834 lines
42 KiB
Plaintext
834 lines
42 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer Underground Digest--Fri Aug 16, 1991 (Vol #3.30)
|
|||
|
|
|||
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
|
|||
|
CONTENTS, #3.30 (AUGUST 16, 1991)
|
|||
|
Subject: File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford)
|
|||
|
Subject: File 2--Review of "Practical Unix Security" (Garfinkel & Spafford).
|
|||
|
Subject: File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint)
|
|||
|
Subject: File 4--Mystery Lurks In The Death of INSLAW Reporter
|
|||
|
|
|||
|
ARCHIVIST: BRENDAN KEHOE
|
|||
|
RESIDENT CONVALESCENT: BOB KUSUMOTO
|
|||
|
ULTRA-SCANMEISTER: BOB KRAUSE
|
|||
|
|
|||
|
CuD is available via electronic mail at no cost. Printed copies are
|
|||
|
available by subscription. Single copies are available for the costs
|
|||
|
of reproduction and mailing.
|
|||
|
|
|||
|
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
|||
|
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
|||
|
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
|||
|
789-4210, and by anonymous ftp from ftp.cs.widener.edu,
|
|||
|
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
|||
|
Chicago email server, send mail with the subject "help" (without the
|
|||
|
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to the
|
|||
|
Computer Underground. Articles are preferred to short responses.
|
|||
|
Please avoid quoting previous posts unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Wed, 14 Aug 1991 11:22:00 CDT
|
|||
|
From: "Jim Thomas" <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford)
|
|||
|
|
|||
|
Review of: _Practical UNIX Security_, by Simson Garfinkel and
|
|||
|
Gene Spafford. Sebastopol, (Calif): O'Reilly & Associates, Inc.
|
|||
|
481 pp. $29.95 pb.
|
|||
|
|
|||
|
Because I know virtually nothing about UNIX, I am eminently qualified
|
|||
|
to comment on the Garfinkel/Spafford (G&S) volume. If I can understand
|
|||
|
and learn from it, anybody can. I have no idea whether UNIX Whizzes
|
|||
|
will find the tome worthwhile, but as a UNIX beginner, I judge the
|
|||
|
book a first-rate primer for inquisitive, but uninformed, neophytes.
|
|||
|
|
|||
|
To label the G&S book a "security" manual is misleading. Their
|
|||
|
introductory warning to would-be hackers who would interpret the book
|
|||
|
as in invitation to break into the authors' systems is perhaps a bit
|
|||
|
melodramatic (p. xxvii), but the book is about security as M*A*S*H is
|
|||
|
about war. I suspect system administrators, such as the following
|
|||
|
reviewer who is plagued by the screw-ups of folks like me who learn by
|
|||
|
punching in commands to see what they do--would hope users read _UNIX
|
|||
|
Security_ on the chance it would make them (the users, not the
|
|||
|
sysads) better citizens and cause them (the sysads, not the users)
|
|||
|
less hassle in answering obvious questions.
|
|||
|
|
|||
|
I'd guess that most users do not learn UNIX by taking classes, but
|
|||
|
rather by trial and error, pestering the pros, and maybe even
|
|||
|
purchasing a book or two. Unlike the detailed "how to" books, such as
|
|||
|
_UNIX Made Easy_ (an oxymoronic title) that cover a wide range of UNIX
|
|||
|
uses and commands from programming to learning the intricacies of vi,
|
|||
|
_UNIX Security_ is more basic, focused, and appropriate for the UNIX
|
|||
|
newnicks. Despite the focus on security, the book's emphasis is on
|
|||
|
responsible system use by teaching, step-by-step, those aspects of use
|
|||
|
at which security requisites arise. Such lessons obviously require an
|
|||
|
overview of the basics, which the authors provide.
|
|||
|
|
|||
|
They begin with an overview of the history of UNIX dating from the
|
|||
|
Mid-1960s with Multics to the rewriting and playful renaming of
|
|||
|
Multics to UNIX derived from the fact that Multics tried to to
|
|||
|
multiple things, and UNIX just one: Run programs (p. 7). But, the
|
|||
|
openness and ease of UNIX also had a major drawback: The early
|
|||
|
versions were not secure. Many of the original problems were the
|
|||
|
result of holes in the software itself, but--and the authors stress
|
|||
|
this throughout--the most serious security lapses are the result of
|
|||
|
human error or indifference.
|
|||
|
|
|||
|
Cracking into any system in most cases requires access to an account
|
|||
|
and then using that account to penetrate deeper by using various
|
|||
|
tricks to obtain root privileges. As a consequence, the first line of
|
|||
|
defense, argue the authors, is to assure that unauthorized logins are
|
|||
|
prevented. There is little new for sysads in the book's first
|
|||
|
substantive chapter, "Users, Groups, and the Superuser." But the new
|
|||
|
user will find this explanation, along with the various charts
|
|||
|
clarifying what all those symbols mean when we list the /etc/group
|
|||
|
file, quite helpful. Subsequent chapters explaining files, defending
|
|||
|
accounts, and securing data provide useful examples that can serve as
|
|||
|
exercises for the beginner in ferreting out the complexity of UNIX as
|
|||
|
well as for protecting one's own account against intruders. What for
|
|||
|
experienced users might seem mundane serves newer users with ways to
|
|||
|
develop and test knowledge of *one's own* account. The periodic
|
|||
|
distinctions between legitimate curious use and inappropriate abuse
|
|||
|
provide guidelines that encourage exploration while reminding the user
|
|||
|
of the courtesies owed to the sysads and others.
|
|||
|
|
|||
|
For those active on the nets, a five chapter section on modems, UUCP,
|
|||
|
Networks and Security, Sun's NFS, and other topics condenses much of
|
|||
|
Quarterman's $50 _The Matrix_ into a few comprehensible chapters.
|
|||
|
Although intended more for those setting up systems than using them,
|
|||
|
the discussion illustrates what occurs when we dial into a UNIX system
|
|||
|
and summarizes various operations of remote systems, including sending
|
|||
|
mail and file transfer. I found that the general discussion helped
|
|||
|
clarify the occasional error message and helps to use other systems
|
|||
|
more efficiently, ranging from moving around within them to using ftp
|
|||
|
and telnet.
|
|||
|
|
|||
|
Sysads may find little new in the discussion of what to do when a
|
|||
|
breakin occurs, but the step-by step procedures might serve as a
|
|||
|
mindful checklist. The cardinal rules--"don't panic" and "document"
|
|||
|
are sound for all computer users when they suspect intrusion, and
|
|||
|
inexperienced users should find the discussion helpful in reviewing
|
|||
|
how systems track and identify other users.
|
|||
|
|
|||
|
Although most users do not encrypt files and know nothing about the
|
|||
|
process, the early discussion of the process (pp 29-31) provides an
|
|||
|
understandable overview of what encryption is and how it works. With
|
|||
|
increasing emphasis on secure systems, discussions of encryption also
|
|||
|
increase, and even for those of us who are functionally illiterate, it
|
|||
|
helps to know what salt is and what it does to our password. Chapter
|
|||
|
18 is devoted to a more detailed summary of encryption systems,
|
|||
|
including ROT13 and crypt.
|
|||
|
|
|||
|
The chapter on "Computer Security and U.S. Law" is too brief. G&S
|
|||
|
explain the legal options for prosecution and remind readers of the
|
|||
|
hazards of criminal prosecution, which include law enforcement
|
|||
|
illiteracy, the problems of search warrants, and the dangers of
|
|||
|
equipment seized as evidence. Alluding to the experience of Steve
|
|||
|
Jackson Games, where law enforcement seizure of equipment and a
|
|||
|
pre-publication version of a new game had led to a suit against
|
|||
|
Federal and private sector personnel, G&S warn employeers whose
|
|||
|
employees--or they themselves--may have equipment taken by law
|
|||
|
enforcement of their right to receipts and of the need to discuss the
|
|||
|
conditions of return.
|
|||
|
|
|||
|
The section on law (p. 349) lists the laws likely to be used in
|
|||
|
prosecuting computer intrustion along with a few word summary of the
|
|||
|
violation each law represents. Because even the most recent laws tend
|
|||
|
to be overly-broad and vague, the section on "Federal computer crime
|
|||
|
laws" could have been expanded to include a discussion of the problems
|
|||
|
of legal language and give a better summary of the relevant language
|
|||
|
of each. It is also a bit disturbing that the chapters seems to
|
|||
|
advocate (despite the caveats) prosecution in favor of other, less
|
|||
|
punitive but equally effective, actions. My bias as an advocate of
|
|||
|
decriminalization of many types of crimes and as a believer in
|
|||
|
reducing, rather than increasing, the burden of the criminal justice
|
|||
|
system led to me quibble, perhaps unduly, with what is otherwise a
|
|||
|
well-summarized chapter. But, especially for students (who constitute
|
|||
|
the bulk of the "hacker" population), there are numerous non-legal
|
|||
|
options available, and to my mind there should have been greater
|
|||
|
emphasis on elaborating the non-legal responses available and even
|
|||
|
suggesting some new ones.
|
|||
|
|
|||
|
There is one irony in the G&S volume. Take the various chapters,
|
|||
|
retitle them as "how to break into..." or "UNIX cryptography" and
|
|||
|
rewrite the text in cyberese, then publish them in PHRACK or LoD/TJ,
|
|||
|
and add at the end of each the caution "Don't get caught with this,"
|
|||
|
and you might have law enforcement breathing down your neck. G&S have
|
|||
|
written--albeit more articulately and with more detail and insight--on
|
|||
|
the kinds of topics with similar examples to those found in some of
|
|||
|
the better p/h newsletters. Proving, perhaps, that form can be more
|
|||
|
important as content.
|
|||
|
|
|||
|
My goal here has been to suggest for the non-UNIX expert why they wold
|
|||
|
find _Practical UNIX Security_ worth reading. Despite the title and
|
|||
|
the authors' professed goal, is crammed with information on all phases
|
|||
|
of UNIX use and with tips for utilizing the system's power. Those who
|
|||
|
read and experiment with the volume are likely to become better system
|
|||
|
and net citizens, both because of their knowledge and proficiency and
|
|||
|
because of the socialization process entailed by practicing what the
|
|||
|
authors teach us. It is well worth the price.
|
|||
|
|
|||
|
((Jim Thomas is CuD co-editor and trying to learn UNIX after
|
|||
|
9 years on an IBM mainframe))
|
|||
|
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 14 Aug 1991 11:22:00 CDT
|
|||
|
From: Neil Rickert <rickert@CS.NIU.EDU>
|
|||
|
Subject: File 2--Review of "Practical Unix Security" (Garfinkel & Spafford).
|
|||
|
|
|||
|
Following on the heals of the development of the microprocesor, the
|
|||
|
last decade has seen an explosion of computers. However the expertise
|
|||
|
to administer these computers has not grown at anything like the same
|
|||
|
pace. The result is that there are large numbers of computers
|
|||
|
administered by people who are seriously short of experience. Worse
|
|||
|
still many of these computers are connected to Internet, readily
|
|||
|
exposing them to would be electronic intruders.
|
|||
|
|
|||
|
Unix systems have particularly flexible networking facilities, but
|
|||
|
while these provide great benefits to the Unix user, they also provide
|
|||
|
portholes through which breakins can be attempted.
|
|||
|
|
|||
|
In the circumstances "Practical Unix Security" is a very timely
|
|||
|
publication.
|
|||
|
|
|||
|
This is a book for all Unix admins, not just those concerned about
|
|||
|
security. If you have a Unix work station on your desktop, and if you
|
|||
|
are the sole user, and it not connected to any networks, you perhaps
|
|||
|
have little to worry about in terms of security. But you can still
|
|||
|
benefit greatly from reading "Practical Unix Security". For this is
|
|||
|
not just a book about security. It also covers many aspects of
|
|||
|
administering Unix systems. Indeed, it fills in many of the gaps left
|
|||
|
by the system administration books that you will find in the Unix
|
|||
|
section of your bookstore.
|
|||
|
|
|||
|
Doubtless the book will also be of interest to Unix detractors who
|
|||
|
will welcome the opportunity to gloat at some of the security problems
|
|||
|
in Unix. But while they are gloating, they should perhaps look more
|
|||
|
closely at their own systems for problems which may be lurking just
|
|||
|
below the surface, less well known perhaps, because their systems lack
|
|||
|
the openness of Unix.
|
|||
|
|
|||
|
If you are looking for a specific list of steps to break into a Unix
|
|||
|
system, this is not the book for you. The author's are quite careful
|
|||
|
on this point. They do, however, give a guided tour through the
|
|||
|
system indicating the points of weakness, and suggesting how to
|
|||
|
configure your system to minimize the security problems. The book
|
|||
|
covers passwords, file permissions and the use of umask, the risk of
|
|||
|
trojan horses and selecting a PATH which reduces the risk, SUID and
|
|||
|
SGID programs, logging activity, configuring UUCP to minimize security
|
|||
|
problems, networking cautions including cautions on the use of NFS and
|
|||
|
NIS services. It discusses Kerberos, SunOS secure rpc, and firewall
|
|||
|
arrangements, as ways of enhancing security.
|
|||
|
|
|||
|
Some time is spent on discussing good system backup plans. A good
|
|||
|
backup strategy can be important if your system security is broken,
|
|||
|
for it allows you to recover any damaged files. But, more important,
|
|||
|
it also provides recovery from the acts of incredible stupidity to
|
|||
|
which even the most experienced computer administrators are
|
|||
|
occasionally prone.
|
|||
|
|
|||
|
Security is not a technical problem, and the authors are careful to
|
|||
|
point this out. It is a people problem. Technological fixes by
|
|||
|
themselves don't work. If, for example, you impose a system of
|
|||
|
machine generated passwords, this may create passwords that users can
|
|||
|
not remember, causing them to write the passwords down on paper with a
|
|||
|
net loss in security. There is always a tradeoff between security and
|
|||
|
convenience. Some of the stricter security measures may generate
|
|||
|
sufficient inconvenience that users will unthinkingly develop ways of
|
|||
|
subverting the security mechanisms. Still, there is no excuse for
|
|||
|
vendors favoring convenience to the extent that they sell systems with
|
|||
|
virtually no security. Perhaps one of the most serious of these is
|
|||
|
distribution of default configurations with a '+' in /etc/hosts.equiv
|
|||
|
. The authors do not mince words on page 238, where they state "This
|
|||
|
is a major security hole" and on the next page "If you have a plus
|
|||
|
sign in your host.equiv (sic) file, REMOVE IT."
|
|||
|
|
|||
|
Any book this length is bound to contain a few mistakes. "Practical
|
|||
|
Unix Security" is no exception. Here are some examples:
|
|||
|
|
|||
|
p. 54 The su command only changes your process's effective UID; the real
|
|||
|
UID remains the same.
|
|||
|
|
|||
|
That sounds to me like a badly broken implementation of su.
|
|||
|
|
|||
|
p. 92 Letting a user run the Berkeley mail(1) program without logging in is
|
|||
|
dangerous, because the mail program allows the user to run any command
|
|||
|
by preceding a line of the mail message with a tilde and an
|
|||
|
exclamation mark.
|
|||
|
|
|||
|
While I agree with the authors that it would be unwise, the risk is
|
|||
|
not as obvious as they assert. When a user attempts such a shell
|
|||
|
escape, 'mail' implements it by invoking the user's login shell. If,
|
|||
|
as in this example, the login shell is 'mail', then the tilde escape
|
|||
|
to execute say 'csh' would result in 'mail' attempting to execute
|
|||
|
'/usr/ucb/mail -c csh', and that would not get you very far.
|
|||
|
|
|||
|
p. 218 Your mail system should not allow mail to be sent directly to a file.
|
|||
|
Mailers that deliver directly to files can be used to corrupt system
|
|||
|
databases or application programs. You can test whether or not your
|
|||
|
system allows mail to be sent to a file with the command sequence:
|
|||
|
|
|||
|
mail /tmp/mailbug
|
|||
|
this is a mailbug file test
|
|||
|
^D
|
|||
|
|
|||
|
If the file mailbug appears in the /tmp directory, then your mailer is
|
|||
|
insecure.
|
|||
|
|
|||
|
This is not a good test to try. If 'mail /tmp/mailbug < message-file'
|
|||
|
happens to work, it doesn't do anything more dangerous than say
|
|||
|
'cat >> /tmp/mailbug < message-file'. There is only a problem if you can
|
|||
|
persuade 'mail' to write to a file you would not otherwise be able to
|
|||
|
write to, or to create a file with permissions and ownership you could
|
|||
|
not normally use. If, for example, your 'mail' program were to
|
|||
|
directly handle mail to files, and pass all other mail off to
|
|||
|
'sendmail', this would not be a security problem at all unless your
|
|||
|
mail program runs suid or sgid.
|
|||
|
|
|||
|
+++++
|
|||
|
|
|||
|
These examples are really only minor failings. But they do have the
|
|||
|
effect of making the inexperienced reader believe that Unix security
|
|||
|
is much weaker than in reality it is. This will tend to make
|
|||
|
inexperienced admins unnecessarily paranoid, and perhaps afraid to do
|
|||
|
anything useful with their system.
|
|||
|
|
|||
|
My major criticism of this book, in fact, is that it seems to present
|
|||
|
an excessively paranoid view of the subject. The authors make an
|
|||
|
attempt to avoid this very early, when they discuss risk assessment,
|
|||
|
and point at that you need not go overboard, but should provide
|
|||
|
sufficient security for the likely risk given the nature of the data
|
|||
|
on your computer and the way it is used.
|
|||
|
|
|||
|
Unfortunately, the author's seem to lose sight of this later on when
|
|||
|
they are busily pointing out the likely weaknesses, and how to protect
|
|||
|
against them. Experienced administrators will have no trouble
|
|||
|
deciding how much security they need, and balancing this with the
|
|||
|
convenience they wish to provide to their users. But I worry that
|
|||
|
novice administrators will not be able to make this judgement. They
|
|||
|
may either overreact, and be so restrictive that their system is not
|
|||
|
as useful as it should be, or they may decide that achieving
|
|||
|
reasonable security is hopeless, and not even take the simplest steps
|
|||
|
which are often the most important.
|
|||
|
|
|||
|
In summary, I recommend this book for every Unix administrator and
|
|||
|
would-be administrator, not just for the security information, but for
|
|||
|
the insight it gives into the workings of Unix. But I hope the reader
|
|||
|
will keep in mind that the authors have made things sound scarier than
|
|||
|
they really are.
|
|||
|
|
|||
|
((Neil Rickert, a professor of computer science, is the sysad of
|
|||
|
the UNIX system at Northern Illinois University)).
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 28 Jul 1991 10:15:13 CDT
|
|||
|
From: elrose@well.sf.ca.us
|
|||
|
Subject: File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint)
|
|||
|
|
|||
|
((Moderator's note: The following first appeared in Boardwatch, and
|
|||
|
later was sent across the nets by the author. We reprint it as part
|
|||
|
of the on-going discussion about life in cyberspace)).
|
|||
|
|
|||
|
Cyberspace and the Legal Matrix: Laws or Confusion?
|
|||
|
((By Lance Rose))
|
|||
|
|
|||
|
Cyberspace, the "digital world", is emerging as a global arena of
|
|||
|
social, commercial and political relations. By "Cyberspace", I mean
|
|||
|
the sum total of all electronic messaging and information systems,
|
|||
|
including BBS's, commercial data services, research data networks,
|
|||
|
electronic publishing, networks and network nodes, e-mail systems,
|
|||
|
electronic data interchange systems, and electronic funds transfer
|
|||
|
systems.
|
|||
|
|
|||
|
Many like to view life in the electronic networks as a "new frontier",
|
|||
|
and in certain ways that remains true. Nonetheless, people remain
|
|||
|
people, even behind the high tech shimmer. Not surprisingly, a vast
|
|||
|
matrix of laws and regulations has trailed people right into
|
|||
|
cyberspace.
|
|||
|
|
|||
|
Most of these laws are still under construction for the new electronic
|
|||
|
environment. Nobody is quite sure of exactly how they actually apply
|
|||
|
to electronic network situations. Nonetheless, the major subjects of
|
|||
|
legal concern can now be mapped out fairly well, which we will do in
|
|||
|
this section of the article. In the second section, we will look at
|
|||
|
some of the ways in which the old laws have trouble fitting together
|
|||
|
in cyberspace, and suggest general directions for improvement.
|
|||
|
|
|||
|
LAWS ON PARADE
|
|||
|
|
|||
|
- Privacy laws. These include the federal Electronic Communications
|
|||
|
Privacy Act ("ECPA"), originally enacted in response to Watergate, and
|
|||
|
which now prohibits many electronic variations on wiretapping by both
|
|||
|
government and private parties. There are also many other federal and
|
|||
|
state privacy laws and, of course, Constitutional protections against
|
|||
|
unreasonable search and seizure.
|
|||
|
|
|||
|
- 1st Amendment. The Constitutional rights to freedom of speech and
|
|||
|
freedom of the press apply fully to electronic messaging operations of
|
|||
|
all kinds.
|
|||
|
|
|||
|
- Criminal laws. There are two major kinds of criminal laws. First,
|
|||
|
the "substantive" laws that define and outlaw certain activities.
|
|||
|
These include computer-specific laws, like the Computer Fraud and
|
|||
|
Abuse Act and Counterfeit Access Device Act on the federal level, and
|
|||
|
many computer crime laws on the state level. Many criminal laws not
|
|||
|
specific to "computer crime" can also apply in a network context,
|
|||
|
including laws against stealing credit card codes, laws against
|
|||
|
obscenity, wire fraud laws, RICO, drug laws, gambling laws, etc.
|
|||
|
|
|||
|
The other major set of legal rules, "procedural" rules, puts limits on
|
|||
|
law enforcement activities. These are found both in statutes, and in
|
|||
|
rulings of the Supreme Court and other high courts on the permissible
|
|||
|
conduct of government agents. Such rules include the ECPA, which
|
|||
|
prohibits wiretapping without a proper warrant; and federal and state
|
|||
|
rules and laws spelling out warrant requirements, arrest requirements,
|
|||
|
and evidence seizure and retention requirements.
|
|||
|
|
|||
|
- Copyrights. Much of the material found in on-line systems and in
|
|||
|
networks is copyrightable, including text files, image files, audio
|
|||
|
files, and software.
|
|||
|
|
|||
|
- Moral Rights. Closely related to copyrights, they include the
|
|||
|
rights of paternity (choosing to have your name associated or not
|
|||
|
associated with your "work") and integrity (the right not to have your
|
|||
|
"work" altered or mutilated). These rights are brand new in U.S. law
|
|||
|
(they originated in Europe), and their shape in electronic networks
|
|||
|
will not be settled for quite a while.
|
|||
|
|
|||
|
- Trademarks. Anything used as a "brand name" in a network context
|
|||
|
can be a trademark. This includes all BBS names, and names for
|
|||
|
on-line services of all kinds. Materials other than names might also
|
|||
|
be protected under trademark law as "trade dress": distinctive sign-on
|
|||
|
screen displays for BBS's, the recurring visual motifs used throughout
|
|||
|
videotext services, etc.
|
|||
|
|
|||
|
- Right of Publicity. Similar to trademarks, it gives people the
|
|||
|
right to stop others from using their name to make money. Someone
|
|||
|
with a famous on-line name or handle has a property right in that
|
|||
|
name.
|
|||
|
|
|||
|
- Confidential Information. Information that is held in secrecy by
|
|||
|
the owner, transferred only under non-disclosure agreements, and
|
|||
|
preferably handled only in encrypted form, can be owned as a trade
|
|||
|
secret or other confidential property. This type of legal protection
|
|||
|
is used as a means of asserting ownership in confidential databases,
|
|||
|
from mailing lists to industrial research.
|
|||
|
|
|||
|
- Contracts. Contracts account for as much of the regulation of
|
|||
|
network operations as all of the other laws put together.
|
|||
|
|
|||
|
The contract between an on-line service user and the service provider
|
|||
|
is the basic source of rights between them. You can use contracts to
|
|||
|
create new rights, and to alter or surrender your existing rights
|
|||
|
under state and federal laws.
|
|||
|
|
|||
|
For example, if a bulletin board system operator "censors" a user by
|
|||
|
removing a public posting, that user will have a hard time showing his
|
|||
|
freedom of speech was violated. Private system operators are not
|
|||
|
subject to the First Amendment (which is focused on government, not
|
|||
|
private, action). However, the user may have rights to prevent
|
|||
|
censorship under his direct contract with the BBS or system operators.
|
|||
|
|
|||
|
You can use contracts to create entire on-line legal regimes. For
|
|||
|
example, banks use contracts to create private electronic funds
|
|||
|
transfer networks, with sets of rules that apply only within those
|
|||
|
networks. These rules specify on a global level which activities are
|
|||
|
permitted and which are not, the terms of access to nearby systems and
|
|||
|
(sometimes) to remote systems, and how to resolve problems between
|
|||
|
network members.
|
|||
|
|
|||
|
Beyond the basic contract between system and user, there are many
|
|||
|
other contracts made on-line. These include the services you find in
|
|||
|
a CompuServe, GEnie or Prodigy, such as stock quote services, airline
|
|||
|
reservation services, trademark search services, and on-line stores.
|
|||
|
They also include user-to-user contracts formed through e-mail. In
|
|||
|
fact, there is a billion-dollar "industry" referred to as "EDI" (for
|
|||
|
Electronic Data Interchange), in which companies exchange purchase
|
|||
|
orders for goods and services directly via computers and computer
|
|||
|
networks.
|
|||
|
|
|||
|
- Peoples' Rights Not to be Injured. People have the right not to be
|
|||
|
injured when they venture into cyberspace. These rights include the
|
|||
|
right not to be libelled or defamed by others on-line, rights against
|
|||
|
having your on-line materials stolen or damaged, rights against having
|
|||
|
your computer damaged by intentionally harmful files that you have
|
|||
|
downloaded (such as files containing computer "viruses"), and so on.
|
|||
|
|
|||
|
There is no question these rights exist and can be enforced against
|
|||
|
other users who cause such injuries. Currently, it is uncertain
|
|||
|
whether system operators who oversee the systems can also be held
|
|||
|
responsible for such user injuries.
|
|||
|
|
|||
|
- Financial Laws. These include laws like Regulations E & Z of the
|
|||
|
Federal Reserve Board, which are consumer protection laws that apply
|
|||
|
to credit cards, cash cards, and all other forms of electronic
|
|||
|
banking.
|
|||
|
|
|||
|
- Securities Laws. The federal and state securities laws apply to
|
|||
|
various kinds of on-line investment related activities, such as
|
|||
|
trading in securities and other investment vehicles, investment
|
|||
|
advisory services, market information services and investment
|
|||
|
management services.
|
|||
|
|
|||
|
- Education Laws. Some organizations are starting to offer on-line
|
|||
|
degree programs. State education laws and regulations come into play
|
|||
|
on all aspects of such services.
|
|||
|
|
|||
|
The list goes on, but we have to end it somewhere. As it stands, this
|
|||
|
list should give the reader a good idea of just how regulated
|
|||
|
cyberspace already is.
|
|||
|
|
|||
|
|
|||
|
LAWS OR CONFUSION?
|
|||
|
|
|||
|
The legal picture in cyberspace is very confused, for several reasons.
|
|||
|
|
|||
|
First, the sheer number of laws in cyberspace, in itself, can create a
|
|||
|
great deal of confusion. Second, there can be several different kinds
|
|||
|
of laws relating to a single activity, with each law pointing to a
|
|||
|
different result.
|
|||
|
|
|||
|
Third, conflicts can arise in networks between different laws on the
|
|||
|
same subject. These include conflicts between federal and state laws,
|
|||
|
as in the areas of criminal laws and the right to privacy; conflicts
|
|||
|
between the laws of two or more states, which will inevitably arise
|
|||
|
for networks whose user base crosses state lines; and even conflicts
|
|||
|
between laws from the same governmental authority where two or more
|
|||
|
different laws overlap. The last is very common, especially in laws
|
|||
|
relating to networks and computer law.
|
|||
|
|
|||
|
Some examples of the interactions between conflicting laws are
|
|||
|
considered below, from the viewpoint of an on-line system operator.
|
|||
|
|
|||
|
1. System operators Liability for "Criminal" Activities.
|
|||
|
|
|||
|
Many different activities can create criminal liabilities for service
|
|||
|
providers, including:
|
|||
|
|
|||
|
- distributing viruses and other dangerous program code;
|
|||
|
|
|||
|
- publishing "obscene" materials;
|
|||
|
|
|||
|
- trafficking in stolen credit card numbers and other unauthorized
|
|||
|
access data;
|
|||
|
|
|||
|
- trafficking in pirated software;
|
|||
|
|
|||
|
- and acting as an accomplice, accessory or conspirator in these and
|
|||
|
other activities.
|
|||
|
|
|||
|
The acts comprising these different violations are separately defined
|
|||
|
in statutes and court cases on both the state and federal levels.
|
|||
|
|
|||
|
For prosecutors and law enforcers, this is a vast array of options for
|
|||
|
pursuing wrongdoers. For service providers, it's a roulette wheel of
|
|||
|
risk.
|
|||
|
|
|||
|
Faced with such a huge diversity of criminal possibilities, few
|
|||
|
service providers will carefully analyze the exact laws that may
|
|||
|
apply, nor the latest case law developments for each type of criminal
|
|||
|
activity. Who has the time? For system operators who just want to
|
|||
|
"play it safe", there is a strong incentive to do something much
|
|||
|
simpler: Figure out ways to restrict user conduct on their systems
|
|||
|
that will minimize their risk under *any* criminal law.
|
|||
|
|
|||
|
The system operator that chooses this highly restrictive route may not
|
|||
|
allow any e-mail, for fear that he might be liable for the activities
|
|||
|
of some secret drug ring, kiddie porn ring or stolen credit card code
|
|||
|
ring. The system operator may ban all sexually suggestive materials,
|
|||
|
for fear that the extreme anti-obscenity laws of some user's home town
|
|||
|
might apply to his system. The system operator may not permit
|
|||
|
transfer of program files through his system, except for files he
|
|||
|
personally checks out, for fear that he could be accused of assisting
|
|||
|
in distributing viruses, trojans or pirated software; and so on.
|
|||
|
|
|||
|
In this way, the most restrictive criminal laws that might apply to a
|
|||
|
given on-line service (which could emanate, for instance, from one
|
|||
|
very conservative state within the system's service area) could end up
|
|||
|
restricting the activities of system operators all over the nation, if
|
|||
|
they happen to have a significant user base in that state. This
|
|||
|
results in less freedom for everyone in the network environment.
|
|||
|
|
|||
|
2. Federal vs. State Rights of Privacy.
|
|||
|
|
|||
|
Few words have been spoken in the press about network privacy laws in
|
|||
|
each of the fifty states (as opposed to federal laws). However, what
|
|||
|
the privacy protection of the federal Electronic Communications
|
|||
|
Privacy Act ("ECPA") does not give you, state laws may.
|
|||
|
|
|||
|
This was the theory of the recent Epson e-mail case. An ex-employee
|
|||
|
claimed that Epson acted illegally in requiring her to monitor e-mail
|
|||
|
conversations of other employees. She did not sue under the ECPA, but
|
|||
|
under the California Penal Code section prohibiting employee
|
|||
|
surveillance of employee conversations.
|
|||
|
|
|||
|
The trial judge denied her claim. In his view, the California law
|
|||
|
only applied to interceptions of oral telephone discussions, and not
|
|||
|
to visual communication on video display monitors. Essentially, he
|
|||
|
held that the California law had not caught up to modern technology -
|
|||
|
making this law apply to e-mail communications was a job for the state
|
|||
|
legislature, not local judges.
|
|||
|
|
|||
|
Beyond acknowledging that the California law was archaic and not
|
|||
|
applicable to e-mail, we should understand that the Epson case takes
|
|||
|
place in a special legal context - the workplace. E-mail user rights
|
|||
|
against workplace surveillance are undeniably important, but in our
|
|||
|
legal and political system they always must be "balanced" (ie.,
|
|||
|
weakened) against the right of the employer to run his shop his own
|
|||
|
way. Employers' rights may end up weighing more heavily against
|
|||
|
workers' rights for company e-mail systems than for voice telephone
|
|||
|
conversations, at least for employers who use intra-company e-mail
|
|||
|
systems as an essential backbone of their business. Fortunately, this
|
|||
|
particular skewing factor does not apply to *public* communications
|
|||
|
systems.
|
|||
|
|
|||
|
I believe that many more attempts to establish e-mail privacy under
|
|||
|
state laws are possible, and will be made in the future. This is good
|
|||
|
news for privacy advocates, a growing and increasingly vocal group
|
|||
|
these days.
|
|||
|
|
|||
|
It is mixed news, however, for operators of BBS's and other on-line
|
|||
|
services. Most on-line service providers operate on an interstate
|
|||
|
basis - all it takes to gain this status is a few calls from other
|
|||
|
states every now and then. If state privacy laws apply to on-line
|
|||
|
systems, then every BBS operator will be subject to the privacy laws
|
|||
|
of every state in which one or more of his users are located! This
|
|||
|
can lead to confusion, and inability to set reasonable or predictable
|
|||
|
system privacy standards.
|
|||
|
|
|||
|
It can also lead to the effect described above in the discussion of
|
|||
|
criminal liability. On-line systems might be set up "defensively", to
|
|||
|
cope with the most restrictive privacy laws that might apply to them.
|
|||
|
This could result in declarations of *absolutely no privacy* on some
|
|||
|
systems, and highly secure setups on others, depending on the
|
|||
|
individual system operator's inclinations.
|
|||
|
|
|||
|
3. Pressure on Privacy Rights Created by Risks to Service Providers.
|
|||
|
|
|||
|
There are two main kinds of legal risks faced by a system operator.
|
|||
|
First, the risk that the system operator himself will be found
|
|||
|
criminally guilty or civilly liable for being involved in illegal
|
|||
|
activities on his system, leading to fines, jail, money damages,
|
|||
|
confiscation of system, criminal record, etc.
|
|||
|
|
|||
|
Second, the risk of having his system confiscated, not because he did
|
|||
|
anything wrong, but because someone else did something suspicious on
|
|||
|
his system. As discussed above, a lot of criminal activity can take
|
|||
|
place on a system when the system operator isn't looking. In
|
|||
|
addition, certain non-criminal activities on the system could lead to
|
|||
|
system confiscation, such copyright or trade secret infringement.
|
|||
|
|
|||
|
This second kind of risk is very real. It is exactly what happened to
|
|||
|
Steve Jackson Games last year. Law enforcement agents seized Steve's
|
|||
|
computer (which ran a BBS), not because they thought he did anything
|
|||
|
wrong, but because they were tracking an allegedly evil computer
|
|||
|
hacker group called the "Legion of Doom". Apparently, they thought
|
|||
|
the group "met" and conspired on his BBS. A year later, much of the
|
|||
|
dust has cleared, and the Electronic Frontier Foundation is funding a
|
|||
|
lawsuit against the federal agents who seized the system.
|
|||
|
Unfortunately, even if he wins the case Steve can't get back the
|
|||
|
business he lost. To this day, he still has not regained all of his
|
|||
|
possessions that were seized by the authorities.
|
|||
|
|
|||
|
For now, system operators do not have a great deal of control over
|
|||
|
government or legal interference with their systems. You can be a
|
|||
|
solid citizen and report every crime you suspect may be happening
|
|||
|
using your system. Yet the chance remains that tonight, the feds will
|
|||
|
be knocking on *your* door looking for an "evil hacker group" hiding
|
|||
|
in your BBS.
|
|||
|
|
|||
|
This Keystone Kops style of "law enforcement" can turn system
|
|||
|
operators into surrogate law enforcement agents. System operators who
|
|||
|
fear random system confiscation will be tempted to monitor private
|
|||
|
activities on their systems, intruding on the privacy of their users.
|
|||
|
Such intrusion can take different forms. Some system operators may
|
|||
|
declare that there will be no private discussions, so they can review
|
|||
|
and inspect everything. More hauntingly, system operators may indulge
|
|||
|
in surreptitious sampling of private e-mail, just to make sure no
|
|||
|
one's doing anything that will make the cops come in and haul away
|
|||
|
their BBS computer systems (By the way, I personally don't advocate
|
|||
|
either of these things).
|
|||
|
|
|||
|
This situation can be viewed as a way for law enforcement agents to do
|
|||
|
an end run around the ECPA's bar on government interception of
|
|||
|
electronic messages. What the agents can't intercept directly, they
|
|||
|
might get through fearful system operators. Even if you don't go for
|
|||
|
such conspiracy theories, the random risk of system confiscation puts
|
|||
|
great pressure on the privacy rights of on-line system users.
|
|||
|
|
|||
|
4. Contracts Versus Other Rights.
|
|||
|
|
|||
|
Most, perhaps all, of the rights between system operators and system
|
|||
|
users can be modified by the basic service contract between them. For
|
|||
|
instance, the federal ECPA gives on-line service users certain privacy
|
|||
|
rights. It conspicuously falls short, however, by not protecting
|
|||
|
users from privacy intrusions by the system operator himself.
|
|||
|
|
|||
|
Through contract, the system operator and the user can in effect
|
|||
|
override the ECPA exception, and agree that the system operator will
|
|||
|
not read private e-mail. Some system operators may go the opposite
|
|||
|
direction, and impose a contractual rule that users should not expect
|
|||
|
any privacy in their e-mail.
|
|||
|
|
|||
|
Another example of the power of contracts in the on-line environment
|
|||
|
occurred recently on the Well, a national system based in San
|
|||
|
Francisco (and highly recommended to all those interested in
|
|||
|
discussing on-line legal issues). A Well user complained that a
|
|||
|
message he had posted in one Well conference area had been
|
|||
|
cross-posted by other users to a different conference area without his
|
|||
|
permission.
|
|||
|
|
|||
|
A lengthy, lively discussion among Well users followed, debating the
|
|||
|
problem. One of the major benchmarks for this discussion was the
|
|||
|
basic service agreement between the Well and its users. And a
|
|||
|
proposed resolution of the issue was to clarify the wording of that
|
|||
|
fundamental agreement. Although "copyrights" were discussed, the
|
|||
|
agreement between the Well and its users was viewed as a more
|
|||
|
important source of the legitimate rights and expectations of Well
|
|||
|
users.
|
|||
|
|
|||
|
Your state and federal "rights" against other on-line players may not
|
|||
|
be worth fighting over if you can get a contract giving you the rights
|
|||
|
you want. In the long run, the contractual solution may be the best
|
|||
|
way to set up a decent networked on-line system environment, except
|
|||
|
for the old bogeyman of government intrusion (against whom we will all
|
|||
|
still need our "rights", Constitutional and otherwise).
|
|||
|
|
|||
|
CONCLUSION
|
|||
|
|
|||
|
There are many different laws that system operators must heed in
|
|||
|
running their on-line services. This can lead to restricting system
|
|||
|
activities under the most oppressive legal standards, and to
|
|||
|
unpredictable, system-wide interactions between the effects of the
|
|||
|
different laws.
|
|||
|
|
|||
|
The "net" result of this problem can be undue restrictions on the
|
|||
|
activities of system operators and users alike.
|
|||
|
|
|||
|
The answers to this problem are simple in concept, but not easy to
|
|||
|
execute. First, enact (or re-enact) all laws regarding electronic
|
|||
|
services on a national level only, overriding individual state control
|
|||
|
of system operators activities in cyberspace. It's time to realize
|
|||
|
that provincial state laws only hinder proper development of
|
|||
|
interstate electronic systems.
|
|||
|
|
|||
|
As yet, there is little movement in enacting nationally effective
|
|||
|
laws. Isolated instances include the Electronic Communications
|
|||
|
Privacy Act and the Computer Fraud and Abuse Act, which place federal
|
|||
|
"floors" beneath privacy protection and certain types of computer
|
|||
|
crime, respectively. On the commercial side, the new Article 4A of
|
|||
|
the Uniform Commercial Code, which normalizes on-line commercial
|
|||
|
transactions, is ready for adoption by the fifty states.
|
|||
|
|
|||
|
Second, all laws regulating on-line systems must be carefully designed
|
|||
|
to interact well with other such laws. The goal is to create a
|
|||
|
well-defined, reasonable legal environment for system operators and
|
|||
|
users.
|
|||
|
|
|||
|
The EFF is fighting hard on this front, especially in the areas of
|
|||
|
freedom of the press, rights of privacy, and rights against search and
|
|||
|
seizure for on-line systems. Reducing government intrusion in these
|
|||
|
areas will help free up cyberspace for bigger and better things.
|
|||
|
|
|||
|
However, the fight is just beginning today.
|
|||
|
|
|||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
|||
|
|
|||
|
Lance Rose is an attorney who works primarily in the fields of
|
|||
|
computer and high technology law and intellectual property. His
|
|||
|
clients include on-line publishers, electronic funds transfer
|
|||
|
networks, data transmission services, individual system operators, and
|
|||
|
shareware authors and vendors. He is currently revising SYSLAW, The
|
|||
|
Sysop's Legal Manual. Lance is a partner in the New York City firm of
|
|||
|
Greenspoon, Srager, Gaynin, Daichman & Marino, and can be reached by
|
|||
|
voice at (212)888-6880, on the Well as "elrose", and on CompuServe at
|
|||
|
72230,2044.
|
|||
|
|
|||
|
Copyright 1991 Lance Rose
|
|||
|
|
|||
|
The above article was originally published in Boardwatch, June, 1991
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 14 Aug 91 21:24 EDT
|
|||
|
From: silicon.surfer@unixville.edu
|
|||
|
Subject: File 4--Mystery Lurks In The Death of INSLAW Reporter
|
|||
|
|
|||
|
((Moderators' note: The death of INSLAW reporter J. Daniel Casolaro by
|
|||
|
apparent suicide raises more questions about the entire affair.
|
|||
|
Former U.S. Attorney General Elliot Richardson has called for a
|
|||
|
Congressional investigation into the role of the Justice Department in
|
|||
|
the affair. The Chicago Tribune (Aug.16, 1991, p. 14) reported that a
|
|||
|
three hour autopsy this week found no evidence of anything other than
|
|||
|
suicide, but that alternatives had not been ruled out, and no cause of
|
|||
|
death has yet been given officially.))
|
|||
|
|
|||
|
|
|||
|
Mystery Lurks In The Death Of Reporter
|
|||
|
The Associated Press
|
|||
|
|
|||
|
Charleston, W. Va.- An investigative reporter found dead with his
|
|||
|
wrists slashed in a hotel bathtub had warned others that he was on to
|
|||
|
an explosive government scandal and might wind up dead in an
|
|||
|
"accident".
|
|||
|
|
|||
|
The death of free-lance journalist Joseph D. Casolaro, 44, of Fairfax,
|
|||
|
Va., initially was believed to be a suicide, but an autopsy was
|
|||
|
ordered after the family members were contacted, police said Tuesday.
|
|||
|
|
|||
|
"He told us if he got killed in an accident not to believe it. That
|
|||
|
was three months ago," said Casolaro's brother, Dr. M. Anthony
|
|||
|
Casolaro of Alexandria, Va.
|
|||
|
|
|||
|
Casolaro had been working for a year on a book on allegations made in
|
|||
|
1983 that the U.S. government stole software from INSLAW Inc., a
|
|||
|
Washington company. The company has alleged in court that after it won
|
|||
|
a $10 million contract with the Justice Department, the department
|
|||
|
stole software designed to help law enforcement officials track cases.
|
|||
|
|
|||
|
Several of Casolaro's sources had warned him he would be in danger if
|
|||
|
he continued his investigation, company owner Bill Hamilton said.
|
|||
|
|
|||
|
"I have some sources that Danny also had, and several of them told
|
|||
|
him, 'These people will snuff you out without blinking an eye.' "
|
|||
|
Hamilton said.
|
|||
|
|
|||
|
Dr. James Frost, an assistant state medical examiner, said a
|
|||
|
preliminary report on the death would be completed today.
|
|||
|
|
|||
|
The body had been embalmed before the autopsy was held. Frost said
|
|||
|
that was because early indications were that Casolaro had killed
|
|||
|
himself.
|
|||
|
|
|||
|
Acquaintances said that they seen no indications of depression and
|
|||
|
that Casolaro was in West Virginia to get more information.
|
|||
|
|
|||
|
In an outline of his book, Casolaro described his findings to Hamilton
|
|||
|
as "an octopus, created in the 1950s and operating today with impunity
|
|||
|
because it is intertwined with domestic and foreign intelligence
|
|||
|
agencies...a criminal enterprise bent on making money.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #3.30
|
|||
|
************************************
|
|||
|
|
|||
|
|