891 lines
46 KiB
Plaintext
891 lines
46 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun Jan 31, 1993 Volume 5 : Issue 09
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Copy Editor: Etaion Shrdlu, Junoir
|
|||
|
|
|||
|
CONTENTS, #5.09 (Jan 31, 1993)
|
|||
|
File 1--Media hype goes both ways (in re: Forbes article)
|
|||
|
File 2--Forbes, NPR, and a Response to Jerry Leichter
|
|||
|
File 3--Revised Computer Crime Sent
|
|||
|
File 4--Balancing Computer Crime Statutes and Freedom
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
|
|||
|
at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
|
|||
|
466893; and using anonymous FTP on the Internet from ftp.eff.org
|
|||
|
(192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
|
|||
|
/cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
|
|||
|
ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
|||
|
Back issues also may be obtained from the mail server at
|
|||
|
mailserv@batpad.lgb.ca.us.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Tue, 12 Jan 93 12:20:21 EDT
|
|||
|
From: Jerry Leichter <leichter@LRW.COM>
|
|||
|
Subject: 1--Media hype goes both ways (in re: Forbes article)
|
|||
|
|
|||
|
In Cu Digest, #4.66, Jim Thomas reviews article from the 21 December
|
|||
|
1992 Forbes Magazine, and grants it CuD's 1992 MEDIA HYPE award. I
|
|||
|
read the article before reading Thomas's comments, and was considering
|
|||
|
posting a very different summary. Did we read the same words?
|
|||
|
|
|||
|
Let me briefly summarize what I got out of the article, and then go
|
|||
|
over some of Thomas's points. The article claims that we are seeing a
|
|||
|
new kind of computer miscreant. Let me call such people "crims", a
|
|||
|
word I've just invented; according to the article, they identify
|
|||
|
themselves as hackers (to the extent they identify themselves at all),
|
|||
|
so the article also calls them hackers (sometimes, "hacker hoods"),
|
|||
|
thus raising many irrelevant emotional issues.
|
|||
|
|
|||
|
Unlike old-style hackers, who were in it for what they could build; or
|
|||
|
new-style hackers, who are nominally in it for what they can learn;
|
|||
|
crims are in it for what they can steal. The article does NOT claim
|
|||
|
that the same people who've been hackers have now turned to real
|
|||
|
crime; rather, as I read it it claims that the crims have taken the
|
|||
|
techniques developed by the hackers and gone on to different things.
|
|||
|
Just look at the title of the article: "The Playground Bullies are
|
|||
|
Learning how to Type". The crims are the people who a few years ago
|
|||
|
might be burglars or jewel thieves; today, they are learning how to go
|
|||
|
after money and other valuable commodities (like trade or military
|
|||
|
secrets) in their new, electronic form.
|
|||
|
|
|||
|
Thomas's criticism begins with a long attack on Brigid McMenamin, one
|
|||
|
of the reporters on the piece. He is upset that she keeps "bugging"
|
|||
|
people for information. Reporters do that; it's not their most
|
|||
|
endearing quality, but it's essential to their job, especially when
|
|||
|
dealing with people who don't particularly want to talk to them. He
|
|||
|
is upset that she kept asking about "illegal stuff" and "was oblivious
|
|||
|
to facts or issues that did not bear upon hackers-as-criminals." Given
|
|||
|
the article she was writing - exactly focusing on the crims - that's
|
|||
|
exactly what I would have expected her to do. Just because Thomas is
|
|||
|
interested in the non-criminal side of hacking doesn't mean McMenamin
|
|||
|
is under any obligation to be. Thomas reports that in his own
|
|||
|
conversations with McMenamin "Her questions suggested that she did not
|
|||
|
understand the culture about which she was writing." Again, Thomas
|
|||
|
presumes that she was writing about the people *Thomas* is interested
|
|||
|
in.
|
|||
|
|
|||
|
In general, Thomas's criticisms of McMemanim reveal him to be so
|
|||
|
personally involved with the "hacker culture" that he studies that
|
|||
|
he's protective of it - and blind to the possibility that the world
|
|||
|
may be bigger and nastier than he would like.
|
|||
|
|
|||
|
Thomas then summarizes "The Story". He criticizes it for not
|
|||
|
presenting a "coherent and factual story about the types of computer
|
|||
|
crime", but rather for making "hackers" the focal point and taking on
|
|||
|
a narrative structure. Well, I didn't particularly see "hackers" as
|
|||
|
the focal point, and considering the nature of the material being
|
|||
|
covered - it's all recent, and the crims are hardly likely to be
|
|||
|
interested in making themselves available to reporters - a narrative
|
|||
|
structure is probably inevitable. Perhaps Thomas will write the
|
|||
|
definitive study of the types of computer crime; I doubt any working
|
|||
|
reporter will do so for a magazine.
|
|||
|
|
|||
|
Len Rose's story is told with a reasonable slant. None of us know ALL
|
|||
|
the facts, but at least Rose is pictured as a relatively innocent
|
|||
|
victim, chosen pretty much at random to bear the weight of actions
|
|||
|
taken by many people. In fact, that's just what a prosecutor
|
|||
|
interviewed in this piece of the story says: Because of the nature of
|
|||
|
the crimes, such as they are, the people caught and punished are often
|
|||
|
not the ones who actually did much of anything. He doesn't indicate
|
|||
|
that he LIKES this - just the opposite. He reports on facts about the
|
|||
|
real world.
|
|||
|
|
|||
|
Thomas then says that the article describes a salami-slicing attack,
|
|||
|
alleged to have taken place at Citibank. He criticizes the article
|
|||
|
for lack of evidence. He's right, but after all, this was a criminal
|
|||
|
enterprise, and the criminals weren't caught. Just what evidence
|
|||
|
would he expect? He then goes on with a comment that makes no sense
|
|||
|
at all:
|
|||
|
|
|||
|
Has anybody calculated how many accounts one would have to "skim" a
|
|||
|
few pennies from before obtaining $200,000? At a dime apiece, that's
|
|||
|
over 2 million. If I'm figuring correctly, at one minute per account,
|
|||
|
60 accounts per minute non-stop for 24 hours a day all year, it would
|
|||
|
take nearly 4 straight years of on-line computer work for an
|
|||
|
out-sider. According to the story, it took only 3 months. At 20
|
|||
|
cents an account, that's over a million accounts.
|
|||
|
|
|||
|
Why would anyone even imagine that an attack of this nature would be
|
|||
|
under-taken on an account-at-a-time basis? The only way it makes
|
|||
|
sense is for the attack to have modified the software. If the
|
|||
|
criminals had a way to directly siphon money out of an account, they
|
|||
|
would have made one big killing and disappeared. Citibank has many
|
|||
|
thousands of accounts with much more than $200,000 in them; it
|
|||
|
probably has many thousands of accounts for which a $200,000
|
|||
|
discrepancy wouldn't be noticed until the end of the quarter. A
|
|||
|
salami-slice attack only makes sense when the attacker intends to
|
|||
|
remain undetected, so that the attack continues to operate
|
|||
|
indefinitely.
|
|||
|
|
|||
|
The romantic picture of the hacker sitting at his terminal, day in and
|
|||
|
day out, moving a few pennies here and there, may have a lot of
|
|||
|
appeal, but it's not reality.
|
|||
|
|
|||
|
The crux of the Thomas's critique is: "Contrary to billing, there was
|
|||
|
no evidence in the story, other than questionable rumor, of %hacker'
|
|||
|
connection to organized crime." But, again, that isn't the point of
|
|||
|
the story, which to me seemed to do a fairly reasonable (though
|
|||
|
imperfect) job of distinguishing between the innocents who "just want
|
|||
|
to hack" and the new "crims". The article does, however, warn that
|
|||
|
the crims will have no compunctions about using the hackers, whether
|
|||
|
by just showing up at hacker conventions to learn the latest tricks -
|
|||
|
like every group, hackers think they can identify the "true" group
|
|||
|
members who believe in the group's ideals, when in fact it's always
|
|||
|
been trivially easy for those who are willing to lie to sneak in - or
|
|||
|
by hiring hackers, with money, drugs, or whatever.
|
|||
|
|
|||
|
I don't know to what degree the rumors of the spread of the crims are
|
|||
|
true. It makes SENSE that they would be true, and in certain cases
|
|||
|
(particularly cellular telephone fraud) we have strong evidence. It's
|
|||
|
naive to think that the hacker community or the hacker ethic is
|
|||
|
somehow immune to the influence of criminal minds.
|
|||
|
|
|||
|
There was an explicit warning from some prosecuter quoted in the
|
|||
|
article. What he said was that people are upset by the crimes, and
|
|||
|
government is responding harshly, often against the wrong targets. No
|
|||
|
one would be so stupid as to walk into a bank carrying a toy gun and
|
|||
|
try to get money from a teller, intending to leave it at the door,
|
|||
|
"just to test security". Yet hackers seem to believe that they can do
|
|||
|
the same thing with a bank's computers. If there were no such thing
|
|||
|
as real bank robbers, the toy gun game would be just fine; in the real
|
|||
|
world, that's an excellent way to get shot - or sent to prison for
|
|||
|
many years. As the crims become more active - and even if the current
|
|||
|
stories are all baseless, they inevitably will, and sooner rather than
|
|||
|
later - any hackers who don't adjust to the new reality will find
|
|||
|
themselves in big trouble. Many's the idealist who's been lead by the
|
|||
|
nose to help the dishonest - and it's usually the idealist who gets
|
|||
|
stuck with the bills.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 30 Jan 93 23:01:49 CST
|
|||
|
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
|||
|
Subject: 2--Forbes, NPR, and a Response to Jerry Leichter
|
|||
|
|
|||
|
Jerry Leichter asks of our mutual reading of Forbes' Magazine's "The
|
|||
|
Hacker Hood" article (see CuD #4.66): "Did we read the same words?"
|
|||
|
Although his question is presumably rhetorical, and although we
|
|||
|
normally do not respond to articles (even if critical), Jerry's
|
|||
|
question and commentary raises too many issues to let pass. The answer
|
|||
|
to his rhetorical question is: No, we did not read the same words. Not
|
|||
|
only did we not read the same words in the Forbes piece, I'm not
|
|||
|
certain that Jerry read the Forbes article with particular care, and
|
|||
|
it's certain he did not read our response to it (or our oft-repeated
|
|||
|
position on "computer deviance" over the years) with care. This would
|
|||
|
be of little consequence except that he makes several false assertions
|
|||
|
about my own background and he embodies an attitude that perpetuates
|
|||
|
the kinds of misunderstandings that lead to questionable laws, law
|
|||
|
enforcement, and misunderstanding among the public. Although Jerry
|
|||
|
obviously wrote in passion and in good faith, his commentary again
|
|||
|
raises the issues that we found disturbing in the Forbes piece. We
|
|||
|
thank him for his post and for the opportunity to again address these
|
|||
|
issues.
|
|||
|
|
|||
|
Jerry's criticism's of the Forbes' commentary can be divided into
|
|||
|
three parts: 1) His perception of my naivete; 2) His disagreement with
|
|||
|
our evaluation and interpretation of the Forbes writers and the
|
|||
|
substance of the article; and 3) A disagreement over the nature and
|
|||
|
extend of "hacker crime."
|
|||
|
|
|||
|
1. JERRY'S CRITICISMS OF THOMAS
|
|||
|
|
|||
|
Jerry's criticisms of me include several of sufficient magnitude that
|
|||
|
they require a response. First, he claims that I'm apparently blinded
|
|||
|
to objectivity because of a commitment to hacking:
|
|||
|
|
|||
|
>In general, Thomas's criticisms of McMemanim (sic) reveal him to
|
|||
|
be >so personally involved with the "hacker culture" that he
|
|||
|
>studies that he's protective of it - and blind to the
|
|||
|
>possibility that the world may be bigger and nastier than he
|
|||
|
>would like.
|
|||
|
|
|||
|
Had he claimed that I'm so involved in civil rights that I sometimes
|
|||
|
lose objectivity, I might agree with him. However, even a cursory
|
|||
|
reading of my response indicates that the criticisms of one of the
|
|||
|
Forbes writers, Brigid McMenamin would reveal that the objections had
|
|||
|
nothing to do with hackers or rights, but with journalistic ethics and
|
|||
|
responsibility. Those with whom I spoke who were contacted by Ms.
|
|||
|
McMenamin all reached an independent consensus about her methods,
|
|||
|
"homework," and ability to write a factual story. Jerry counters with
|
|||
|
no facts that would dispute any of the interpretations, but instead
|
|||
|
seems to defend what some judged as incompetence. Is it not possible,
|
|||
|
in Jerry's worldview, to question a reporter's methods, especially
|
|||
|
when those methods seem troublesome to others who are experienced in
|
|||
|
dealing with the press?
|
|||
|
|
|||
|
It's also unclear how Jerry interprets anything written by CuD editors
|
|||
|
as "protective" of "hacker culture." My Forbes commentary was quite
|
|||
|
clear: The issue isn't whether one supports of opposes "hacker
|
|||
|
culture." It's simply whether we believe that a medium such as Forbes
|
|||
|
should be committed to minimal standards of accuracy or whether we are
|
|||
|
willing to accept broad assertions and innuendo that contribute to the
|
|||
|
hysteria that feeds bad legislation and questionable law enforcement
|
|||
|
tactics such as those occuring during the "hacker crackdown."
|
|||
|
|
|||
|
I also assure Jerry that, as a criminologist who has lived in and also
|
|||
|
studied the nastiest criminal cultures, I recognize that segments of
|
|||
|
the world are indeed big and nasty. I also recognize that nastiness is
|
|||
|
not limited to the criminal segment of society. In the scheme of
|
|||
|
things, even the worst of computer crime is generally not among the
|
|||
|
worst offenses that one can commit. He seems unaware that the current
|
|||
|
U.S. prison population hoovers around 900,000, and that it's
|
|||
|
increasing by almost ten percent a year. Much of this increase is due
|
|||
|
to "get tough" attitudes on crime in which an increasing number of
|
|||
|
behaviors are criminalized, sanctions for crimes are increased, and
|
|||
|
sentences imposed (and time served) grows longer. Jerry fails to
|
|||
|
understand that the issue isn't simply "hackers," but rather what
|
|||
|
constitutes an acceptable social response to new social offenses.
|
|||
|
|
|||
|
Jerry also implies that to criticize increased criminalization and to
|
|||
|
oppose demonization for relatively mild offenses is naively
|
|||
|
idealistic. Although he fails to provide a rationale for this claim,
|
|||
|
it presumably stems from a view that sees advocates of civil rights
|
|||
|
siding with criminals rather than victims. This, of course, is a false
|
|||
|
argument. There is little, if any, evidence that civil rights
|
|||
|
advocates side with criminals. Rather, they side with the rule of law
|
|||
|
that, under our Constitution, guarantees protections to all people.
|
|||
|
The Forbes article creates an image that, in a time of strong
|
|||
|
opposition to civil rights, promotes inappropriately strong laws and
|
|||
|
weaker protections of rights. If adhering to the Enlightenment
|
|||
|
principles and Constitutional values on which our judicial (and
|
|||
|
social) system were founded makes me a naive idealist, then I'm guilty
|
|||
|
as charged. I find this a far more civilized stance than the
|
|||
|
alternative.
|
|||
|
|
|||
|
2. JERRY'S CRITICISMS OF MY INTERPRETATION OF THE FORBES PIECE
|
|||
|
|
|||
|
Jerry "didn't particularly see 'hackers' as the focal point of the
|
|||
|
story." The title and the narrative of the piece seemed quite clear:
|
|||
|
"The Hacker Hoods?" Nearly every paragraph alluded to vague hacker
|
|||
|
criminality or to specific people identified as criminal "hackers."
|
|||
|
No, I do not think we did read the same words. If I had any lingering
|
|||
|
doubts about Jerry's lack of thoroughness in reading the Forbes piece,
|
|||
|
they were eliminated when I read his criticism of my commentary on the
|
|||
|
"salami attack." The Forbes piece adduced as an example of a "hacker
|
|||
|
crime" an unsupported story about a computer intruder who lopped a
|
|||
|
penny or two from various accounts. Jerry thinks it odd that one
|
|||
|
would question the veracity of the story and suggests that, contrary
|
|||
|
to what I said, a hacker could easily do this in a few seconds with a
|
|||
|
"big killing." He apparently failed to note that the story indicated
|
|||
|
this was done by skimming "off a penny or so from each account. Once he
|
|||
|
((the hacker)) had $200,000, he quit" (p. 186). Again, it seems we
|
|||
|
didn't read the same words. The point wasn't whether this could be
|
|||
|
done, but that the story was provided as "fact" with no corroboration.
|
|||
|
In fact, neither the banking victim (Citibank) nor a nationally
|
|||
|
recognized computer crime expert (Donn Parker) had knowledge of the
|
|||
|
deed. As written in Forbes, the method does raise some skepticism, as
|
|||
|
Jerry concedes:
|
|||
|
|
|||
|
>The romantic picture of the hacker sitting at his terminal,
|
|||
|
>day in and day out, moving a few pennies here and there, may
|
|||
|
>have a lot of appeal, but it's not reality.
|
|||
|
|
|||
|
Here we agree. Had he read the Forbes piece accurately, he would
|
|||
|
see that this was precisely my point. The picture Jerry disputes is
|
|||
|
the one drawn in the Forbes piece. It appears that he agrees with me:
|
|||
|
The Forbes picture is not reality.
|
|||
|
|
|||
|
The issue here isn't that Jerry didn't read either the Forbes piece or
|
|||
|
the commentary carefully. Rather, it's that his comments show how
|
|||
|
easily even an otherwise informed reader can uncritically gloss over
|
|||
|
material that doesn't conform to a preferred view. It's not that I
|
|||
|
disagree with Jerry (or the Forbes piece). Rather, the issue at
|
|||
|
stake lies in a fundamental difference over how material is to
|
|||
|
be presented. In highly volatile topics, sensationalistic portrayals
|
|||
|
strike me as irresponsible and reinforce attitudes that lead to
|
|||
|
unacceptable social responses. The Forbes piece and Jerry's
|
|||
|
uncritical acceptance of it contribute to what in past times were
|
|||
|
called witch hunts. Jerry seems to find it odd that one would object
|
|||
|
to claims being made without evidence:
|
|||
|
|
|||
|
>He ((Thomas)) criticizes the article for lack of
|
|||
|
>evidence. He ((Thomas))'s right, but after all, this
|
|||
|
>was a criminal enterprise, and the criminals weren't
|
|||
|
>caught. Just what evidence would he expect?
|
|||
|
|
|||
|
Crimes are detected in two ways. First, the criminal is apprehended in
|
|||
|
the act. Second, a victim reports the crime. As a criminologist, I've
|
|||
|
been taught that however one measures crime, it is generally done
|
|||
|
either by some combination of crimes known to police or by
|
|||
|
victimization surveys. In an article ostensibly describing crime, I
|
|||
|
would assume that there would be at least minimal evidence for the
|
|||
|
hard core crimes attributed to "hackers". It's obvious Jerry and I
|
|||
|
did not read the same words. Didn't he read Managing Editor Lawrence
|
|||
|
Minard's introduction?
|
|||
|
|
|||
|
>While working with Bill Flanagan on the multibillion-dollar
|
|||
|
>telephone toll fraud phenomenon (Forbes, Aug. 3), Brigid
|
|||
|
>McMenamin was intrigued to find that organized crime was
|
|||
|
>hiring young computer hackers to do some of their electronic
|
|||
|
>dirty work.
|
|||
|
|
|||
|
This is a claim. Other claims are made in the article. It's not
|
|||
|
unreasonable to expect at least minimal evidence for the claims made.
|
|||
|
The story was not based on facts but on innuendo. The Forbes piece
|
|||
|
was criticized *not* because it was in opposition to a preferred view
|
|||
|
of a particular social group, but because it took a stigmatized group
|
|||
|
and further demonized it by making claims without recourse to specific
|
|||
|
cases.
|
|||
|
|
|||
|
3. WHAT'S AT STAKE IN THIS DISCUSSION
|
|||
|
|
|||
|
As I stated explicitly in my original Forbes commentary, the issue is
|
|||
|
not whether "hackers" are portrayed to one's liking. The point is how
|
|||
|
one creates images of groups or behaviors that lead to social stigma
|
|||
|
and criminal sanctions. I judged the Forbes piece to grossly err on
|
|||
|
the side of falsely dramatizing a label that has been misused, abused,
|
|||
|
and used to create what many judge as inappropriate or chaotic laws.
|
|||
|
|
|||
|
If the Forbes piece were limited to identifying new types of computer
|
|||
|
crime without attempting to exaggerate the link between "hackers" and
|
|||
|
organized crime, and if it had been more factual, it would not have
|
|||
|
been objectionable. If it had focused on computer delinquents and the
|
|||
|
problems they cause by identifying explicit instances of security
|
|||
|
transgressions, telephone abuse, or other identifiable behaviors, it
|
|||
|
would have been less objectionable. Had it made a clear distinction
|
|||
|
between the culture of "hackers," whether the old-guard explorer or
|
|||
|
the newer nuisance and computer criminals who do use a computer to
|
|||
|
prey (but are not "hackers"), it would have been less objectionable.
|
|||
|
The Forbes piece did none of this. Instead, it distorted both
|
|||
|
"hacking" and computer crime. The authors did nothing to clarify a
|
|||
|
complex problem and did much to obscure it. There is computer crime?
|
|||
|
Old news. Some hackers commit computer crimes? Old news. What is new
|
|||
|
in the piece is that it implies a logic in which a) anyone adept at a
|
|||
|
computer is a hacker; b) Computer criminals (by definition) are adept
|
|||
|
at computers; c) Computer criminals are hackers.
|
|||
|
Conclusion: Look out for the hackers!
|
|||
|
|
|||
|
Consider: Substitute the term "computer professionals" or "sys ads"
|
|||
|
for "hackers." "Sys ad bullies?" "Sys ads learn to type and commit
|
|||
|
crimes?" Computer criminals, by definition, have computer skills, and
|
|||
|
to conflate all computer crime with "hacking" makes as much sense as
|
|||
|
conflating computer criminals with any other label that captures the
|
|||
|
imagination of a public that can't distinguish between the reality and
|
|||
|
the simulacrum. In the Forbes piece, the symbol, "hackers," becomes an
|
|||
|
abstract demon. Forbes employed its resources, which are considerable,
|
|||
|
to produce a misleading piece that subverts the efforts of those who
|
|||
|
attempt to balance fair laws and their application to civil liberties.
|
|||
|
I doubt that Forbes' readers, over one million of them, were able to
|
|||
|
ascertain the complexities of this delicate balance from the article.
|
|||
|
|
|||
|
The visibility of the Forbes article also put one author, William
|
|||
|
Flanagan, in the public eye on a National Public Radio "Morning
|
|||
|
Edition" segment (21 December, '92). Flanagan essentially repeated his
|
|||
|
points from the article. When asked by reporter Renee Montagne "But
|
|||
|
are we talking about computer hackers who've become criminals, or is
|
|||
|
it criminals who've become computer hackers?" Flanagan responded:
|
|||
|
|
|||
|
It's--it's a bit of both actually. You really have three
|
|||
|
categories. You have the--the sport hackers who used to
|
|||
|
fool around and show off. They would go into a government
|
|||
|
or a telephone company computer and pull out a sensitive
|
|||
|
file and then show it off as a trophy. They really didn't
|
|||
|
have too much malice in what they were doing other than the
|
|||
|
anarchic thing that you will find among a lot of
|
|||
|
late-teenage boys and--and it's mainly boys. But some of
|
|||
|
them have been co-opted into it by the Mafia, by organized
|
|||
|
crime. They give them money and drugs and they perform some
|
|||
|
stunts for them like come up with telephone numbers. Then,
|
|||
|
there are those who are larcenous to start with and--and who
|
|||
|
have developed the techniques or have hired others to do it.
|
|||
|
Then, the third category--and perhaps this is even the most
|
|||
|
dangerous. It's people who have an awful lot of computer
|
|||
|
knowledge and are suddenly out of work and are very angry
|
|||
|
and have the capability of creating all kinds of mayhem or
|
|||
|
stealing great deals of money.
|
|||
|
|
|||
|
Of course there are hackers who commit crimes, just as there are
|
|||
|
systems administrators who commit crimes. But, in putting
|
|||
|
together the beginnings of a data base on computer crime in
|
|||
|
recent years, I have yet to come across a pointer to a Mafia-related
|
|||
|
"hacker" case. The thinking reflected in Flanagan's commentary
|
|||
|
resembles that of someone who's read one too many National Inquirer
|
|||
|
articles or seen one too many Geraldo shows. It distorts the problem,
|
|||
|
distorts possible solutions, and offers no new information.
|
|||
|
When we distort the nature of the problem, we obstruct a solution.
|
|||
|
|
|||
|
Flanagan repeats the error of equating Robert T. Morris, of
|
|||
|
"the Internet work" fame with "hackers." The reporter notes that
|
|||
|
he was given probation, and asks, "What about now?"
|
|||
|
|
|||
|
Flanagan: He would be in jail and I guarantee you, his
|
|||
|
father's connections wouldn't have helped him in this day
|
|||
|
and age.
|
|||
|
|
|||
|
Montagne: His father was...
|
|||
|
|
|||
|
Flanagan: Was a high government official I think with the
|
|||
|
FTC. Throughout most of the '80s when these kids were
|
|||
|
caught, they would be given a rap on the knuckles and there
|
|||
|
was a widespread belief that all they had to do was to tell
|
|||
|
law enforcement or tell the telephone company how they did
|
|||
|
something and to give up that information or maybe give up
|
|||
|
the names of some of their friends, and they'd be let go.
|
|||
|
But that's not the case any more.
|
|||
|
|
|||
|
Now, it's a seemingly minor error to assume that Morris's father's
|
|||
|
connections helped him, a claim for which there's no evidence. It's
|
|||
|
also relatively minor that a detail such as linking Morris' father to
|
|||
|
the FTC was wrong (the senior Morris was a computer security expert
|
|||
|
who was the chief scientist at the NSA's National Computer Security
|
|||
|
Center). It's also a minor quibble that Flanagan thinks that three
|
|||
|
years probation, a $10,000 fine, 400 of community service and almost
|
|||
|
$150,000 in legal fees is a light punishment. But, in the aggregate,
|
|||
|
these errors indicate that Flanagan, speaking as an "expert" on the
|
|||
|
issues of hacking and computer crime, doesn't know his subject. His
|
|||
|
pronouncements have a high profile: If it's in Forbes *and* on NPR, it
|
|||
|
*must* be true. Yet, his factual errors and the style of crafting them
|
|||
|
into narrative demonic images cast fatal doubt on his credibility. One
|
|||
|
way to counter this kind of hyperbole and disinformation is to provide
|
|||
|
an antidote by challenging the veracity of the facts and the images.
|
|||
|
This, as Jerry's response indicates, bothers some people.
|
|||
|
|
|||
|
As I argued, I hope clearly, in the original Forbes commentary, the
|
|||
|
concern isn't with "hackers," but with law and justice. For over a
|
|||
|
decade, we have witnessed the curtailment of civil and other rights
|
|||
|
that were thought to be well-established. We have seen the
|
|||
|
criminalization of a variety of new behaviors and the imposition of
|
|||
|
harsher sentences on old ones. We have seen the abuses of a few law
|
|||
|
enforcement officials and others in pursuing their targets. We have
|
|||
|
seen creative use of seizure and forfeiture laws to take property and
|
|||
|
disrupt lives. We have seen a public, frustrated by crime, succumb to
|
|||
|
the hyperbole and rhetoric of politicians and media sensationalism.
|
|||
|
To oppose the Forbes piece and those who defend it is not to take
|
|||
|
issue with personalities or a given medium. Rather, it is a modest,
|
|||
|
perhaps chimerical attempt to joust with those repressive windmills
|
|||
|
that substitute emotionalism and ignorance in solving problems for the
|
|||
|
harder task of coming to grips with thier complexity and nuances.
|
|||
|
|
|||
|
So, no, Jerry, we did not read the same words, nor do we see the world
|
|||
|
in the same way. Which is fine. We learn through the dialogic
|
|||
|
competition of ideas. And, yes, I do recognize that the world is a far
|
|||
|
more nasty place than suits my liking. However, I also recognize that
|
|||
|
not all of the nastiness is caused by criminals.
|
|||
|
|
|||
|
To modify a line from Stephenson's Snow Crash, condensing fact from
|
|||
|
the vapor of nuance is fine, but replacing facts with vaporous nuances
|
|||
|
isn't.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 30 Jan 1993 15:12:11 EST
|
|||
|
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
|||
|
Subject: 3--Revised Computer Crime Sent
|
|||
|
|
|||
|
Revised Computer Crime Sentencing Guidelines
|
|||
|
|
|||
|
>From Jack King (gjk@well.sf.ca.us)
|
|||
|
|
|||
|
The U.S. Dept. of Justice has asked the U.S. Sentencing Commission to
|
|||
|
promulgate a new federal sentencing guideline, Sec. 2F2.1,
|
|||
|
specifically addressing the Computer Fraud and Abuse Act of 1988 (18
|
|||
|
USC 1030), with a base offense level of 6 and enhancements of 4 to 6
|
|||
|
levels for violations of specific provisions of the statute.
|
|||
|
|
|||
|
The new guideline practically guarantees some period of confinement,
|
|||
|
even for first offenders who plead guilty.
|
|||
|
|
|||
|
For example, the guideline would provide that if the defendant
|
|||
|
obtained %%protected'' information (defined as %%private information,
|
|||
|
non-public government information, or proprietary commercial
|
|||
|
information), the offense level would be increased by two; if the
|
|||
|
defendant disclosed protected information to any person, the offense
|
|||
|
level would be increased by four levels, and if the defendant
|
|||
|
distributed the information by means of %%a general distribution
|
|||
|
system,'' the offense level would go up six levels.
|
|||
|
|
|||
|
The proposed commentary explains that a %%general distribution
|
|||
|
system'' includes %%electronic bulletin board and voice mail systems,
|
|||
|
newsletters and other publications, and any other form of group
|
|||
|
dissemination, by any means.''
|
|||
|
|
|||
|
So, in effect, a person who obtains information from the computer of
|
|||
|
another, and gives that information to another gets a base offense
|
|||
|
level of 10; if he used a 'zine or BBS to disseminate it, he would get
|
|||
|
a base offense level of 12. The federal guidelines prescribe 6-12
|
|||
|
months in jail for a first offender with an offense level of 10, and
|
|||
|
10-16 months for same with an offense level of 12. Pleading guilty
|
|||
|
can get the base offense level down by two levels; probation would
|
|||
|
then be an option for the first offender with an offense level of 10
|
|||
|
(reduced to 8). But remember: there is no more federal parole. The
|
|||
|
time a defendant gets is the time s/he serves (minus a couple days a
|
|||
|
month "good time").
|
|||
|
|
|||
|
If, however, the offense caused an economic loss, the offense level
|
|||
|
would be increased according to the general fraud table (Sec. 2F1.1).
|
|||
|
The proposed commentary explains that computer offenses often cause
|
|||
|
intangible harms, such as individual privacy rights or by impairing
|
|||
|
computer operations, property values not readily translatable to the
|
|||
|
general fraud table. The proposed commentary also suggests that if the
|
|||
|
defendant has a prior conviction for %%similar misconduct that is not
|
|||
|
adequately reflected in the criminal history score, an upward
|
|||
|
departure may be warranted.'' An upward departure may also be
|
|||
|
warranted, DOJ suggests, if %%the defendant's conduct has affected or
|
|||
|
was likely to affect public service or confidence'' in %%public
|
|||
|
interests'' such as common carriers, utilities, and institutions.
|
|||
|
Based on the way U.S. Attorneys and their computer experts have
|
|||
|
guesstimated economic "losses" in a few prior cases, a convicted
|
|||
|
tamperer can get whacked with a couple of years in the slammer, a
|
|||
|
whopping fine, full "restitution" and one to two years of supervised
|
|||
|
release (which is like going to a parole officer). (Actually, it *is*
|
|||
|
going to a parole officer, because although there is no more federal
|
|||
|
parole, they didn't get rid of all those parole officers. They have
|
|||
|
them supervise convicts' return to society.)
|
|||
|
|
|||
|
This, and other proposed sentencing guidelines, can be found at 57 Fed
|
|||
|
Reg 62832-62857 (Dec. 31, 1992).
|
|||
|
|
|||
|
The U.S. Sentencing Commission wants to hear from YOU. Write: U.S.
|
|||
|
Sentencing Commission, One Columbus Circle, N.E., Suite 2-500,
|
|||
|
Washington DC 20002-8002, Attention: Public Information. Comments
|
|||
|
must be received by March 15, 1993.
|
|||
|
|
|||
|
* * *
|
|||
|
|
|||
|
Actual text of relevant amendments:
|
|||
|
|
|||
|
UNITED STATES SENTENCING COMMISSION
|
|||
|
AGENCY: United States Sentencing Commission.
|
|||
|
57 FR 62832
|
|||
|
|
|||
|
December 31, 1992
|
|||
|
|
|||
|
Sentencing Guidelines for United States Courts
|
|||
|
|
|||
|
ACTION: Notice of proposed amendments to sentencing guidelines,
|
|||
|
policy statements, and commentary. Request for public comment.
|
|||
|
Notice of hearing.
|
|||
|
|
|||
|
SUMMARY: The Commission is considering promulgating certain
|
|||
|
amendments to the sentencing guidelines, policy statements, and
|
|||
|
commentary. The proposed amendments and a synopsis of issues to be
|
|||
|
addressed are set forth below. The Commission may report amendments
|
|||
|
to the Congress on or before May 1, 1993. Comment is sought on all
|
|||
|
proposals, alternative proposals, and any other aspect of the
|
|||
|
sentencing guidelines, policy statements, and commentary.
|
|||
|
|
|||
|
DATES: The Commission has scheduled a public hearing on these
|
|||
|
proposed amendments for March 22, 1993, at 9:30 a.m. at the
|
|||
|
Ceremonial Courtroom, United States Courthouse, 3d and Constitution
|
|||
|
Avenue, NW., Washington, DC 20001.
|
|||
|
|
|||
|
Anyone wishing to testify at this public hearing should notify
|
|||
|
Michael Courlander, Public Information Specialist, at (202) 273-4590
|
|||
|
by March 1, 1993.
|
|||
|
|
|||
|
Public comment, as well as written testimony for the hearing,
|
|||
|
should be received by the Commission no later than March 15, 1993,
|
|||
|
in order to be considered by the Commission in the promulgation of
|
|||
|
amendments due to the Congress by May 1, 1993.
|
|||
|
|
|||
|
ADDRESSES: Public comment should be sent to: United States
|
|||
|
Sentencing Commission, One Columbus Circle, NE., suite 2-500, South
|
|||
|
Lobby, Washington, DC 20002-8002, Attention: Public Information.
|
|||
|
|
|||
|
FOR FURTHER INFORMATION CONTACT: Michael Courlander, Public
|
|||
|
Information Specialist, Telephone: (202) 273-4590.
|
|||
|
|
|||
|
* * *
|
|||
|
|
|||
|
59. Synopsis of Amendment: This amendment creates a new guideline
|
|||
|
applicable to violations of the Computer Fraud and Abuse Act of 1988
|
|||
|
(18 U.S.C. 1030). Violations of this statute are currently subject
|
|||
|
to the fraud guidelines at S. 2F1.1, which rely heavily on the
|
|||
|
dollar amount of loss caused to the victim. Computer offenses,
|
|||
|
however, commonly protect against harms that cannot be adequately
|
|||
|
quantified by examining dollar losses. Illegal access to consumer
|
|||
|
credit reports, for example, which may have little monetary value,
|
|||
|
nevertheless can represent a serious intrusion into privacy
|
|||
|
interests. Illegal intrusions in the computers which control
|
|||
|
telephone systems may disrupt normal telephone service and present
|
|||
|
hazards to emergency systems, neither of which are readily
|
|||
|
quantifiable. This amendment proposes a new Section 2F2.1, which
|
|||
|
provides sentencing guidelines particularly designed for this unique
|
|||
|
and rapidly developing area of the law.
|
|||
|
|
|||
|
Proposed Amendment: Part F is amended by inserting the following
|
|||
|
section, numbered S. 2F2.1, and captioned "Computer Fraud and
|
|||
|
Abuse," immediately following Section 2F1.2:
|
|||
|
|
|||
|
|
|||
|
"S. 2F2.1. Computer Fraud and Abuse
|
|||
|
|
|||
|
(a) Base Offense Level: 6
|
|||
|
|
|||
|
(b) Specific Offense Characteristics
|
|||
|
|
|||
|
(1) Reliability of data. If the defendant altered information,
|
|||
|
increase by 2 levels; if the defendant altered protected
|
|||
|
information, or public records filed or maintained under law or
|
|||
|
regulation, increase by 6 levels.
|
|||
|
|
|||
|
(2) Confidentiality of data. If the defendant obtained protected
|
|||
|
information, increase by 2 levels; if the defendant disclosed
|
|||
|
protected information to any person, increase by 4 levels; if the
|
|||
|
defendant disclosed protected information to the public by means of
|
|||
|
a general distribution system, increase by 6 levels.
|
|||
|
|
|||
|
Provided that the cumulative adjustments from (1) and (2), shall
|
|||
|
not exceed 8.
|
|||
|
|
|||
|
(3) If the offense caused or was likely to cause
|
|||
|
|
|||
|
(A) interference with the administration of justice (civil or
|
|||
|
criminal) or harm to any person's health or safety, or
|
|||
|
|
|||
|
(B) interference with any facility (public or private) or
|
|||
|
communications network that serves the public health or safety,
|
|||
|
increase by 6 levels.
|
|||
|
|
|||
|
(4) If the offense caused economic loss, increase the offense
|
|||
|
level according to the tables in S. 2F1.1 (Fraud and Deceit). In
|
|||
|
using those tables, include the following:
|
|||
|
|
|||
|
(A) Costs of system recovery, and
|
|||
|
|
|||
|
(B) Consequential losses from trafficking in passwords.
|
|||
|
|
|||
|
(5) If an offense was committed for the purpose of malicious
|
|||
|
destruction or damage, increase by 4 levels.
|
|||
|
|
|||
|
(c) Cross References
|
|||
|
|
|||
|
(1) If the offense is also covered by another offense guideline
|
|||
|
section, apply that offense guideline section if the resulting level
|
|||
|
is greater. Other guidelines that may cover the same conduct
|
|||
|
include, for example: for 18 U.S.C. 1030(a)(1), S. 2M3.2 (Gathering
|
|||
|
National Defense Information); for 18 U.S.C. 1030(a)(3), S. 2B1.1
|
|||
|
(Larceny, Embezzlement, and Other Forms of Theft), S. 2B1.2
|
|||
|
(Receiving, Transporting, Transferring, Transmitting, or Possessing
|
|||
|
Stolen
|
|||
|
|
|||
|
Property), and S. 2H3.1 (Interception of Communications or
|
|||
|
Eavesdropping); for 18 U.S.C. 1030(a)(4), S. 2F1.1 (Fraud and
|
|||
|
Deceit), and S. 2B1.1 (Larceny, Embezzlement, and Other Forms of
|
|||
|
Theft); for 18 U.S.C. S. 1030(a)(5), S. 2H2.1 (Obstructing an
|
|||
|
Election or Registration), S. 2J1.2 (Obstruction of Justice), and
|
|||
|
S. 2B3.2 (Extortion); and for 18 U.S.C. S. 1030(a)(6), S. 2F1.1
|
|||
|
(Fraud and Deceit) and S. 2B1.1 (Larceny, Embezzlement, and Other
|
|||
|
Forms of Theft).
|
|||
|
|
|||
|
|
|||
|
Commentary
|
|||
|
|
|||
|
Statutory Provisions: 18 U.S.C. 1030(a)(1)-(a)(6)
|
|||
|
|
|||
|
Application Notes:
|
|||
|
|
|||
|
1. This guideline is necessary because computer offenses often
|
|||
|
harm intangible values, such as privacy rights or the unimpaired
|
|||
|
operation of networks, more than the kinds of property values which
|
|||
|
the general fraud table measures. See S. 2F1.1, Note 10. If the
|
|||
|
defendant was previously convicted of similar misconduct that is not
|
|||
|
adequately reflected in the criminal history score, an upward
|
|||
|
departure may be warranted.
|
|||
|
|
|||
|
2. The harms expressed in paragraph (b)(1) pertain to the
|
|||
|
reliability and integrity of data; those in (b)(2) concern the
|
|||
|
confidentiality and privacy of data. Although some crimes will cause
|
|||
|
both harms, it is possible to cause either one alone. Clearly a
|
|||
|
defendant can obtain or distribute protected information without
|
|||
|
altering it. And by launching a virus, a defendant may alter or
|
|||
|
destroy data without ever obtaining it. For this reason, the harms
|
|||
|
are listed separately and are meant to be cumulative.
|
|||
|
|
|||
|
3. The terms "information," "records," and "data" are
|
|||
|
interchangeable.
|
|||
|
|
|||
|
4. The term "protected information" means private information,
|
|||
|
non-public government information, or proprietary commercial
|
|||
|
information.
|
|||
|
|
|||
|
5. The term "private information" means confidential information
|
|||
|
(including medical, financial, educational, employment, legal, and
|
|||
|
tax information) maintained under law, regulation, or other duty
|
|||
|
(whether held by public agencies or privately) regarding the history
|
|||
|
or status of any person, business, corporation, or other
|
|||
|
organization.
|
|||
|
|
|||
|
6. The term "non-public government information" means
|
|||
|
unclassified information which was maintained by any government
|
|||
|
agency, contractor or agent; which had not been released to the
|
|||
|
public; and which was related to military operations or readiness,
|
|||
|
foreign relations or intelligence, or law enforcement investigations
|
|||
|
or operations.
|
|||
|
|
|||
|
7. The term "proprietary commercial information" means non-public
|
|||
|
business information, including information which is sensitive,
|
|||
|
confidential, restricted, trade secret, or otherwise not meant for
|
|||
|
public distribution. If the proprietary information has an
|
|||
|
ascertainable value, apply paragraph (b) (4) to the economic loss
|
|||
|
rather than (b) (1) and (2), if the resulting offense level is
|
|||
|
greater.
|
|||
|
|
|||
|
8. Public records protected under paragraph (b) (1) must be filed
|
|||
|
or maintained under a law or regulation of the federal government, a
|
|||
|
state or territory, or any of their political subdivisions.
|
|||
|
|
|||
|
9. The term "altered" covers all changes to data, whether the
|
|||
|
defendant added, deleted, amended, or destroyed any or all of it.
|
|||
|
|
|||
|
10. A "general distribution system" includes electronic bulletin
|
|||
|
board and voice mail systems, newsletters and other publications,
|
|||
|
and any other form of group dissemination, by any means.
|
|||
|
|
|||
|
11. The term "malicious destruction or damage" includes injury to
|
|||
|
business and personal reputations.
|
|||
|
|
|||
|
12. Costs of system recovery: Include the costs accrued by the
|
|||
|
victim in identifying and tracking the defendant, ascertaining the
|
|||
|
damage, and restoring the system or data to its original condition.
|
|||
|
In computing these costs, include material and personnel costs, as
|
|||
|
well as losses incurred from interruptions of service. If several
|
|||
|
people obtained unauthorized access to any system during the same
|
|||
|
period, each defendant is responsible for the full amount of
|
|||
|
recovery or repair loss, minus any costs which are clearly
|
|||
|
attributable only to acts of other individuals.
|
|||
|
|
|||
|
13. Consequential losses from trafficking in passwords: A
|
|||
|
defendant who trafficked in passwords by using or maintaining a
|
|||
|
general distribution system is responsible for all economic losses
|
|||
|
that resulted from the use of the password after the date of his or
|
|||
|
her first general distribution, minus any specific amounts which are
|
|||
|
clearly attributable only to acts of other individuals. The term
|
|||
|
"passwords" includes any form of personalized access identification,
|
|||
|
such as user codes or names.
|
|||
|
|
|||
|
14. If the defendant's acts harmed public interests not
|
|||
|
adequately reflected in these guidelines, an upward departure may be
|
|||
|
warranted. Examples include interference with common carriers,
|
|||
|
utilities, and institutions (such as educational, governmental, or
|
|||
|
financial institutions), whenever the defendant's conduct has
|
|||
|
affected or was likely to affect public service or confidence".
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 22 Dec 92 15:31:52 EST
|
|||
|
From: Ken Citarella <70700.3504@COMPUSERVE.COM>
|
|||
|
Subject: 4--Balancing Computer Crime Statutes and Freedom
|
|||
|
|
|||
|
An Illustration of How Computer Crime Statutes Try To
|
|||
|
Balance Competing Interests of Security and Freedom
|
|||
|
-- and Come Up With Interesting Answers
|
|||
|
|
|||
|
copyright 1992, Kenneth C. Citarella
|
|||
|
(CompuServe; 70700,3504)
|
|||
|
|
|||
|
Computers deserve protection. If we did not all agree on that
|
|||
|
state legislatures and the Congress would not have passed computer
|
|||
|
crime statutes. Exactly how much protection to afford them, however,
|
|||
|
is the crux of the problem. Sometimes resolving that gets confused
|
|||
|
with a desire to avoid criminalizing inquisitive and youthful computer
|
|||
|
intruders.
|
|||
|
|
|||
|
The New York State computer crime statutes illustrate this
|
|||
|
confusion. The basic computer crime in New York is Unauthorized Use
|
|||
|
of a Computer, a misdemeanor. A person commits this crime when he
|
|||
|
uses, or causes to be used, a computer without authorization, and the
|
|||
|
computer is programmed to prevent unauthorized use. Thus, the
|
|||
|
unauthorized use of any computer in New York which does not have
|
|||
|
user-id/password security or some equivalent is arguably lawful under
|
|||
|
this statute. Moreover, under the definition of "uses a computer
|
|||
|
without authorization", the unauthorized user must be notified orally,
|
|||
|
in writing, or by the computer itself that unauthorized users are not
|
|||
|
welcome.
|
|||
|
|
|||
|
There are, therefore, two threshold protections that a system
|
|||
|
owner must install to have his computer come under the protection of
|
|||
|
the New York unauthorized use statute. First, there must be
|
|||
|
protective programming; second, there must a warning to the
|
|||
|
prospective intruder. These obligations do not seem excessive
|
|||
|
regarding misuse by an employee or other user with limited access to
|
|||
|
the computer in question. It is difficult to include with everyone's
|
|||
|
employment materials a written warning regarding unauthorized use of
|
|||
|
the computer, and it is certainly common enough to issue user-ids and
|
|||
|
passwords.
|
|||
|
|
|||
|
Consider, however, the remote unauthorized user. If a
|
|||
|
business has a computer with an unlisted modem number, has issued
|
|||
|
user-ids and passwords to its authorized users, has dial back modems,
|
|||
|
and has encrypted log-in procedures, its computer may still not be
|
|||
|
protected by the unauthorized use statute. Should an intruder locate
|
|||
|
the modem number by random demon dialling, guess at a password and
|
|||
|
encryption code, and enter the system to install and operate a pirate
|
|||
|
bulletin board, it may not be a criminal act. As long as the intruder
|
|||
|
does not access government records, medical records, or corporate
|
|||
|
secrets, alter any file or program, or download anything from the
|
|||
|
system, there may not be a crime. As long as the system did not
|
|||
|
display a warning that unauthorized users were not welcome, the crime
|
|||
|
of unauthorized use cannot occur. Thus, the legislature has elevated
|
|||
|
the display of a few words almost certain to deter no one to far
|
|||
|
greater legal importance than actual technical protective steps, all
|
|||
|
in the name of not criminalizing our inquisitive youths. Yet, if
|
|||
|
technical security procedures cannot convince them not to intrude upon
|
|||
|
a system, what importance can be attached to the displayed warning?
|
|||
|
Aren't unlisted phones, passwords, and other standard security
|
|||
|
procedures sufficient warning in and of themselves? Or, is form
|
|||
|
really more important than substance?
|
|||
|
|
|||
|
It is curious to note that the legislature seized upon notice
|
|||
|
as the prerequisite for computer crime law protection. It is a crime
|
|||
|
to enter and drive away with a car without permission, even if the car
|
|||
|
door is open, the key in the ignition, and the engine running. It is
|
|||
|
a crime to enter a premises without permission, even if the door is
|
|||
|
open, the lights on, and dinner on the table. In either scenario,
|
|||
|
notice is implicit in the intruder's knowledge that he does not belong
|
|||
|
there. The prosecutor must prove the absence of permission at trial,
|
|||
|
just as he rightly should in a computer crime case. But under current
|
|||
|
legislation, egregious computer intrusions must go unprosecuted if,
|
|||
|
despite extensive technical protection, three little words --
|
|||
|
"Authorized Users Only" -- do not appear to warn an intruder not to
|
|||
|
enter where he already knows he does not belong.
|
|||
|
|
|||
|
If computers are ever to become as integrated into our lives
|
|||
|
as cars and homes should they not be afforded the same protection
|
|||
|
under the criminal law?
|
|||
|
|
|||
|
((The author is a Deputy Bureau Chief of the Frauds Bureau in the
|
|||
|
District Attorney's Office, Westchester County, New York. The
|
|||
|
opinions expressed herein are purely personal and do not necessarily
|
|||
|
reflect the opinions or policies of the District Attorney's Office.))
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.09
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|