942 lines
47 KiB
Plaintext
942 lines
47 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.15 (May 2, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
|||
|
GAELIC GURU: Brendan Kehoe
|
|||
|
|
|||
|
+++++ +++++ +++++ +++++ +++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: Moderators Corner
|
|||
|
File 2: CU in the News
|
|||
|
File 3: EFF/SJG Sue Secret Service, Bill Cook, Tim Foley, et. al.
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
|||
|
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
|||
|
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
|
|||
|
(2) cudarch@chsun1.uchicago.edu;
|
|||
|
(3) dagon.acc.stolaf.edu (130.71.192.18).
|
|||
|
E-mail server: archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed
|
|||
|
that non-personal mail to the moderators may be reprinted unless
|
|||
|
otherwise specified. Readers are encouraged to submit reasoned
|
|||
|
articles relating to the Computer Underground. Articles are preferred
|
|||
|
to short responses. Please avoid quoting previous posts unless
|
|||
|
absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Contributors assume all
|
|||
|
responsibility for assuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: May 2, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.15: File 1 of 3: Moderators Corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
The "CU in the News" stories have piled up, so this issue is devoted
|
|||
|
to clearing some of the longer files that were bumped from previous
|
|||
|
issues. Just in case you missed the following news blurbs:
|
|||
|
|
|||
|
++++++++++++++++++++++
|
|||
|
CONGRATS TO NEWSBYTES
|
|||
|
+++++++++++++++++++++++
|
|||
|
|
|||
|
NEWSBYTES, an invaluable source of computer-related information,
|
|||
|
was awarded the "Best On-Line Publication" by the Computer Press
|
|||
|
Association. Newsbytes publishes approximately 30 technology-related
|
|||
|
stories daily on GEnie, and is also carried on America OnLine,
|
|||
|
NewsNet, Dialog and foreign wire services. It is supported by 18
|
|||
|
reporters in bureaus world-wide, and reaches an audience of
|
|||
|
4.5 million.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
+++++++++++++++++++
|
|||
|
Anti-Encryption Bill
|
|||
|
+++++++++++++++++++
|
|||
|
|
|||
|
%Snuck into the language of a federal anti-terrorism Bill was the
|
|||
|
following small section. If passed, the Bill would require
|
|||
|
those who write encryption programs to leave in a "backdoor" that
|
|||
|
would allow decryption for "law enforcement" purposes. This would
|
|||
|
defeat the purpose of encryption. Apparently the FBI was pushing
|
|||
|
for passage of this section. Information and up-dated discusssions
|
|||
|
can be found on The Well in Sausalitoito (Calif) and in RISKS Digest.
|
|||
|
Thanks to Mike Riddle for his contribution%.
|
|||
|
|
|||
|
102ND CONGRESS; 1ST SESSION
|
|||
|
IN THE SENATE OF THE UNITED STATES
|
|||
|
AS INTRODUCED IN THE SENATE
|
|||
|
|
|||
|
S. 266
|
|||
|
|
|||
|
1991 S. 266
|
|||
|
|
|||
|
SYNOPSIS:
|
|||
|
A BILL
|
|||
|
To prevent and punish domestic and international terrorist acts, and for
|
|||
|
other purposes.
|
|||
|
|
|||
|
DATE OF INTRODUCTION: JANUARY 24, 1991
|
|||
|
|
|||
|
DATE OF VERSION: JANUARY 24, 1991 -- VERSION: 1
|
|||
|
|
|||
|
SPONSOR(S):
|
|||
|
Mr. BIDEN (for himself and Mr. DECONCINI). . . .
|
|||
|
|
|||
|
%About 450 lines of death penalty and anti-terrorism discussion
|
|||
|
omitted%
|
|||
|
|
|||
|
Subtitle B-Electronic Communications
|
|||
|
SEC. 2201. COOPERATION OF TELECOMMUNICATIONS PROVIDERS WITH LAW
|
|||
|
ENFORCEMENT.
|
|||
|
It is the sense of Congress that providers of electronic
|
|||
|
communications services and manufacturers of electronic communications
|
|||
|
service equipment shall ensure that communications systems permit the
|
|||
|
government to obtain the plain text contents of voice, data, and other
|
|||
|
communications when appropriately authorized by law.
|
|||
|
|
|||
|
%A substantial lobbying effort may be needed to block this, which
|
|||
|
many see as a potential threat to privacy rights%.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: The CU in the News
|
|||
|
Date: May 1, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.15: File 2 of 3: The CU in the News ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: the moderators' <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: BBS estimates
|
|||
|
Date: 19 Apr 91 02:54:22 EDT
|
|||
|
|
|||
|
One of the dilemmas facing researchers covering the Net is estimating
|
|||
|
how many small BBSs exist at any given time. Thankfully there is no
|
|||
|
national registration of systems, but still it is useful to have some
|
|||
|
idea of the type of impact BBS regulation (either by decree or de facto)
|
|||
|
could have. I recently found some more estimates of the number of BBSs and
|
|||
|
modems in this country.
|
|||
|
+++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Source: "Modem Mania: More Households Go Online Every Day"
|
|||
|
Dennis B. Collins
|
|||
|
California Computer News
|
|||
|
April 1991
|
|||
|
p26
|
|||
|
|
|||
|
Get your scissors. Here come some statistics you'll want to save. I've
|
|||
|
been doing a lot of research lately regarding computer bulletin board
|
|||
|
systems (BBSs). Prodigy's research and development department said that
|
|||
|
30 percent of American homes have some sort of PC. Of these homes, 20
|
|||
|
percent have a modem. This means that six percent of all homes have the
|
|||
|
capability to obtain computer data via phone line! The Information Age
|
|||
|
is now in its infancy - it is here and it is real. It is also growing at
|
|||
|
a rate of 400 percent a year.
|
|||
|
|
|||
|
CompuServe and Prodigy both claim 750,000 paying customers. Prodigy
|
|||
|
stresses that their figures reflect modems at home only. They have no
|
|||
|
count of businesses. Local system operators tell me a significant number
|
|||
|
of calls originate from offices - their "guesstimate" is that office use
|
|||
|
may increase the figures by another 20 percent.
|
|||
|
|
|||
|
(...)
|
|||
|
|
|||
|
The question keeps coming up: How many BBSs are there? Nobody knows.
|
|||
|
In Sacramento, the best guess is about 200. Worldwide, the number is
|
|||
|
quickly growing. About two years ago I obtained a list of BBS members of
|
|||
|
FidoNet. At the time there were about 6,000 member systems. The
|
|||
|
January 1991 Node lists over 11,000 BBSs worldwide! It is important to
|
|||
|
note that there are several large networks, of which FidoNet is only
|
|||
|
one. U.S. Robotics claims to have a list of 12,000 BBSs that use their
|
|||
|
modems in this country alone. [if this estimate is based on their sales
|
|||
|
of HST modems to sysops, it is open to debate. - Moderators'] It is clear
|
|||
|
that millions of individuals are using PC telecommunications and the numbers
|
|||
|
are getting larger.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: The moderators' <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: Pirate or Bootlegger?
|
|||
|
Date: 18 Apr 91 01:12:07 EDT
|
|||
|
|
|||
|
In the past we have complained about the software industrys' lack of
|
|||
|
differentiation between software piracy and the sale of bootleg copies
|
|||
|
of commercial products. However a recent article in "Lan Times"
|
|||
|
reflected a new care in correctly identifying two distinct segments of
|
|||
|
the software copyright problem. We reprint the first few paragraphs
|
|||
|
here as an illustration of how clarifying each area (piracy vs
|
|||
|
bootlegging) can aid in understanding a complex problem. We hope that
|
|||
|
other journalists, and even the SPA, adopt this more precise language in
|
|||
|
future treatments of the topic.
|
|||
|
++++++++++++++++++++
|
|||
|
|
|||
|
Source: "Software Piracy Now Costs Industry Billions: But software
|
|||
|
authentication devices can protect your investment from thieves"
|
|||
|
Charles P. Koontz
|
|||
|
Previews
|
|||
|
LAN TIMES March 18, 1991
|
|||
|
pp75-76
|
|||
|
|
|||
|
About a zillion years ago when I first read _Swiss Family Robinson_, I
|
|||
|
always wondered why the Robinson family was so fearful of Malaysian
|
|||
|
pirates. After all, I was accustomed to the proper civilized pirates in
|
|||
|
all the Errol Flynn movies. But it turns out the Malaysian variety were
|
|||
|
much worse. The same is true of the pirates that prey on the modern
|
|||
|
software industry.
|
|||
|
|
|||
|
In the software industry, the civilized pirates are the ones who copy an
|
|||
|
occasionally program from a friend without paying for it.. Most of us at
|
|||
|
lest know someone who's done it. I've heard of places where none of the
|
|||
|
software in an office is legal.
|
|||
|
|
|||
|
Civilized pirates are still thieves and they break the law, but they
|
|||
|
have a better attitude. They should look into shareware as an
|
|||
|
alternative source. It's almost as cheap and often every bit as good.
|
|||
|
|
|||
|
In the software industry, the crook who makes a living by making and
|
|||
|
selling copied software is the modern equivalent of a Malaysian pirate.
|
|||
|
The fact that a lot of them are located in the orient where piracy may
|
|||
|
not be illegal helps the analogy. It seems however that the practice is
|
|||
|
spreading to more local climates.
|
|||
|
|
|||
|
The process is fairly simple and requires only a small investment to get
|
|||
|
started. At the simplest level, all the pirate needs is a copy of a
|
|||
|
popular program, a PC, and a place to duplicate the distribution
|
|||
|
diskettes. More sophisticated pirates have factories employing dozens
|
|||
|
of workers running high-speed disk duplicators and copy machines so they
|
|||
|
can include the manual in their shrink-wrapped counterfeit package. Some
|
|||
|
even copy the silk screening on the manual covers. They then find a
|
|||
|
legitimate outlet for the software. The customer only finds out that
|
|||
|
the company is bogus when he calls for technical support, if the real
|
|||
|
manufacturer tracks serial numbers.
|
|||
|
|
|||
|
Software piracy has become a part of the cost of doing business for
|
|||
|
major software manufacturers. The Software Publishers Association (SPA)
|
|||
|
estimates that piracy costs the software industry between 1.5 and 2
|
|||
|
billion dollars annually in the USA alone. Worldwide estimates range
|
|||
|
from 4 to 5 billion dollars. The legitimate domestic software market
|
|||
|
accounts for only 3 billion dollars annually. The SPA estimates that
|
|||
|
for every copy of legal software package, there is at least one illegal
|
|||
|
copy. If you think this is an exaggeration, just consider all the
|
|||
|
illegal copies you know about.
|
|||
|
|
|||
|
[rest of article discusses hardware anti-piracy devices]
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: dogface!bei@CS.UTEXAS.EDU(Bob Izenberg)
|
|||
|
Subject: Dutch Hackers article and reaction
|
|||
|
Date: Mon, 22 Apr 91 05:14:53 CDT
|
|||
|
|
|||
|
FROM THE SUNDAY, APRIL 21ST NEW YORK TIMES
|
|||
|
Dutch break into U.S. computers from 'hacker haven'
|
|||
|
By John Markoff
|
|||
|
New York Times Service
|
|||
|
|
|||
|
Beyond the reach of American law, a group of Dutch computer intruders
|
|||
|
has been openly defying United States military, space and intelligence
|
|||
|
authorities for almost six months.
|
|||
|
|
|||
|
Recently the intruders broke into a U.S. military computer while being
|
|||
|
filmed by a Dutch television crew.
|
|||
|
|
|||
|
The intruders, working over local telephone lines that enable them to
|
|||
|
tap American computer networks at almost no cost, have not done
|
|||
|
serious damage and haven't penetrated the most secure government
|
|||
|
computer systems, federal investigators say.
|
|||
|
|
|||
|
The group, however, has entered a wide range of computer systems with
|
|||
|
unclassified information, including those at the Kennedy Space Center,
|
|||
|
the Pentagon's Pacific Fleet Command, the Lawrence Livermore National
|
|||
|
Laboratory and Stanford University.
|
|||
|
|
|||
|
U.S. government officials said they had been tracking the interlopers,
|
|||
|
but no arrests have been made because there are no legal restrictions
|
|||
|
in the Netherlands on unauthorized computer access.
|
|||
|
|
|||
|
"This has been a terrible problem," said Gail Thackeray, a former
|
|||
|
Arizona assistant attorney general who has prosecuted computer crimes.
|
|||
|
"Until recently there have been few countries that have computer crime
|
|||
|
laws. These countries are acting as hacker havens."
|
|||
|
|
|||
|
American law-enforcement officials said they believed there were three
|
|||
|
or four members of the Dutch group, but would not release any names.
|
|||
|
A Dutch television news report in February showed a member of the
|
|||
|
group at the University of Utrecht reading information off a computer
|
|||
|
screen showing what he said was missile test information taken from a
|
|||
|
U.S. military computer. His back was to the camera, and he was not
|
|||
|
identified.
|
|||
|
|
|||
|
Because there are no computer crime laws in the Netherlands, American
|
|||
|
investigators said the Dutch group boasts that it can enter computers
|
|||
|
via international data networks with impunity.
|
|||
|
|
|||
|
One computer expert who has watched the electronic recordings made of
|
|||
|
the group's activities said the intruders do not demonstrate any
|
|||
|
particularly unusual computer skills, but instead appear to have
|
|||
|
access to documents that contain recipes for breaking computer
|
|||
|
security on many U.S. systems. These documents have been widely
|
|||
|
circulated on underground systems.
|
|||
|
|
|||
|
The computer expert said he had seen several recordings of the
|
|||
|
break-in sessions and that one of the members of the group used an
|
|||
|
account named "Adrian" to break into computers at the Kennedy Space
|
|||
|
Center and the Pentagon's commander in chief of the Pacific.
|
|||
|
|
|||
|
(end of Markoff's article)
|
|||
|
|
|||
|
The view of the United States as the world's policeman sure dies
|
|||
|
hard, doesn't it? Maybe it frosts a certain ex-public servant's
|
|||
|
behind, but these people *are* living within the laws of their own
|
|||
|
country. They're not expatriate citizens that fled to the Netherlands
|
|||
|
for freedom like some boatload of digital pilgrims. What business of
|
|||
|
ours could their laws possibly be? If you're going to stop
|
|||
|
clandestine access by foreign citizens, stop it at our border
|
|||
|
(electronic or physical.) I believe that it's a little premature to
|
|||
|
take the SunDevil Traveling Minstrel Show on the road, seeing as it
|
|||
|
hasn't exactly wowed 'em in Peoria. That's where sentiments like Our
|
|||
|
Gail's lead, to us taking this two-bit carny out to fleece the
|
|||
|
unsuspecting. I'm sure that a few DEA retreads could be dusted off
|
|||
|
and sent abroad. Their mission: To show those countries without
|
|||
|
former assistant attorneys general of their own the path to true
|
|||
|
government control of computer resources. I even think that I can
|
|||
|
guess who the first Secret Service agent to be volunteered out of the
|
|||
|
States will be...
|
|||
|
|
|||
|
You don't have to know much about the relationship between the DEA,
|
|||
|
Customs and Mexican law enforcement to know that we may export our
|
|||
|
laws, but rarely our protections. I don't believe that the
|
|||
|
aforementioned do-gooders arriving on Dutch soil, pockets stuffed with
|
|||
|
example search and seizure warrants, will have so much as a copy of
|
|||
|
the ECPA or the EFF charter on them. It's not their job to teach
|
|||
|
another country what freedoms it should have. Only which
|
|||
|
prohibitions.
|
|||
|
|
|||
|
I strongly regret, by the way, that no U.S. law enforcement official
|
|||
|
saw fit to tell Mr. Markoff whether this was a loosely-organized group
|
|||
|
of hackers or a tightly knit group of hackers. Maybe they're a
|
|||
|
tightly knit group of hackers in the process of unraveling into a
|
|||
|
loosely organized group of hackers. I certainly hope somebody tells
|
|||
|
the Dutch to keep their conspiracy labels straight. There's no reason
|
|||
|
that they can't learn from our mistakes, after all.
|
|||
|
|
|||
|
An astute friend of mine has mentioned that 'graphs 9 and 10 of Mr.
|
|||
|
Markoff's article are another riff on the "Evils of Phrack"
|
|||
|
traditional. We wouldn't have all these untrained Dutchmen breaking
|
|||
|
in and reading our unclassified material if that Neidorf guy... no,
|
|||
|
wait, we dropped that case... well, that Emmanuel Goldstein... no,
|
|||
|
he's not on the list... well, that Steve Jackson guy... no, we were
|
|||
|
confused when we raided him... well, Riggs, Darden and Grant... yeah,
|
|||
|
we did kinda take the word of a perjuring witness to get
|
|||
|
jurisdiction... well, that Len Rose, we treated him like the wrecking
|
|||
|
ball aimed at the pillars of society that he is, and if we hadn't got
|
|||
|
him, there'd be even more Dutchmen roaming through our computers than
|
|||
|
there are now.
|
|||
|
|
|||
|
If common sense rules, the good Netherlands officials will put the
|
|||
|
hypothetical visiting cybercops right back on the plane. The snake
|
|||
|
oil that they're selling is for domestic consumption only. And who
|
|||
|
knows, maybe you and I won't buy any, either.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
|
|||
|
Subject: News from Michigan
|
|||
|
Date: Sun, 28 Apr 91 16:26 EST
|
|||
|
|
|||
|
GRID News. ISSN 1054-9315. vol 2 nu 11x&12x CUD SpecEd 04/28/91
|
|||
|
World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
|
|||
|
----------------------------------------------------------------
|
|||
|
(1) Libertarian Party Candidate Says Yes! to Hackers
|
|||
|
|
|||
|
According to LP presidential hopeful, Andre Marrou, 35% of the
|
|||
|
dues-paying members of his party are computer programmers. Despite
|
|||
|
the fact that Marrou had never heard of Craig Neidorf or Operation
|
|||
|
Sundevil, he had strong opinions on the issues. "A computer is a
|
|||
|
printing press. You can churn out stuff on the printer." He did not
|
|||
|
move away from the paradigms print gave him but at least he was at a
|
|||
|
loss to understand how anyone could not see something so obvious, that
|
|||
|
a computer is a printing press.
|
|||
|
|
|||
|
Then he defended a special kind of hacking. "If you mean hacking to
|
|||
|
get into government computers to get the information, there is nothing
|
|||
|
wrong with that. There is too much secrecy in government. There is a
|
|||
|
principle that the information belongs to the people. 99% of the
|
|||
|
classified material is not really important. With hackers most of the
|
|||
|
stuff they want to get into should be public in the first place.
|
|||
|
Anything the government owns belongs to all of us. Like in real
|
|||
|
estate you can get information from the county and I'd extend that
|
|||
|
rule of thumb. It would be a good thing if they could get into the
|
|||
|
IRS data files."
|
|||
|
|
|||
|
In line with mainstream libertarian thought, both Andre Marrou his
|
|||
|
campaign manager, Jim Lewis (also a former LP veep candidate), said
|
|||
|
that they support the idea of government-granted patents. Marrou said
|
|||
|
he had never heard of patents being granted for software but knew that
|
|||
|
software can be copyrighted. Andre Marrou graduated from MIT.
|
|||
|
|
|||
|
(2) Telecom Bills Move Forward, Meet Opposition
|
|||
|
|
|||
|
"Competition and innovation will be stifled and consumers will pay
|
|||
|
more for telephone service if the Legislature approves the
|
|||
|
telecommunication legislation now before Senate and House committees,"
|
|||
|
said 15 lobbyists speaking through the Marketing Resource Group.
|
|||
|
Representatives from the AARP, AT&T, MCI, Michigan Cable Television
|
|||
|
Association, and the Michigan Association of Realtors all agreed that
|
|||
|
it would be wrong to let the local exchange carriers sell cable
|
|||
|
television, long distance and information services and manufacture
|
|||
|
equipment.
|
|||
|
|
|||
|
The AARP has opposed this legislation because they do not see a limit
|
|||
|
on the cost of phone service. According to the bill BASIC phone rates
|
|||
|
would be frozen forever at their November 1990 level. However, there
|
|||
|
is no limit on charges for "enhanced services." There is also no
|
|||
|
DEFINITION of "enhanced service" but most people involved in the bill
|
|||
|
have cited call forwarding, call waiting, fax and computer.
|
|||
|
|
|||
|
Other provisions of the proposed law would regulate all "information
|
|||
|
providers." Further, those who provide information from computers via
|
|||
|
the telephone would receive their service "at cost." This provision
|
|||
|
takes on new colors in light of a Wall Street Journal story from Jan.
|
|||
|
9, 1991, issued along with press release materials from Marketing
|
|||
|
Resources. That story outlines how NYNEX inflated its cost figures
|
|||
|
selling itself services far in excess of the market rate.
|
|||
|
|
|||
|
Interestingly enough, increased competition is one of the goals cited
|
|||
|
by the bill's key sponsor, Senate Mat Dunaskiss.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Anonymous
|
|||
|
Subject: San Luis Obispo (Calif.) "Busts" are a Bust?
|
|||
|
Date: 25 Apr 91 01:45:19 PDT
|
|||
|
|
|||
|
(I found the following articles on PC-Exec BBS in Milwaukee. I haven't
|
|||
|
seen it discussed, so here it is for Cu News-- A.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AMATEUR HACKERS TRIPPED UP
|
|||
|
By Danna Dykstra Coy
|
|||
|
|
|||
|
This article appeared in the Telegram-Tribune Newspaper, San Luis
|
|||
|
Obispo, CA. March 23, 1991. Permission to electronically reproduce
|
|||
|
this article was given by the newspaper's senior editor.
|
|||
|
|
|||
|
*****
|
|||
|
|
|||
|
San Luis Obispo police have cracked a case of computer hacking. Now
|
|||
|
they've got to work out the bugs. Officers were still interviewing
|
|||
|
suspects late Friday linked to a rare case of computer tampering that
|
|||
|
involved at least four people, two of them computer science majors
|
|||
|
from Cal Poly.
|
|||
|
|
|||
|
The hackers were obvious amateurs, according to police. They were
|
|||
|
caught unknowingly tapping into the computer system in the office of
|
|||
|
two local dermatologists. The only information they would have
|
|||
|
obtained, had they cracked the system's entry code, was patient
|
|||
|
billing records.
|
|||
|
|
|||
|
Police declined to name names because the investigation is on-going.
|
|||
|
They don't expect any arrests, though technically, they say a crime
|
|||
|
has been committed. Police believe the tampering was all in fun,
|
|||
|
though at the expense of the skin doctors who spent money and time
|
|||
|
fixing glitches caused by the electronic intrusion.
|
|||
|
|
|||
|
"Maybe it was a game for the suspects, but you have to look at the
|
|||
|
bigger picture," said the officer assigned to the case, Gary Nemeth.
|
|||
|
"The fact they were knowingly attempting to access a computer system
|
|||
|
without permission is a crime." Because the case is rare in this
|
|||
|
county, police are learning as they go along. "We will definitely
|
|||
|
file complaints with the District Attorney's Office," said Nemeth.
|
|||
|
"They can decide whether we've got enough of a case to go to trial."
|
|||
|
|
|||
|
Earlier this month San Luis dermatologists James Longabaugh and
|
|||
|
Jeffrey Herten told police they suspected somebody was trying to
|
|||
|
access the computer in the office they share at 15 Santa Rosa St. The
|
|||
|
system, which contains patient records and billing information,
|
|||
|
continually shut down. The doctors were unable to access their
|
|||
|
patients' records, said Nemeth, and paid a computer technician at
|
|||
|
least $1,500 to re-program their modem.
|
|||
|
|
|||
|
The modem is a device that allows computers to communicate through
|
|||
|
telephone lines. It can only be accessed when an operator "dials" its
|
|||
|
designated number by punching the numbers on a computer keyboard. The
|
|||
|
"calling" computer then asks the operator to punch in a password to
|
|||
|
enter the system. If the operator fails to type in the correct
|
|||
|
password, the system may ask the caller to try again or simply hang
|
|||
|
up. Because the doctors' modem has a built-in security system,
|
|||
|
several failed attempts causes the system to shut down completely.
|
|||
|
|
|||
|
The technician who suspected the problems were more than mechanical,
|
|||
|
advised the doctors to call the police. "We ordered a telephone tap
|
|||
|
on the line, which showed in one day alone 200 calls were made to that
|
|||
|
number," said Nemeth. "It was obvious someone was making a game of
|
|||
|
trying to crack the code to enter the system." The tap showed four
|
|||
|
residences that placed more than three calls a day to the doctors'
|
|||
|
computer number. Three of the callers were from San Luis Obispo and
|
|||
|
one was from Santa Margarita. From there police went to work.
|
|||
|
|
|||
|
"A lot of times I think police just tell somebody in a situation like
|
|||
|
that to get a new phone number," said Nemeth, "and their problem is
|
|||
|
resolved. But these doctors were really worried. They were afraid
|
|||
|
someone really wanted to know what they had in their files. They
|
|||
|
wondered if it was happening to them, maybe it was happening to
|
|||
|
others. I was intrigued."
|
|||
|
|
|||
|
Nemeth, whose training is in police work and not computer crimes, was
|
|||
|
soon breaking new ground for the department. "Here we had the
|
|||
|
addresses, but no proper search warrant. We didn't know what to name
|
|||
|
in a search warrant for a computer tampering case." A security
|
|||
|
investigator for Pacific Bell gave Nemeth the information he needed:
|
|||
|
disks, computer equipment, stereos and telephones, anything that could
|
|||
|
be used in a computer crime.
|
|||
|
|
|||
|
Search warrants were served at the San Luis Obispo houses Thursday and
|
|||
|
Friday. Residents at the Santa Margarita house have yet to be served.
|
|||
|
But police are certain they've already cracked the case. At all three
|
|||
|
residences that were searched police found a disk that incorrectly
|
|||
|
gave the doctors' phone number as the key to a program called "Cygnus
|
|||
|
XI". "It was a fluke," said Nemeth. "These people didn't know each
|
|||
|
other, and yet they all had this same program". Apparently when the
|
|||
|
suspects failed to gain access, they made a game of trying to crack
|
|||
|
the password, he said. "They didn't know whose computer was hooked up
|
|||
|
to the phone number the program gave them," said Nemeth. "So they
|
|||
|
tried to find out."
|
|||
|
|
|||
|
Police confiscated hundreds of disks containing illegally obtained
|
|||
|
copies of software at a residence where two Cal Poly students lived,
|
|||
|
which will be turned over to a federal law enforcement agency, said
|
|||
|
Nemeth.
|
|||
|
|
|||
|
Police Chief Jim Gardner said he doesn't expect this type of case to
|
|||
|
be the department's last, given modern technology. "What got to be a
|
|||
|
little strange is when I heard my officers talk in briefings this
|
|||
|
week. It was like `I need more information for the database'." "To
|
|||
|
think 20 years ago when cops sat around and talked all you heard about
|
|||
|
was `211' cases and dope dealers."
|
|||
|
(End)
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
COMPUTER CASE TAKES A TWIST
|
|||
|
By Danna Dykstra Coy
|
|||
|
|
|||
|
This article appeared in the Telegram-Tribune Newspaper, San Luis
|
|||
|
Obispo, CA. March 29, 1991. Permission to electronically reproduce
|
|||
|
this article was given by the newspaper's senior editor.
|
|||
|
|
|||
|
*****
|
|||
|
|
|||
|
A suspected computer hacker says San Luis Obispo police overreacted
|
|||
|
when they broke into his house and confiscated thousands of dollars of
|
|||
|
equipment. "I feel violated and I'm angry" said 34-year-old engineer
|
|||
|
Ron Hopson. All of Hopson's computer equipment was seized last week
|
|||
|
by police who believed he may have illegally tried to "hack" his way
|
|||
|
into an office computer belonging to two San Luis Obispo
|
|||
|
dermatologists. Police also confiscated equipment belonging to three
|
|||
|
others.
|
|||
|
|
|||
|
"If police had known more about what they were doing, I don't think it
|
|||
|
would have gone this far," Hopson said. "They've treated me like a
|
|||
|
criminal, and I was never aware I was doing anything wrong. It's like
|
|||
|
a nightmare." Hopson, who has not been arrested in the case, was at
|
|||
|
work last week when a neighbor called to tell him there were three
|
|||
|
patrol cars and two detective cars at his house. Police broke into
|
|||
|
the locked front door of his residence, said Officer Gary Nemeth, and
|
|||
|
broke down a locked door to his study where he keeps his computer.
|
|||
|
"They took my stuff, they rummaged through my house, and all the time
|
|||
|
I was trying to figure out what I did, what this was about. I didn't
|
|||
|
have any idea."
|
|||
|
|
|||
|
A police phone tap showed three calls were made from Hopson's
|
|||
|
residence this month to a computer at an office shared by doctors
|
|||
|
James Longabaugh and Jeffrey Herten. The doctors told police they
|
|||
|
suspected somebody was trying to access the computer in their office
|
|||
|
at 15 Santa Rosa St. Their system, which contains patient records and
|
|||
|
billing information, kept shutting down. The doctors were unable to
|
|||
|
access their patients' records, said Nemeth. They had to pay a
|
|||
|
computer technician at least $1,500 to re-program their modem, a
|
|||
|
device that allows computers to communicate through telephone lines.
|
|||
|
|
|||
|
Hopson said there is an easy explanation for the foul-up. He said he
|
|||
|
was trying to log-on to a public bulletin board that incorrectly gave
|
|||
|
the doctors number as the key to a system called "Cygnus XI". Cygnus
|
|||
|
XI enabled people to send electronic messages to one another, but the
|
|||
|
Cygnus XI system was apparently outdated. The person who started it
|
|||
|
up moved from the San Luis Obispo area last year, and the phone
|
|||
|
company gave the dermatologists his former number, according to
|
|||
|
Officer Nemeth.
|
|||
|
|
|||
|
Hopson said he learned about Cygnus XI through a local computer club,
|
|||
|
the SLO-BYTES User Group. "Any of the group's 250 members could have
|
|||
|
been trying to tap into the same system", said Robert Ward, SLO-BYTES
|
|||
|
club secretary and computer technician at Cal Poly. In addition, he
|
|||
|
suspects members gave the phone number to fellow computer buffs and
|
|||
|
could have been passed around the world through the computer
|
|||
|
Bulletin-Board system. "I myself might have tried to access it three
|
|||
|
or four times if I was a new user," he said. "I'd say if somebody
|
|||
|
tried 50 times, fine, they should be checked out, but not just for
|
|||
|
trying a couple of times."
|
|||
|
|
|||
|
Police said some 200 calls were made to the doctors modem during the
|
|||
|
10 days the phone was tapped. "They say, therefore, its obvious
|
|||
|
somebody is trying to make a game of trying to crack the computer
|
|||
|
code", said Hopson. "The only thing obvious to me is a lot of people
|
|||
|
have that published number. Nobody's trying to crack a code to gain
|
|||
|
illegal access to a system. I only tried it three times and gave up,
|
|||
|
figuring the phone was no longer in service."
|
|||
|
|
|||
|
Hopson said he tried to explain the situation to the police. "But
|
|||
|
they took me to an interrogation room and said I was lying. They
|
|||
|
treated me like a big-time criminal, and now they won't give me back
|
|||
|
my stuff." Hopson admitted he owned several illegally obtained copies
|
|||
|
of software confiscated by police. "But so does everybody," he said,
|
|||
|
"and the police have ever right to keep them, but I want the rest of
|
|||
|
my stuff."
|
|||
|
|
|||
|
Nemeth, whose training is in police work and not computer crimes, said
|
|||
|
this is the first such case for the department and he learning as he
|
|||
|
goes along. He said the matter has been turned over to the District
|
|||
|
Attorney's Office, which will decide whether to bring charges against
|
|||
|
Hopson and one other suspect.
|
|||
|
|
|||
|
The seized belongings could be sold to pay restitution to the doctors
|
|||
|
who paid to re-program their system. Nemeth said the police are
|
|||
|
waiting for a printout to show how many times the suspects tried to
|
|||
|
gain access to the doctors' modem. "You can try to gain access as
|
|||
|
many times as you want on one phone call. The fact a suspect only
|
|||
|
called three times doesn't mean he only tried to gain access three
|
|||
|
times."
|
|||
|
|
|||
|
Nemeth said he is aware of the bulletin board theory. "The problem is
|
|||
|
we believe somebody out there intentionally got into the doctors'
|
|||
|
system and shut it down so nobody could gain access, based on evidence
|
|||
|
from the doctors' computer technician," said Nemeth. "I don't think
|
|||
|
we have that person, because the guy would need a very sophisticated
|
|||
|
system to shut somebody else's system down." At the same time, he
|
|||
|
said, Hopson and the other suspects should have known to give up after
|
|||
|
the first failed attempt. "The laws are funny. You don't have to
|
|||
|
prove malicious intent when you're talking about computer tampering.
|
|||
|
The first attempt you might say was an honest mistake. More than
|
|||
|
once, you have to wonder."
|
|||
|
|
|||
|
Police this week filled reports with the District Attorney's Office
|
|||
|
regarding their investigation of Hopson and another San Luis Obispo
|
|||
|
man suspected of computer tampering. Police are waiting for Stephen
|
|||
|
Brown, a deputy district attorney, to decide whether there is enough
|
|||
|
evidence against the two to take court action. If so, Nemeth said he
|
|||
|
will file reports involving two other suspects, both computer science
|
|||
|
majors from Cal Poly. All computers, telephones, computer instruction
|
|||
|
manuals, and program disks were seized from three houses in police
|
|||
|
searches last week. Hundreds of disks containing about $5,000 worth
|
|||
|
of illegally obtained software were also taken from the suspects'
|
|||
|
residences.
|
|||
|
|
|||
|
Police and the District Attorney's Office are not naming the suspects
|
|||
|
because the case is still under investigation. However, police
|
|||
|
confirmed Hopson was one of the suspects in the case after he called
|
|||
|
the Telegram-Tribune to give his side of the story.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
HACKERS' OFF HOOK, PROPERTY RETURNED
|
|||
|
By Danna Dykstra Coy
|
|||
|
|
|||
|
This article appeared in the Telegram-Tribune Newspaper, San Luis
|
|||
|
Obispo, CA. April 12, 1991. Permission to electronically reproduce
|
|||
|
this article was given by the newspaper's senior editor.
|
|||
|
|
|||
|
*****
|
|||
|
|
|||
|
Two San Luis Obispo men suspected of computer tampering will not be
|
|||
|
charged with any crime. They will get back the computer equipment
|
|||
|
that was seized from their homes, according to Stephen Brown, a deputy
|
|||
|
district attorney who handled the case. "It appears to have been a
|
|||
|
case of inadvertent access to a modem with no criminal intent," said
|
|||
|
Brown. San Luis Obispo police were waiting on Brown's response to
|
|||
|
decide whether to pursue an investigation that started last month.
|
|||
|
They said they would drop the matter if Brown didn't file a case.
|
|||
|
|
|||
|
The officer heading the case, Gary Nemeth, admitted police were
|
|||
|
learning as they went along because they rarely deal with computer
|
|||
|
crimes. Brown said he doesn't believe police overreacted in their
|
|||
|
investigation. "They had a legitimate concern."
|
|||
|
|
|||
|
In early March two dermatologists called police when the computer
|
|||
|
system containing patient billing records in their San Luis Obispo
|
|||
|
office kept shutting down. They paid a computer technician about
|
|||
|
$1,500 to re-program their modem, a device that allows computers to
|
|||
|
communicate through the telephone lines. The technician told the
|
|||
|
doctors it appeared someone was trying to tap into their system. The
|
|||
|
computer's security system caused the shutdown after several attempts
|
|||
|
to gain access failed.
|
|||
|
|
|||
|
Police ordered a 10-day phone tap on the modem's line and, after
|
|||
|
obtaining search warrants, searched four residences where calls were
|
|||
|
made to the skin doctors' modem at least three times. One suspect,
|
|||
|
Ron Hopson, said last week his calls were legitimate and claimed
|
|||
|
police overreacted when they seized his computer, telephone, and
|
|||
|
computer manuals. Hopson could not reached Thursday for comment.
|
|||
|
|
|||
|
Brown's investigation revealed Hopson, like the other suspects, was
|
|||
|
trying to log-on to a computerized "bulletin-board" that incorrectly
|
|||
|
gave the doctors' number as the key to a system called "Cygnus XI".
|
|||
|
Cygnus XI enabled computer users to electronically send messages to
|
|||
|
one another. Brown said while this may not be the county's first
|
|||
|
computer crime, it was the first time the District Attorney's Office
|
|||
|
authorized search warrants in a case of suspected computer fraud using
|
|||
|
telephone lines. Police will not be returning several illegally
|
|||
|
obtained copies of software also seized during the raids, he said.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
A Case for Mistaken Identity... Who's Privacy was Really Invaded?
|
|||
|
|
|||
|
By Jim Bigelow
|
|||
|
|
|||
|
According to the San Luis Obispo County (California) Telegram-Tribune,
|
|||
|
dated Saturday, March 23, 1991, the San Luis Obispo Police raided the
|
|||
|
homes of two Cal Poly students and two other residents including one
|
|||
|
in Santa Margarita for alleged computer crimes, "hacking." The
|
|||
|
suspects had, through their computer modems, unknowingly tried to
|
|||
|
access a computer owned by a group of local dermatologists. That same
|
|||
|
number had previously belonged to a popular local bulletin board,
|
|||
|
Cygnus XI. The police were alerted by the dermatologists and their
|
|||
|
computer technician who was afraid someone was trying to access their
|
|||
|
patient records. The police put a phone tap on the computer line for
|
|||
|
10 days which showed over 200 calls placed to that number in one 24
|
|||
|
hour period.
|
|||
|
|
|||
|
Armed with a search warrant, police went to the house of the first
|
|||
|
suspect who later said he only called that number 3 times in a 24 hour
|
|||
|
period (I wonder who made the other 197 calls?). Unfortunately he was
|
|||
|
not home... this cost him two broken doors as the police had to enter
|
|||
|
the house some way. All computer equipment, disks and computer
|
|||
|
related equipment was "seized" and taken to police headquarters.
|
|||
|
Follow-up articles reveal that the individual had not committed local
|
|||
|
crimes, that no charges would be filed and that the computers . would
|
|||
|
be returned. Disks which were determined to contain illegally copied
|
|||
|
commercial software were to be turned over to Federal authorities.
|
|||
|
|
|||
|
Like most personal home computer users I have interviewed, I didn't
|
|||
|
think much . of this matter at first, but I am now becoming alarmed.
|
|||
|
I am a 64 year old senior citizen, perhaps a paranoid senior. I think
|
|||
|
most seniors are a bit paranoid. I am a strong supporter of law
|
|||
|
enforcement, an ex-peace officer, a retired parole agent, and as a
|
|||
|
senior I want law enforcement protection. . In this situation,
|
|||
|
according to the Tribune report, the police "had legitimate concern."
|
|||
|
But, apparently they didn't know what they were doing as the officer
|
|||
|
in charge stated "We are learning as we go."
|
|||
|
|
|||
|
Accessing a modem is not easy. I, with five years of computer
|
|||
|
experience, find ? it difficult and frustrating to set up a computer
|
|||
|
and keep it operating, to understand a manual well enough to get the
|
|||
|
software to operate, to set the switches and jumpers on a modem, and
|
|||
|
then contact a BBS, and in the midst of their endless questions,
|
|||
|
coupled with my excitability and fumbling, answer them and get on
|
|||
|
line. I have many times tried to connect to BBS's only to be
|
|||
|
disconnected because I typed my name or code incorrectly. I have
|
|||
|
dialed wrong numbers and gotten a private phone.
|
|||
|
|
|||
|
I do not want to be considered an enemy of law enforcement merely
|
|||
|
because I own a computer. I do not like to be called a "hacker," and
|
|||
|
especially because I contacted a BBS 3 times. The word, "hacker"
|
|||
|
originally applied to a computer user, now has become a dirty word. It
|
|||
|
implies criminality, a spy, double agents, espionage, stealing
|
|||
|
government secrets, stealing business codes, etc. Certainly, not that
|
|||
|
of a law abiding and law supporting, voting senior citizen, who has
|
|||
|
found a new hobby, a toy and a tool to occupy his mind. Computers are
|
|||
|
educational and can and do assist in providing community functions. I
|
|||
|
hope that the name "personal computer user" doesn't become a dirty
|
|||
|
word.
|
|||
|
|
|||
|
The "hacker" problem seems to be viewed by law enforcement as one in
|
|||
|
which "we learn as we go." This is an extremely costly method as we
|
|||
|
blunder into a completely new era, that of computerization. It causes
|
|||
|
conflicts between citizens and law enforcement. It is costly to
|
|||
|
citizens in that it causes great distress to us, to find ourselves
|
|||
|
possible enemies of the law, the loss of our computers and equipment,
|
|||
|
telephones and reputation by being publicly called hackers and
|
|||
|
criminals. It causes more problems when we attempt to regain our
|
|||
|
reputation and losses by suing the very agencies we have been so
|
|||
|
diligently supporting, for false arrest, confiscation of our most
|
|||
|
coveted possession and uninvited and forced entrance into our homes,
|
|||
|
causing great emotional disturbances (and older people are easily
|
|||
|
upset).
|
|||
|
|
|||
|
I have a legal question I would like answered. Who is obligated in
|
|||
|
this incident: the owners and operators of Cygnus XI for failure to
|
|||
|
make a public announcement of the discontinuance of their services? or
|
|||
|
the phone company for issuing the number to a private corporation with
|
|||
|
a modem? the police for not knowing what they are doing? the computer
|
|||
|
user? It is not a problem of being more cautious, ethical, moral,
|
|||
|
law)abiding. It is a matter of citizen rights.
|
|||
|
|
|||
|
The "hacker" problem now applies not only to code breakers, secret and
|
|||
|
document stealers, but to me, even in my first attempts to connect
|
|||
|
with a BBS. Had I tried to contact Cygnus XI my attempts would have
|
|||
|
put me under suspicion of the police and made me liable for arrest,
|
|||
|
confiscation of my computer, equipment, disks, and subsequent
|
|||
|
prosecution. I am more than a little bewildered.
|
|||
|
|
|||
|
And, am I becoming a paranoid senior citizen, not only because of
|
|||
|
criminals, but of the police also? Am I running a clandestine
|
|||
|
operation by merely owning a computer and a modem, or am I a solid
|
|||
|
senior citizen, which may well imply that I don't own "one of those
|
|||
|
computers?" Frankly, I don't know. Even though my computer is
|
|||
|
returned, and I am not arrested or prosecuted, I wonder what condition
|
|||
|
it now is in after all the rough handling. (Police who break down
|
|||
|
doors do not seem to be overly gentle, and computers and their hard
|
|||
|
disk drives are very fragile instruments). Just who and how many have
|
|||
|
scrutinized my computer? its contents? and why? my personal home
|
|||
|
business transactions? and perhaps I supplement my income with the aid
|
|||
|
of my computer (I am a writer)? my daily journal? my most private and
|
|||
|
innermost thoughts? my letters? my daily activities? (This is exactly
|
|||
|
why personal computers and their programs were designed, for personal
|
|||
|
use. My personal computer is an extension of my self, my mind, and my
|
|||
|
personal affairs.)
|
|||
|
|
|||
|
Can the police confiscate all my software claiming it is stolen,
|
|||
|
merely because they don't find the originals? (I, at the suggestion of
|
|||
|
the software companies, make backup copies of the original disks, and
|
|||
|
then place the originals elsewhere for safekeeping.) Do I need to keep
|
|||
|
all receipts to "prove" to the police that I am innocent of holding
|
|||
|
bootleg software? Is there a new twist in the laws that applies to
|
|||
|
personal computer users?
|
|||
|
|
|||
|
Also any encoding of my documents or safeguarding them with a
|
|||
|
password, such as my daily journal, my diary, I have read in other
|
|||
|
cases, is viewed by law enforcement as an attempt to evade prosecution
|
|||
|
and virtually incriminates me. ("If it wasn't criminal why did the
|
|||
|
"suspect" encode it?")
|
|||
|
|
|||
|
This recent incident arouses complex emotions for me. What will the
|
|||
|
future bring for the home and personal computer user? I do not care to
|
|||
|
fear the police. I do not want to have to register my computer with
|
|||
|
the government. Will it come to that in our country? I do not want to
|
|||
|
have to maintain an impeccable record of all of my computer usages and
|
|||
|
activities, imports and exports, or to be connected to a state police
|
|||
|
monitoring facility, that at all times monitors my computer usage. The
|
|||
|
year "1984" is behind us. Let's keep it that way.
|
|||
|
|
|||
|
This matter is a most serious problem and demands the attention of all
|
|||
|
citizens. As for myself, I wasn't the one involved, but I find it
|
|||
|
disturbing enough to cause me to learn of it and do something about
|
|||
|
it.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: EFF (eff@well.sf.ca.us)
|
|||
|
Subject: EFF/SJG Sue Bill Cook, Tim Foley, Secret Service, et. al.
|
|||
|
Date: 1 May, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.15: File 3 of 3: EFF/SJG SUE COOK, FOLEY ET. AL. ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
%The following came in just minutes before we began sending out this
|
|||
|
issue of CuD. We reduced the original to just a few lines. The full
|
|||
|
text can be obtained from EFF (eff@well.sf.ca.us) or from the CuD
|
|||
|
archives%.
|
|||
|
|
|||
|
Excerpted From: EFFector Online #1.04 (May 1, 1991)
|
|||
|
|
|||
|
The following press release was Faxcast to over 1,500 media
|
|||
|
organizations and interested parties this afternoon:
|
|||
|
|
|||
|
EXTENDING THE CONSTITUTION TO AMERICAN CYBERSPACE:
|
|||
|
|
|||
|
TO ESTABLISH CONSTITUTIONAL PROTECTION FOR ELECTRONIC MEDIA AND TO
|
|||
|
OBTAIN REDRESS FOR AN UNLAWFUL SEARCH, SEIZURE, AND PRIOR RESTRAINT
|
|||
|
ON PUBLICATION, STEVE JACKSON GAMES AND THE ELECTRONIC FRONTIER
|
|||
|
FOUNDATION TODAY FILED A CIVIL SUIT AGAINST THE UNITED STATES SECRET
|
|||
|
SERVICE AND OTHERS.
|
|||
|
|
|||
|
On March 1, 1990, the United States Secret Service nearly
|
|||
|
destroyed Steve Jackson Games (SJG), an award-winning publishing
|
|||
|
business in Austin, Texas.
|
|||
|
In an early morning raid with an unlawful and
|
|||
|
unconstitutional warrant, agents of the Secret Service conducted a
|
|||
|
search of the SJG office. When they left they took a manuscript
|
|||
|
being prepared for publication, private electronic mail, and several
|
|||
|
computers, including the hardware and software of the SJG Computer
|
|||
|
Bulletin Board System. Yet Jackson and his business were not only
|
|||
|
innocent of any crime, but never suspects in the first place. The
|
|||
|
raid had been staged on the unfounded suspicion that somewhere in
|
|||
|
Jackson's office there "might be" a document compromising the
|
|||
|
security of the 911 telephone system.
|
|||
|
In the months that followed,
|
|||
|
Jackson saw the business he had built up over many years dragged to
|
|||
|
the edge of bankruptcy. SJG was a successful and prestigious
|
|||
|
publisher of books and other materials used in adventure role-playing
|
|||
|
games. Jackson also operated a computer bulletin board system (BBS)
|
|||
|
to communicate with his customers and writers and obtain feedback and
|
|||
|
suggestions on new gaming ideas. The bulletin board was also the
|
|||
|
repository of private electronic mail belonging to several of its
|
|||
|
users. This private mail was seized in the raid. Despite repeated
|
|||
|
requests for the return of his manuscripts and equipment, the Secret
|
|||
|
Service has refused to comply fully.
|
|||
|
Today, more than a year after that raid, The Electronic
|
|||
|
Frontier Foundation, acting with SJG owner Steve Jackson, has filed
|
|||
|
a precedent setting civil suit against the
|
|||
|
United States Secret Service, Secret Service Agents Timothy Foley and
|
|||
|
Barbara Golden, Assistant United States Attorney William Cook, and
|
|||
|
Henry Kluepfel.
|
|||
|
"This is the most important case brought to date,"
|
|||
|
said EFF general counsel Mike Godwin, "to vindicate the
|
|||
|
Constitutional rights of the users of computer-based communications
|
|||
|
technology. It will establish the Constitutional dimension of
|
|||
|
electronic expression. It also will be one of the first cases that
|
|||
|
invokes the Electronic Communications and Privacy Act as a shield and
|
|||
|
not as a sword -- an act that guarantees users of this digital
|
|||
|
medium the same privacy protections enjoyed by those who use the
|
|||
|
telephone and the U.S. Mail."
|
|||
|
|
|||
|
(remainder of text deleted)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.15**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
|