181 lines
8.8 KiB
Plaintext
181 lines
8.8 KiB
Plaintext
![]() |
THERE'S GOTTA BE A BETTER WAY
|
|||
|
|
|||
|
By Glen Roberts
|
|||
|
Bill Vajk
|
|||
|
|
|||
|
This article is reprinted from Full Disclosure. Copyright (c) 1991 Full
|
|||
|
Disclosure. Permission granted by publisher to reprint when subscription
|
|||
|
information provided: Full Disclosure, Box 903-R, Libertyville, Illinois
|
|||
|
60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll
|
|||
|
free: (800) 786-6184. Subscriptions: $18 for 12 issues.
|
|||
|
|
|||
|
This issue of Full Disclosure is devoted to the current attempts at solving
|
|||
|
the problems of computer security through prosecution of computer crimes.
|
|||
|
|
|||
|
It would appear from the recent activities of the federal government that one
|
|||
|
of its major attacks is trying to spread fear throughout the ``hacker''
|
|||
|
community. Such a concept will certainly work in a limited number of cases.
|
|||
|
However, as the reading of any local newspaper will show, numerous crimes are
|
|||
|
committed everyday, criminals are not stopped by the fear of punishment.
|
|||
|
|
|||
|
The other aspect of the government's fear program appears directed towards
|
|||
|
those who have no criminal involvement, who wish to participate in First
|
|||
|
Amendment activities by high-technology. Some have been subjected to
|
|||
|
punishment without even the allegation of criminal behavior. See related
|
|||
|
article titled ``Dr. Ripco Seizure.'' The result is a fear by some of
|
|||
|
participating in the First Amendment, not a legitimate goal of law
|
|||
|
enforcement or the government.
|
|||
|
|
|||
|
Reprinted in this issue is a copy a sentencing memorandum filed by the
|
|||
|
Government last year in a computer crime case. It portrays the defendants as
|
|||
|
particularly ``powerful by'' means of the information they stole. Missing is
|
|||
|
the fact that the lax nature of computer security is what actually gave the
|
|||
|
defendants power. If the state of computer security been reasonable secure,
|
|||
|
the information obtained by defendants (whether legally or not) would have
|
|||
|
granted them no extraordinary power.
|
|||
|
|
|||
|
A primary reason the government seeks incarceration as part of the sentence
|
|||
|
is not because of the criminal nature of the defendants activities, but
|
|||
|
rather to send ``the message that the hackers around the country need to
|
|||
|
hear.'' Unfortunately, the death penalty has failed to stop murder.
|
|||
|
|
|||
|
The government appears to be more concerned with the free flow of information
|
|||
|
than the fact that criminal acts were committed; ``[f]rom the start,
|
|||
|
information was stolen and, by definition no longer safeguarded.'' Later
|
|||
|
concluding, ``in essence, stolen information equalled power, and by that
|
|||
|
definition, all three defendants were becoming frighteningly powerful.''
|
|||
|
|
|||
|
The concept that information is the crux of the problem is also highlighted
|
|||
|
by William Cook, Assistant United States Attorney, Chicago, Illinois in an
|
|||
|
article he wrote for the Spring 1990, COMMUNICATOR<M^>*1. He noted that
|
|||
|
hackers can ``easily keep up with industry technical developments.'' He also
|
|||
|
perceives that hackers are able to easily use prior information to form
|
|||
|
attack plans on new computers.
|
|||
|
|
|||
|
As the Soviet Union moves toward a more open society, the United States is
|
|||
|
just as surely closing its windows of communication. The United States has
|
|||
|
always been the technological forefront in the world because of the ease of
|
|||
|
information flow. Researchers, corporations and individuals have always been
|
|||
|
free to group together and exchange information as desired. This has greatly
|
|||
|
increased the ability of the United States to make technological advances
|
|||
|
quickly.
|
|||
|
|
|||
|
One can easily see the results by looking at the space programs administered
|
|||
|
by NASA. They have resulted in many inventions finding their way quickly into
|
|||
|
our economy, including rapid improvements in our exports. A few of the things
|
|||
|
that have resulted from NASA's openness with U.S. industry have included: new
|
|||
|
applications such as teflon coatings (frying pans and such), inhalation
|
|||
|
therapy for lung ailments, teflon coatings for asbestos fiber made into
|
|||
|
special apparel for rescue in fires, and many more too numerous to mention.
|
|||
|
|
|||
|
The phenomenon of information exchange is exactly what William Cook describes
|
|||
|
in his article. However, because the ``hackers'' have apparently built or
|
|||
|
made use of a highly efficient communications medium they have been able to
|
|||
|
advance as quick as corporations which have failed to take devote resources
|
|||
|
to advance their informational security. The corporate security departments
|
|||
|
should make use of the same hacker communication techniques to work on their
|
|||
|
problems and see their use of the ``frightening power'' of information lead
|
|||
|
to secure computer systems.
|
|||
|
|
|||
|
The Communications Fraud Control Association (CFCA) in its published FRAUD
|
|||
|
ALERT of June 21, 1990, is concerned that the government may not be able to
|
|||
|
stop computer crime, if several organizations promising funding for legal
|
|||
|
defense follow through. At risk is the review of several federal and state
|
|||
|
statutes for compliance with constitutional guidelines. To date, even with
|
|||
|
the presence of one such rights organization, the EFF<M^><MI^>*2, in at least
|
|||
|
two federal cases, such a review has thus far been thwarted.
|
|||
|
|
|||
|
In short, we see the CFCA's position as allowing only two choices: 1) violate
|
|||
|
the rights of hackers in order to obtain convictions, or 2) the world will be
|
|||
|
runover by a rampage of hacking activities.
|
|||
|
|
|||
|
Two decades ago, the same problems, but with slightly different technology
|
|||
|
was showing its ugly face. The related article in this issue ``The Death of
|
|||
|
the Blue Box'' overviews the legal difficulties the government had in
|
|||
|
prosecuting those stealing telecommunications services.
|
|||
|
|
|||
|
Ultimately, the law enforcement efforts to stop blue boxers were by all
|
|||
|
practical means of measurement a complete failure. Only a handful of
|
|||
|
thousands of offenses were prosecuted. Those prosecutions proved to have no
|
|||
|
deterrent effect on others. Just as we will see that the few recent computer
|
|||
|
hacker prosecutions will do nothing to stem the flow of current day hacking
|
|||
|
and telecommunications fraud.
|
|||
|
|
|||
|
Prosecution of crimes throught to be victimless does little more than to
|
|||
|
strengthen the resolve to not get caught in a very evoluntionary way. The
|
|||
|
solution today is the same as it was in the blue box solution. An upgrading
|
|||
|
of the technology will prevent the simplistic attacks that are so common. The
|
|||
|
first step towards a technological upgrade requires an increase in the
|
|||
|
communication between those experiencing compromise of their data.
|
|||
|
|
|||
|
The CFCA's COMMUNICATOR claims in the February 1990 issue of Security
|
|||
|
Management to be the only regular journal on telecommunications crime.
|
|||
|
Apparently overlooking, CUD, 2600 and the non defunct Phrack. That is a small
|
|||
|
start towards the free flow of information needed by those who are looking
|
|||
|
for security solutions for their companies.
|
|||
|
|
|||
|
*1 Communications Fraud Control Association (CFCA), 7921 Jones Branch Dr,
|
|||
|
#300, McLean, Virginia 22102, Phone: (703) 848-9768, Fax: (703) 356-3701. The
|
|||
|
association also operates a Consumer Hotline for anyone experiencing phone
|
|||
|
fraud.
|
|||
|
|
|||
|
*2 EFF, The Electronic Frontier Foundation, 155 Second St, Cambridge, MA
|
|||
|
02141, Phone: (617) 864-0665, Fax: (617) 864-0866.
|
|||
|
|
|||
|
The above is reprinted from Full Disclosure Newspaper. Subscribe today and
|
|||
|
get interesting articles like the above, plus more... pictures, graphics,
|
|||
|
advertisement, and more articles. Full Disclosure is your source for
|
|||
|
information on the leading edge of surveillance technology. Print the
|
|||
|
following form, or supply the information on a plain piece of paper:
|
|||
|
|
|||
|
----
|
|||
|
|
|||
|
Please start my subscription to Full Disclosure for:
|
|||
|
|
|||
|
[ ] Sample issue, $2.00
|
|||
|
|
|||
|
[ ] 12 issue subscription, $18.00
|
|||
|
|
|||
|
[ ] 24 issue subscription, $29.95
|
|||
|
With 24 issue susbcription include free one of the following:
|
|||
|
[ ] Directory of Electronic Surveillance Equipment Suppliers
|
|||
|
[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts
|
|||
|
[ ] Maximizing PC Performance
|
|||
|
|
|||
|
Also available separately:
|
|||
|
|
|||
|
[ ] Directory of Electronic Surveillance Equipment Suppliers, $6.00
|
|||
|
|
|||
|
[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts, $5.00
|
|||
|
|
|||
|
[ ] Maximizing PC Performance, $6.00
|
|||
|
|
|||
|
Illinois residences, add 6.5% sales tax on above 3 items.
|
|||
|
|
|||
|
Enclosed is payment in the form of:
|
|||
|
|
|||
|
[ ] Check/Money order, [ ] Visa, [ ] Mastercard
|
|||
|
|
|||
|
Card no:___________________________________ Exp date:_______
|
|||
|
|
|||
|
Signature:__________________________________________________
|
|||
|
|
|||
|
Phone:______________________________________________________
|
|||
|
(required for credit card orders)
|
|||
|
|
|||
|
My name/address:
|
|||
|
|
|||
|
Name:_______________________________________________________
|
|||
|
|
|||
|
Street:_____________________________________________________
|
|||
|
|
|||
|
City/State/Zip:_____________________________________________
|
|||
|
|
|||
|
Return to: Full Disclosure, Box 903, Libertyville, Illinois 60048
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Downloaded From P-80 International Information Systems 304-744-2253
|