against
online piracy, it is better to embrace new technology than.^Jestroy it.
If online companies, while prosecuting crackers, also learn what they
can from the action of hackers, they, and society as a whole, will con
tinue to see benefits.
Eric Dickens is a senior English major.
Al or Dubya...
Maybe Ralph or Pat...
Could care less...
Have your voice heard.
In conjunction with tomorrow’s general election, The Battal
ion invites the Texas A&M student body to share its vibws on
the race for president.
Students are.urged to submit letters to the editor out:;, .mg
who they are voting for and for what reasons.
In this case, letters must be 200 words or less and include
the author’s name, class and phone number. The opinion editor
reserves the right to edit letters for length, style and accuracy.
Considering length constraints, it is recommended that the au
thor focus his or her letter on one or two primary campaign issues.