279 lines
12 KiB
Plaintext
279 lines
12 KiB
Plaintext
|
December 1989
|
||
|
FBI 1.
|
||
|
|
||
|
|
||
|
THEFT OF COMPUTER SOFTWARE: A NATIONAL SECURITY THREAT
|
||
|
|
||
|
By
|
||
|
|
||
|
William J. Cook
|
||
|
Assistant U.S. Attorney
|
||
|
Chicago, IL
|
||
|
|
||
|
|
||
|
|
||
|
-- Between July and September 1987, a Chicago
|
||
|
youth attacked AT&T computers at Bell Labs in
|
||
|
Illinois and New Jersey, at a NATO missile
|
||
|
support site in North Carolina, and at Robbins
|
||
|
Air Force Base in Georgia, stealing software
|
||
|
worth $1.2 million and causing $174,000 worth
|
||
|
of damage. (1)
|
||
|
|
||
|
-- In October 1988, Scotland Yard arrested an
|
||
|
English attacker who had broken into over 200
|
||
|
military, corporate, and university computers
|
||
|
in the United States and Europe. The
|
||
|
indication was that he planned to extort money
|
||
|
from one of the victim corporations. (2)
|
||
|
|
||
|
-- In November 1988, a college undergraduate
|
||
|
planted a computer virus that temporarily
|
||
|
disabled 6,000 computers on the U. S. Army
|
||
|
research computer network (ARPANET). (3)
|
||
|
|
||
|
As evident by these accounts of computer piracy, computer-aided
|
||
|
attacks on Government and corporate networks are becoming more
|
||
|
numerous and sophisticated. While estimates vary, computer industry
|
||
|
sources indicate that computer-related crime (including software
|
||
|
theft) annually costs U.S. companies as much as $5 billion per year,
|
||
|
with each incident costing approximately $450,000. (4) More
|
||
|
importantly, however, the infiltration and theft of computer files is
|
||
|
a growing Federal crime problem, since many such actions jeopardize
|
||
|
the security and defense of the United States.
|
||
|
|
||
|
This article gives a brief overview of the theft and illegal
|
||
|
export of computer software. It also details steps taken by the U.S.
|
||
|
Government to protect national security and defense information with
|
||
|
the intent of curtailing and hopefully eliminating the occurrence of
|
||
|
such actions in the future.
|
||
|
|
||
|
INTERNATIONAL COMPUTER HACKERS
|
||
|
|
||
|
While most computer attacks are committed by hackers who are not
|
||
|
agents of foreign government, the growing attention of Eastern Bloc
|
||
|
governments to hackers indicates that these nations clearly recognize
|
||
|
the benefits of using them to expose openings in U.S. computer
|
||
|
networks.
|
||
|
|
||
|
In March 1989, it was disclosed that West German hackers
|
||
|
sponsored by Eastern Bloc intelligence agencies had been
|
||
|
systematically searching for classified information on Government
|
||
|
computers throughout the United States through a weakness in a
|
||
|
computer network at a California university. (5) The following
|
||
|
month, Canada expelled 19 Soviet diplomats for wide-ranging espionage
|
||
|
operations to obtain Canadian defense contractor information for
|
||
|
military and commercial purposes. (6) And in December 1988, a search
|
||
|
warrant filed by U.S. Customs agents in Chicago disclosed that a
|
||
|
confederate of the Yugoslav Consul- General in Chicago was using a
|
||
|
hacker to attack defense contractors by remote access in order to
|
||
|
steal computerized information. According to the affidavit, the
|
||
|
information obtained by the hacker was subsequently smuggled out of
|
||
|
the United States in diplomatic pouches with the help of the Counsel-
|
||
|
General.
|
||
|
|
||
|
Public access information and published reports reflect that
|
||
|
Soviet efforts to obtain technical information are not an illusion.
|
||
|
A major daily newspaper reported that the Soviet Union was actively
|
||
|
fostering hacker-to-hacker ties between the Soviet international
|
||
|
computer club and computer firms and hackers in the United States,
|
||
|
Britain, and France. (7) Another newspaper account told of the Soviet
|
||
|
Union setting up programmers in Hungary and India for the purpose of
|
||
|
translating and converting U.S. origin software to the format of
|
||
|
Soviet and Warsaw Pact country machines. (8) Then in March 1989, a
|
||
|
member of the Soviet military mission in Washington, DC, was arrested
|
||
|
and expelled from the United States for attempting to obtain
|
||
|
technical information about how U.S. Government classified
|
||
|
information is secured in computers. (9)
|
||
|
|
||
|
The Soviet's main targets are U.S. Government agencies, defense
|
||
|
contractors, and high-tech companies and are purportedly backed by a
|
||
|
$1.5 billion annual "procurement" budget. Further, Soviet satellite
|
||
|
countries have become very active in the Soviet high technology
|
||
|
procurement effort. For the past several years, Hungarian,
|
||
|
Bulgarian, Yugoslavian, and Polish intelligence officers and their
|
||
|
agents have participated in the high-tech theft effort, along with
|
||
|
agents from Vietnam, North Korea, and India. (10) Also, Cuban and
|
||
|
Nicaraguan intelligence officers are using front companies in Panama
|
||
|
to obtain U.S. technology. (11)
|
||
|
|
||
|
News accounts suggest that these efforts are successful; 60-70%
|
||
|
of the technology is obtained, while 90% of nonclassified high
|
||
|
technology data is acquired. More than 60% of the stolen technology
|
||
|
comes from the United States. (12)
|
||
|
|
||
|
As a result, the U.S. technological "lead" over the Soviets has
|
||
|
gone from 10-12 years in 1975 to 4-6 years in 1985. (13) And the
|
||
|
savings to the Soviets has been impressive. In 1978 it has been
|
||
|
estimated that the Soviet Union saved $22 million in research and
|
||
|
development costs by stealing U.S. technology; the following year,
|
||
|
they saved $50 million. (14) Between 1976 and 1980, the Soviet
|
||
|
aviation industry alone saved $256 million in research and
|
||
|
development because of stolen U.S. technology. (15) More
|
||
|
significantly, much of the stolen technology is critical to the
|
||
|
national security and defense of the United States.
|
||
|
|
||
|
PROTECTING TECHNICAL DATA
|
||
|
|
||
|
In 1984, the U.S. Department of Commerce placed expanded export
|
||
|
controls on computer software as part of its general protection of
|
||
|
technical data deemed vital to the national defense and security of
|
||
|
the United States. However, export control in this realm is an
|
||
|
enormous challenge since modern technology allows the criminal to
|
||
|
steal restricted software stored on Government and corporate
|
||
|
computers by remote access from a personal computer anywhere in the
|
||
|
world. Literally, an international border becomes established where
|
||
|
a telephone line plugs into the computer modem.
|
||
|
|
||
|
OBSERVATIONS
|
||
|
|
||
|
Several observations can be reached from this mosaic.
|
||
|
Obviously, U.S. taxpayers are subsidizing the modernization of the
|
||
|
Soviet military establishment. And it is more economical for the
|
||
|
Soviets to steal U.S. technology than to fund and develop their own
|
||
|
research and development capabilities. More importantly, however,
|
||
|
the United States needs to do a better job protecting its technology.
|
||
|
|
||
|
As noted previously, in response to the Soviet "tech-threat,"
|
||
|
the United States and other countries expanded controls on
|
||
|
high-technology computer software by placing them on the Commodity
|
||
|
Control List or Munitions List. Commerce Department and State
|
||
|
Department licensing officers require that validated export licenses
|
||
|
and end-user assurances are obtained before software named on these
|
||
|
lists are exported. Both the Commerce and State Departments
|
||
|
routinely call in Defense Department personnel to analyze these
|
||
|
export requests.
|
||
|
|
||
|
Prosecution for illegally exporting computer data and software
|
||
|
can be brought under several sections of the U.S. Code. (16)
|
||
|
However, before prosecution under these sections can be successful,
|
||
|
several areas must be developed in the computer industry and the law
|
||
|
enforcement community.
|
||
|
|
||
|
o Corporations should consider placing export
|
||
|
control warnings on sensitive software
|
||
|
programs, which would clearly assist U.S.
|
||
|
efforts to enforce national export laws that
|
||
|
require defendants have specific knowledge of
|
||
|
export restrictions when they export the
|
||
|
computer data.
|
||
|
|
||
|
o Federal agents need to become oriented to the
|
||
|
computer industry and computers to overcome
|
||
|
computerphobia.
|
||
|
|
||
|
o Corporate and Government hiring must be done
|
||
|
with great care when the employees will have
|
||
|
access to computer networks or trash from
|
||
|
computer centers.
|
||
|
|
||
|
o Computer security specialists and systems
|
||
|
administrators must be alert to internal
|
||
|
unauthorized access and external hacker
|
||
|
attacks and the potential ramifications of
|
||
|
activities. They must also be aware that the
|
||
|
modem plug-in on one of their computers could
|
||
|
be the international border in the export
|
||
|
violation and that computerized log records
|
||
|
may be the only evidence of espionage of
|
||
|
"tech-theft."
|
||
|
|
||
|
o Federal agents and computer security
|
||
|
professionals must recognize the need for
|
||
|
rapid mutual cooperation and communication,
|
||
|
with security professionals providing
|
||
|
background information on the attacked
|
||
|
computer network and assisting with Federal
|
||
|
investigations and search warrant efforts.
|
||
|
|
||
|
CONCLUSION
|
||
|
|
||
|
It is folly to assume that U.S. industry can continue to make
|
||
|
sufficient research and development advances each year to ensure that
|
||
|
the United States keeps an edge on Warsaw Pact countries. These
|
||
|
countries continue to rob the United States of advanced technological
|
||
|
information critical to the defense and security of this country.
|
||
|
The taxpayers and consumers writing the checks for Government and
|
||
|
private sector technological research and development deserve a
|
||
|
coordinated Federal law enforcement and computer industry response
|
||
|
that recognizes software and computer-related engineering as one of
|
||
|
our country's greatest resources.
|
||
|
|
||
|
FOOTNOTES
|
||
|
|
||
|
(1) ComputerWorld, February 20, 1989.
|
||
|
|
||
|
(2) Sunday Telegraph, October 23, 1988.
|
||
|
|
||
|
(3) The Boston Globe, November 14, 1988.
|
||
|
|
||
|
(4) ComputerWorld, April 3, 1989.
|
||
|
|
||
|
(5) Hamburg Ard Television Network, March 2, 1989; see also, Cliff
|
||
|
Stoll, "Stalking the Wiley Hacker," Communications of the ACM, May
|
||
|
1988.
|
||
|
|
||
|
(6) Reuters, June 28, 1988.
|
||
|
|
||
|
(7) The Washington Post, January 2, 1989.
|
||
|
|
||
|
(8) The New York Times, January 29, 1988.
|
||
|
|
||
|
(9) Reuters, March 9, 1989.
|
||
|
|
||
|
(10) "Soviet Acquisition of Militarily Significant Western
|
||
|
Technology: An Update," published by the Central Intelligence Agency,
|
||
|
1985.
|
||
|
|
||
|
(11) The Los Angeles Times, November 21, 1988.
|
||
|
|
||
|
(12) Supra note 10.
|
||
|
|
||
|
(13) Ibid.
|
||
|
|
||
|
(14) Ibid.
|
||
|
|
||
|
(15) Ibid.
|
||
|
|
||
|
(16) 118 U.S.C. sec. 1029 (fraudulent activity in connection with
|
||
|
using accessing devices in interstate commerce); 18 U.S.C. sec. 1030
|
||
|
(remote access with intent to defraud in connection with Federal
|
||
|
interest computers and/or Government-owned computers); 18 U.S.C. sec.
|
||
|
1343 (use of interstate communications systems to further a scheme to
|
||
|
defraud); 18 U.S.C. sec. 2512 (making, distributing, possessing, and
|
||
|
advertising communication interception devices and equipment); 18
|
||
|
U.S.C. sec. 2314 (interstate transportation of stolen property valued
|
||
|
at over $5,000); 17 U.S.C. sec. 506 (Copyright infringement
|
||
|
violations); 22 U.S.C. sec 2778 (illegal export of Department of
|
||
|
Defense controlled software); 18 U.S.C. sec. 793 (espionage,
|
||
|
including obtaining and/or copying information concerning telegraph,
|
||
|
wireless, or signal station, building, office, research laboratory or
|
||
|
stations for a foreign government or to injure the United States); 18
|
||
|
U.S.C. sec. 2701 (unlawful access to electronically stored
|
||
|
information); 18 U.S.C. sec. 1362 (malicious mischief involving
|
||
|
the willful interference with military communications systems); 18
|
||
|
U.S.C. sec. 1962 (RICO--20 years/$25,000/forfeiture of property for
|
||
|
committing two violations of wire fraud and/or transportation of
|
||
|
stolen property).
|
||
|
================================================================
|
||
|
|
||
|
The EPIC Project, a nonprofit public benifit corporation founded
|
||
|
last year by a handful of college students, is advising the
|
||
|
Chairman of the American Bar Association Technology and the Courts
|
||
|
(Sundevil) Subcommittee looking into federal court rule changes.
|
||
|
|
||
|
These proposed rule changes are a direct result of actions taken by
|
||
|
the Seceret Service, FBI and other enforcement agents in Operation
|
||
|
Sun Devil. Rules of evidence, warrants, et al, are in drastic need
|
||
|
of change to address the constitutional and civil rights issues at
|
||
|
odds with technology.
|
||
|
|
||
|
I would very much like to hear from anyone with constructive input
|
||
|
or suggestions for needed changes.
|
||
|
9-18-90
|
||
|
|
||
|
Jeff Aldrich Fax: (707) 425-9811
|
||
|
The EPIC Project Voice: (707) 425-6813
|
||
|
P.O. Box 5080-341 Data: 1:212/105@fido.org
|
||
|
Fairfield, CA 94533 jefrich@well.sf.ca.us
|