247 lines
13 KiB
Plaintext
247 lines
13 KiB
Plaintext
|
DR. RIPCO SEIZURE
|
|||
|
|
|||
|
This article is reprinted from Full Disclosure. Copyright (c) 1991 Full
|
|||
|
Disclosure. Permission granted by publisher to reprint when subscription
|
|||
|
information provided: Full Disclosure, Box 903-R, Libertyville, Illinois
|
|||
|
60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll
|
|||
|
free: (800) 786-6184. Subscriptions: $18 for 12 issues.
|
|||
|
|
|||
|
On May 8, 1990, Agents of the United States Secret Service, along with police
|
|||
|
and telephone company security personnel executed thirty-two search warrants
|
|||
|
across the United States as part of a two year investigation into the
|
|||
|
activities of computer hackers.
|
|||
|
|
|||
|
Full Disclosure's investigative reporting team was able to obtain the
|
|||
|
application for one of the searches that occurred in Chicago, Illinois
|
|||
|
(actually two identical warrants, one for the business and one for the
|
|||
|
residence address of a computer bulletin board (BBS) system operator).
|
|||
|
|
|||
|
Copies of a number of other search & seizure warrants were also obtained.
|
|||
|
First we will examine the two kinds of warrants and then look at the
|
|||
|
specifics of the May 8, 1990 warrant executed in Chicago, Illinois.
|
|||
|
|
|||
|
The application forms for both types of warrants are nearly identical, except
|
|||
|
for a key concept. The identification, government agent, and notary parts are
|
|||
|
the same. The purpose of the application is where the difference comes in.
|
|||
|
|
|||
|
The search warrant application form reads as follows: ``I am a(n)
|
|||
|
[official title] and have reason to believe that [] on the person of or [] on
|
|||
|
the property or premises know as (name, description and/or location)
|
|||
|
[property address], in the Northern District of Illinois there is now
|
|||
|
concealed a certain person or property, namely (describe the person or
|
|||
|
property to be seized) [descrip<>tion] which is (state one or more bases for
|
|||
|
search and seizure set forth under rule 41(n) of the Federal Rules of
|
|||
|
Criminal Procedure) concerning a violation of Title [ ] United States code,
|
|||
|
Section(s) [ ]. The facts to support a finding of Probable Cause are as
|
|||
|
follows:...'' [Emphasis added]
|
|||
|
|
|||
|
The seizure warrant application form reads as follows: ``I am a(n)
|
|||
|
[official title] there is now certain property which is subject to
|
|||
|
forfeiture to the United States, namely (describe property to be seized)
|
|||
|
[property description], in the Northern District of Illinois which is (state
|
|||
|
one or more reasons for seizure under the United States Code) concerning a
|
|||
|
violation of Title [ ] United States code, Section(s) [ ]. The facts to
|
|||
|
support a finding of Probable Cause for issuance of a Seizure Warrant are as
|
|||
|
follows:...'' [Emphasis added]
|
|||
|
|
|||
|
The content of the applications varies in what is being sought, also. For
|
|||
|
example, in one search warrant application seeking a warrant to search a
|
|||
|
computer system in Lockport, Illinois, the applicant stated in part: ``My
|
|||
|
investigation has revealed that on or about October 5, 1989, Richard Andrews
|
|||
|
and Leonard Rose transported a stolen or fraudulently obtained computer
|
|||
|
program worth $77,000.00 from Middle Town, Maryland to Naperville, Illinois
|
|||
|
and then to Lockport, Illinois.'' This affidavit was not part of the May
|
|||
|
8, 1990 series of ``Sundevil'' warrants.
|
|||
|
|
|||
|
Along with the other information provided in the application lead the
|
|||
|
Magistrate to conclude that there was probable cause that evidence of a crime
|
|||
|
would be found on the computer in Lockport. A search warrant was issued.
|
|||
|
|
|||
|
The application for a seizure warrant (filed by the Chicago Police Department
|
|||
|
in Federal Court), however, was directed toward a different end: ``Our
|
|||
|
investigation has revealed that Rufus Sims is a major narcotics dealer
|
|||
|
operating primarily on the west side of Chicago. Since February 1989, the
|
|||
|
United States has seized over $1.2 million in assets, including three parcels
|
|||
|
of real estate (including an apartment building), numerous auto-mobiles and
|
|||
|
over $650,000 in currency, that are the proceeds of Rufus Sims' narcotics
|
|||
|
activity. Rufus Sims has not attempted to dispute the forfeiture of any of
|
|||
|
this property or contested the fact that the property is narcotics proceeds.
|
|||
|
. . . Our investigation has revealed that there is a safe deposit box
|
|||
|
registered to Steven Sims at Austin Bank of Chicago, 5645 West Lake Street,
|
|||
|
Chicago, Illinois. Based upon what our previous investigation has revealed
|
|||
|
about the manner in which Rufus Sims conceals his narcotics proceeds, often
|
|||
|
using safe deposit boxes registered in the names of friends and family
|
|||
|
members, and based upon Steven Sims' direct involvement in Rufus Sims'
|
|||
|
organization and his participation in the handling of narcotics proceeds with
|
|||
|
Rufus Sims, I believe that this safe deposit box contains proceeds of
|
|||
|
narcotics transactions and that such contents are subject to forfeiture
|
|||
|
pursuant to 21 U.S.C. 881(a)(6).''
|
|||
|
|
|||
|
In short, the search warrant is to seek out evidence of a crime and may
|
|||
|
involve the seizure of property for evidential purposes. The seizure warrant
|
|||
|
is for transferring assets from an individual to the government because the
|
|||
|
government is statutory ``owed'' those assets for some reason. In essence the
|
|||
|
seizure warrant imposes a punishment without trial or such legal activities
|
|||
|
as the average citizen equates with due process.
|
|||
|
|
|||
|
The May 8, 1990 warrant executed in Chicago, Illinois as part of the
|
|||
|
nationwide sweep was not a search warrant. Rather it sought ``property
|
|||
|
which is subject to forfeiture to the United States'' was located at a
|
|||
|
particular location, being the location of a computer bulletin board named
|
|||
|
``Dr. Ripco.''
|
|||
|
|
|||
|
From the start it was curious that Dr. Ripco was served a seizure warrant
|
|||
|
seeking forfeiture of his computer equipment when the government was
|
|||
|
apparently seeking evidence of the crimes of computer hackers. However, an
|
|||
|
interview with the system operator disclosed that after his equipment was
|
|||
|
carted off on May 8, 1990 he hadn't heard back. No arrest was forthcoming,
|
|||
|
not even an interview.<M^>*1
|
|||
|
|
|||
|
Why was the system seized? The Secret Service employed a confidential
|
|||
|
informant (CI 404-235) who accessed Dr. Ripco over three dozen times in 1989
|
|||
|
and over a dozen in 1990. He is reported to have regularly seen messages
|
|||
|
posted by other users which contained long distance carrier customer
|
|||
|
authorization codes, references to hacking, and to credit cards and credit
|
|||
|
bureaus.
|
|||
|
|
|||
|
Some of the messages in question were quoted in the warrant application. A
|
|||
|
number of them that provided long distance access codes also had verification
|
|||
|
by the long distance carrier that such codes had or had not been used
|
|||
|
fraudulently. Additionally, CI 404-235 and one of the board users arranged
|
|||
|
(apparently by way of private electronic mail on Dr. Ripco) to exchange
|
|||
|
credit card numbers for long distance access codes. CI 404-235 was given
|
|||
|
special authorization codes by U.S. Sprint to use for this purpose. No
|
|||
|
mention is made as to whether any fraudulent calls were made on that
|
|||
|
authorization code, nor whether the credit card numbers received by CI
|
|||
|
404-235 would pass the cursory verification requested by retailers. Nor are
|
|||
|
there any presented allegations that any attempts were made to utilize the
|
|||
|
credit card numbers.
|
|||
|
|
|||
|
What did the system operator do? The application fails to allege that the
|
|||
|
system operator was in any was involved in telecommunications fraud, credit
|
|||
|
card fraud, or any other crime. In its definitions of BBS and system
|
|||
|
operators it presents a picture where the job of being a system operator is
|
|||
|
time consuming due to the volume of messages that have to be reviewed.
|
|||
|
|
|||
|
No statutes are cited defining any obligations or responsibilities of system
|
|||
|
operations to either control the content of messages on their system, nor
|
|||
|
report ``illegal'' messages to any authorities.
|
|||
|
|
|||
|
It only by implication states that the Dr. Ripco system operator didn't
|
|||
|
fulfill their unsupported claim that a system operator has some obligation to
|
|||
|
control content of messages: ``[s]pecial Agent Lawson's investigation has
|
|||
|
further determined that the access codes posted on the RIPCO BBS are not
|
|||
|
concealed from the system administrator of the bbs and could be seen by the
|
|||
|
system administrator of the bbs during an examination.''
|
|||
|
|
|||
|
Part of the application's definition of the responsibility of the system
|
|||
|
operator is the ability to read every message on the system, including
|
|||
|
private electronic mail messages. The Electronic Communications Privacy Act
|
|||
|
of 1986 raises legal questions about the right of a system operator to do so,
|
|||
|
contrary to whatever technical abilities might exist. Similar to the
|
|||
|
prohibitions of telephone company personnel taping phone lines.
|
|||
|
|
|||
|
The application is also silent about what efforts Dr. Ripco's system
|
|||
|
administrator took to delete such messages if and when he discovered them.
|
|||
|
Assuming that he didn't review, or that if he did review them, didn't delete
|
|||
|
any messages, it is not clear that as merely as the provider of an electronic
|
|||
|
communications service he is anymore liable for the content of messages, than
|
|||
|
the telephone companies are liable for the content of conversations their
|
|||
|
equipment carries. There were no allegations in the warrant application that
|
|||
|
the system operated posted any such information.
|
|||
|
|
|||
|
There are many legal questions regarding the liability of BBS operators with
|
|||
|
respect to message content on their services, legal responsibility to review
|
|||
|
public and/or private messages raised by this case.
|
|||
|
|
|||
|
The action taken in this case appears to be directed at solving the computer
|
|||
|
crime problem by indirect means. There are no allegations of criminal
|
|||
|
activity by the system operator. Rather than issue a subpoena to the system
|
|||
|
operator (under the Electronic Communications Privacy Act of 1986) for
|
|||
|
applicable records and messages of those users that were involved in criminal
|
|||
|
activity, they took an unique route.
|
|||
|
|
|||
|
They declared that third party equipment used by numerous members of the
|
|||
|
public, including some who might have engaged in criminal activity (Full
|
|||
|
Disclosure has been unable to find any federal criminal court cases relating
|
|||
|
to the Dr. Ripco users named in the application that were involved in credit
|
|||
|
card/long distance authorization access code trading) to be subject to
|
|||
|
forfeiture to the United States. A court order was then obtained without the
|
|||
|
knowledge or the ability of the owner to contest such proceeding.
|
|||
|
|
|||
|
The same technique used against other electronic communications providers
|
|||
|
would be considered so outrageous as to not even be attempted; seizing AT&T
|
|||
|
long distance microwave links, for example, because some drug dealers
|
|||
|
arranged a deal in a conversation that was carried by them. However, many see
|
|||
|
BBS systems as a threat to the power structure as they allow any individual
|
|||
|
to reach a broad audience with his opinions. The power to reach a vast
|
|||
|
audience with a political opinion has till now been limited to a select few.
|
|||
|
|
|||
|
Mixing up the problem of those desiring criminal intent with those simply
|
|||
|
exercising first amendment rights is surely an effective method of smearing
|
|||
|
those with no bad intent. Subjecting those who desire to provide a wide-area
|
|||
|
public communications system to average members of the public to arbitrary
|
|||
|
punishment because a few miscreants act inappropriately is as absurd as
|
|||
|
seizing a long distance network over a drug dealers conversation.
|
|||
|
|
|||
|
*1 Interestingly, according to Federal Court records in Chicago,
|
|||
|
Rufus Sims (as of January 7th, 1991) had never been charged with any federal
|
|||
|
crime, even though the federal government had been seizing narcotics assets
|
|||
|
since February 1989.
|
|||
|
|
|||
|
The above is reprinted from Full Disclosure Newspaper. Subscribe today and
|
|||
|
get interesting articles like the above, plus more... pictures, graphics,
|
|||
|
advertisement, and more articles. Full Disclosure is your source for
|
|||
|
information on the leading edge of surveillance technology. Print the
|
|||
|
following form, or supply the information on a plain piece of paper:
|
|||
|
|
|||
|
----
|
|||
|
|
|||
|
Please start my subscription to Full Disclosure for:
|
|||
|
|
|||
|
[ ] Sample issue, $2.00
|
|||
|
|
|||
|
[ ] 12 issue subscription, $18.00
|
|||
|
|
|||
|
[ ] 24 issue subscription, $29.95
|
|||
|
With 24 issue susbcription include free one of the following:
|
|||
|
[ ] Directory of Electronic Surveillance Equipment Suppliers
|
|||
|
[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts
|
|||
|
[ ] Maximizing PC Performance
|
|||
|
|
|||
|
Also available separately:
|
|||
|
|
|||
|
[ ] Directory of Electronic Surveillance Equipment Suppliers, $6.00
|
|||
|
|
|||
|
[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts, $5.00
|
|||
|
|
|||
|
[ ] Maximizing PC Performance, $6.00
|
|||
|
|
|||
|
Illinois residences, add 6.5% sales tax on above 3 items.
|
|||
|
|
|||
|
Enclosed is payment in the form of:
|
|||
|
|
|||
|
[ ] Check/Money order, [ ] Visa, [ ] Mastercard
|
|||
|
|
|||
|
Card no:___________________________________ Exp date:_______
|
|||
|
|
|||
|
Signature:__________________________________________________
|
|||
|
|
|||
|
Phone:______________________________________________________
|
|||
|
(required for credit card orders)
|
|||
|
|
|||
|
My name/address:
|
|||
|
|
|||
|
Name:_______________________________________________________
|
|||
|
|
|||
|
Street:_____________________________________________________
|
|||
|
|
|||
|
City/State/Zip:_____________________________________________
|
|||
|
|
|||
|
Return to: Full Disclosure, Box 903, Libertyville, Illinois 60048
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Downloaded From P-80 International Information Systems 304-744-2253
|