891 lines
46 KiB
Plaintext
891 lines
46 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Jan 31, 1993 Volume 5 : Issue 09
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Copy Editor: Etaion Shrdlu, Junoir
|
||
|
||
CONTENTS, #5.09 (Jan 31, 1993)
|
||
File 1--Media hype goes both ways (in re: Forbes article)
|
||
File 2--Forbes, NPR, and a Response to Jerry Leichter
|
||
File 3--Revised Computer Crime Sent
|
||
File 4--Balancing Computer Crime Statutes and Freedom
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
|
||
at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
|
||
466893; and using anonymous FTP on the Internet from ftp.eff.org
|
||
(192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
|
||
/cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
|
||
ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
||
Back issues also may be obtained from the mail server at
|
||
mailserv@batpad.lgb.ca.us.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Tue, 12 Jan 93 12:20:21 EDT
|
||
From: Jerry Leichter <leichter@LRW.COM>
|
||
Subject: 1--Media hype goes both ways (in re: Forbes article)
|
||
|
||
In Cu Digest, #4.66, Jim Thomas reviews article from the 21 December
|
||
1992 Forbes Magazine, and grants it CuD's 1992 MEDIA HYPE award. I
|
||
read the article before reading Thomas's comments, and was considering
|
||
posting a very different summary. Did we read the same words?
|
||
|
||
Let me briefly summarize what I got out of the article, and then go
|
||
over some of Thomas's points. The article claims that we are seeing a
|
||
new kind of computer miscreant. Let me call such people "crims", a
|
||
word I've just invented; according to the article, they identify
|
||
themselves as hackers (to the extent they identify themselves at all),
|
||
so the article also calls them hackers (sometimes, "hacker hoods"),
|
||
thus raising many irrelevant emotional issues.
|
||
|
||
Unlike old-style hackers, who were in it for what they could build; or
|
||
new-style hackers, who are nominally in it for what they can learn;
|
||
crims are in it for what they can steal. The article does NOT claim
|
||
that the same people who've been hackers have now turned to real
|
||
crime; rather, as I read it it claims that the crims have taken the
|
||
techniques developed by the hackers and gone on to different things.
|
||
Just look at the title of the article: "The Playground Bullies are
|
||
Learning how to Type". The crims are the people who a few years ago
|
||
might be burglars or jewel thieves; today, they are learning how to go
|
||
after money and other valuable commodities (like trade or military
|
||
secrets) in their new, electronic form.
|
||
|
||
Thomas's criticism begins with a long attack on Brigid McMenamin, one
|
||
of the reporters on the piece. He is upset that she keeps "bugging"
|
||
people for information. Reporters do that; it's not their most
|
||
endearing quality, but it's essential to their job, especially when
|
||
dealing with people who don't particularly want to talk to them. He
|
||
is upset that she kept asking about "illegal stuff" and "was oblivious
|
||
to facts or issues that did not bear upon hackers-as-criminals." Given
|
||
the article she was writing - exactly focusing on the crims - that's
|
||
exactly what I would have expected her to do. Just because Thomas is
|
||
interested in the non-criminal side of hacking doesn't mean McMenamin
|
||
is under any obligation to be. Thomas reports that in his own
|
||
conversations with McMenamin "Her questions suggested that she did not
|
||
understand the culture about which she was writing." Again, Thomas
|
||
presumes that she was writing about the people *Thomas* is interested
|
||
in.
|
||
|
||
In general, Thomas's criticisms of McMemanim reveal him to be so
|
||
personally involved with the "hacker culture" that he studies that
|
||
he's protective of it - and blind to the possibility that the world
|
||
may be bigger and nastier than he would like.
|
||
|
||
Thomas then summarizes "The Story". He criticizes it for not
|
||
presenting a "coherent and factual story about the types of computer
|
||
crime", but rather for making "hackers" the focal point and taking on
|
||
a narrative structure. Well, I didn't particularly see "hackers" as
|
||
the focal point, and considering the nature of the material being
|
||
covered - it's all recent, and the crims are hardly likely to be
|
||
interested in making themselves available to reporters - a narrative
|
||
structure is probably inevitable. Perhaps Thomas will write the
|
||
definitive study of the types of computer crime; I doubt any working
|
||
reporter will do so for a magazine.
|
||
|
||
Len Rose's story is told with a reasonable slant. None of us know ALL
|
||
the facts, but at least Rose is pictured as a relatively innocent
|
||
victim, chosen pretty much at random to bear the weight of actions
|
||
taken by many people. In fact, that's just what a prosecutor
|
||
interviewed in this piece of the story says: Because of the nature of
|
||
the crimes, such as they are, the people caught and punished are often
|
||
not the ones who actually did much of anything. He doesn't indicate
|
||
that he LIKES this - just the opposite. He reports on facts about the
|
||
real world.
|
||
|
||
Thomas then says that the article describes a salami-slicing attack,
|
||
alleged to have taken place at Citibank. He criticizes the article
|
||
for lack of evidence. He's right, but after all, this was a criminal
|
||
enterprise, and the criminals weren't caught. Just what evidence
|
||
would he expect? He then goes on with a comment that makes no sense
|
||
at all:
|
||
|
||
Has anybody calculated how many accounts one would have to "skim" a
|
||
few pennies from before obtaining $200,000? At a dime apiece, that's
|
||
over 2 million. If I'm figuring correctly, at one minute per account,
|
||
60 accounts per minute non-stop for 24 hours a day all year, it would
|
||
take nearly 4 straight years of on-line computer work for an
|
||
out-sider. According to the story, it took only 3 months. At 20
|
||
cents an account, that's over a million accounts.
|
||
|
||
Why would anyone even imagine that an attack of this nature would be
|
||
under-taken on an account-at-a-time basis? The only way it makes
|
||
sense is for the attack to have modified the software. If the
|
||
criminals had a way to directly siphon money out of an account, they
|
||
would have made one big killing and disappeared. Citibank has many
|
||
thousands of accounts with much more than $200,000 in them; it
|
||
probably has many thousands of accounts for which a $200,000
|
||
discrepancy wouldn't be noticed until the end of the quarter. A
|
||
salami-slice attack only makes sense when the attacker intends to
|
||
remain undetected, so that the attack continues to operate
|
||
indefinitely.
|
||
|
||
The romantic picture of the hacker sitting at his terminal, day in and
|
||
day out, moving a few pennies here and there, may have a lot of
|
||
appeal, but it's not reality.
|
||
|
||
The crux of the Thomas's critique is: "Contrary to billing, there was
|
||
no evidence in the story, other than questionable rumor, of %hacker'
|
||
connection to organized crime." But, again, that isn't the point of
|
||
the story, which to me seemed to do a fairly reasonable (though
|
||
imperfect) job of distinguishing between the innocents who "just want
|
||
to hack" and the new "crims". The article does, however, warn that
|
||
the crims will have no compunctions about using the hackers, whether
|
||
by just showing up at hacker conventions to learn the latest tricks -
|
||
like every group, hackers think they can identify the "true" group
|
||
members who believe in the group's ideals, when in fact it's always
|
||
been trivially easy for those who are willing to lie to sneak in - or
|
||
by hiring hackers, with money, drugs, or whatever.
|
||
|
||
I don't know to what degree the rumors of the spread of the crims are
|
||
true. It makes SENSE that they would be true, and in certain cases
|
||
(particularly cellular telephone fraud) we have strong evidence. It's
|
||
naive to think that the hacker community or the hacker ethic is
|
||
somehow immune to the influence of criminal minds.
|
||
|
||
There was an explicit warning from some prosecuter quoted in the
|
||
article. What he said was that people are upset by the crimes, and
|
||
government is responding harshly, often against the wrong targets. No
|
||
one would be so stupid as to walk into a bank carrying a toy gun and
|
||
try to get money from a teller, intending to leave it at the door,
|
||
"just to test security". Yet hackers seem to believe that they can do
|
||
the same thing with a bank's computers. If there were no such thing
|
||
as real bank robbers, the toy gun game would be just fine; in the real
|
||
world, that's an excellent way to get shot - or sent to prison for
|
||
many years. As the crims become more active - and even if the current
|
||
stories are all baseless, they inevitably will, and sooner rather than
|
||
later - any hackers who don't adjust to the new reality will find
|
||
themselves in big trouble. Many's the idealist who's been lead by the
|
||
nose to help the dishonest - and it's usually the idealist who gets
|
||
stuck with the bills.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 30 Jan 93 23:01:49 CST
|
||
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
||
Subject: 2--Forbes, NPR, and a Response to Jerry Leichter
|
||
|
||
Jerry Leichter asks of our mutual reading of Forbes' Magazine's "The
|
||
Hacker Hood" article (see CuD #4.66): "Did we read the same words?"
|
||
Although his question is presumably rhetorical, and although we
|
||
normally do not respond to articles (even if critical), Jerry's
|
||
question and commentary raises too many issues to let pass. The answer
|
||
to his rhetorical question is: No, we did not read the same words. Not
|
||
only did we not read the same words in the Forbes piece, I'm not
|
||
certain that Jerry read the Forbes article with particular care, and
|
||
it's certain he did not read our response to it (or our oft-repeated
|
||
position on "computer deviance" over the years) with care. This would
|
||
be of little consequence except that he makes several false assertions
|
||
about my own background and he embodies an attitude that perpetuates
|
||
the kinds of misunderstandings that lead to questionable laws, law
|
||
enforcement, and misunderstanding among the public. Although Jerry
|
||
obviously wrote in passion and in good faith, his commentary again
|
||
raises the issues that we found disturbing in the Forbes piece. We
|
||
thank him for his post and for the opportunity to again address these
|
||
issues.
|
||
|
||
Jerry's criticism's of the Forbes' commentary can be divided into
|
||
three parts: 1) His perception of my naivete; 2) His disagreement with
|
||
our evaluation and interpretation of the Forbes writers and the
|
||
substance of the article; and 3) A disagreement over the nature and
|
||
extend of "hacker crime."
|
||
|
||
1. JERRY'S CRITICISMS OF THOMAS
|
||
|
||
Jerry's criticisms of me include several of sufficient magnitude that
|
||
they require a response. First, he claims that I'm apparently blinded
|
||
to objectivity because of a commitment to hacking:
|
||
|
||
>In general, Thomas's criticisms of McMemanim (sic) reveal him to
|
||
be >so personally involved with the "hacker culture" that he
|
||
>studies that he's protective of it - and blind to the
|
||
>possibility that the world may be bigger and nastier than he
|
||
>would like.
|
||
|
||
Had he claimed that I'm so involved in civil rights that I sometimes
|
||
lose objectivity, I might agree with him. However, even a cursory
|
||
reading of my response indicates that the criticisms of one of the
|
||
Forbes writers, Brigid McMenamin would reveal that the objections had
|
||
nothing to do with hackers or rights, but with journalistic ethics and
|
||
responsibility. Those with whom I spoke who were contacted by Ms.
|
||
McMenamin all reached an independent consensus about her methods,
|
||
"homework," and ability to write a factual story. Jerry counters with
|
||
no facts that would dispute any of the interpretations, but instead
|
||
seems to defend what some judged as incompetence. Is it not possible,
|
||
in Jerry's worldview, to question a reporter's methods, especially
|
||
when those methods seem troublesome to others who are experienced in
|
||
dealing with the press?
|
||
|
||
It's also unclear how Jerry interprets anything written by CuD editors
|
||
as "protective" of "hacker culture." My Forbes commentary was quite
|
||
clear: The issue isn't whether one supports of opposes "hacker
|
||
culture." It's simply whether we believe that a medium such as Forbes
|
||
should be committed to minimal standards of accuracy or whether we are
|
||
willing to accept broad assertions and innuendo that contribute to the
|
||
hysteria that feeds bad legislation and questionable law enforcement
|
||
tactics such as those occuring during the "hacker crackdown."
|
||
|
||
I also assure Jerry that, as a criminologist who has lived in and also
|
||
studied the nastiest criminal cultures, I recognize that segments of
|
||
the world are indeed big and nasty. I also recognize that nastiness is
|
||
not limited to the criminal segment of society. In the scheme of
|
||
things, even the worst of computer crime is generally not among the
|
||
worst offenses that one can commit. He seems unaware that the current
|
||
U.S. prison population hoovers around 900,000, and that it's
|
||
increasing by almost ten percent a year. Much of this increase is due
|
||
to "get tough" attitudes on crime in which an increasing number of
|
||
behaviors are criminalized, sanctions for crimes are increased, and
|
||
sentences imposed (and time served) grows longer. Jerry fails to
|
||
understand that the issue isn't simply "hackers," but rather what
|
||
constitutes an acceptable social response to new social offenses.
|
||
|
||
Jerry also implies that to criticize increased criminalization and to
|
||
oppose demonization for relatively mild offenses is naively
|
||
idealistic. Although he fails to provide a rationale for this claim,
|
||
it presumably stems from a view that sees advocates of civil rights
|
||
siding with criminals rather than victims. This, of course, is a false
|
||
argument. There is little, if any, evidence that civil rights
|
||
advocates side with criminals. Rather, they side with the rule of law
|
||
that, under our Constitution, guarantees protections to all people.
|
||
The Forbes article creates an image that, in a time of strong
|
||
opposition to civil rights, promotes inappropriately strong laws and
|
||
weaker protections of rights. If adhering to the Enlightenment
|
||
principles and Constitutional values on which our judicial (and
|
||
social) system were founded makes me a naive idealist, then I'm guilty
|
||
as charged. I find this a far more civilized stance than the
|
||
alternative.
|
||
|
||
2. JERRY'S CRITICISMS OF MY INTERPRETATION OF THE FORBES PIECE
|
||
|
||
Jerry "didn't particularly see 'hackers' as the focal point of the
|
||
story." The title and the narrative of the piece seemed quite clear:
|
||
"The Hacker Hoods?" Nearly every paragraph alluded to vague hacker
|
||
criminality or to specific people identified as criminal "hackers."
|
||
No, I do not think we did read the same words. If I had any lingering
|
||
doubts about Jerry's lack of thoroughness in reading the Forbes piece,
|
||
they were eliminated when I read his criticism of my commentary on the
|
||
"salami attack." The Forbes piece adduced as an example of a "hacker
|
||
crime" an unsupported story about a computer intruder who lopped a
|
||
penny or two from various accounts. Jerry thinks it odd that one
|
||
would question the veracity of the story and suggests that, contrary
|
||
to what I said, a hacker could easily do this in a few seconds with a
|
||
"big killing." He apparently failed to note that the story indicated
|
||
this was done by skimming "off a penny or so from each account. Once he
|
||
((the hacker)) had $200,000, he quit" (p. 186). Again, it seems we
|
||
didn't read the same words. The point wasn't whether this could be
|
||
done, but that the story was provided as "fact" with no corroboration.
|
||
In fact, neither the banking victim (Citibank) nor a nationally
|
||
recognized computer crime expert (Donn Parker) had knowledge of the
|
||
deed. As written in Forbes, the method does raise some skepticism, as
|
||
Jerry concedes:
|
||
|
||
>The romantic picture of the hacker sitting at his terminal,
|
||
>day in and day out, moving a few pennies here and there, may
|
||
>have a lot of appeal, but it's not reality.
|
||
|
||
Here we agree. Had he read the Forbes piece accurately, he would
|
||
see that this was precisely my point. The picture Jerry disputes is
|
||
the one drawn in the Forbes piece. It appears that he agrees with me:
|
||
The Forbes picture is not reality.
|
||
|
||
The issue here isn't that Jerry didn't read either the Forbes piece or
|
||
the commentary carefully. Rather, it's that his comments show how
|
||
easily even an otherwise informed reader can uncritically gloss over
|
||
material that doesn't conform to a preferred view. It's not that I
|
||
disagree with Jerry (or the Forbes piece). Rather, the issue at
|
||
stake lies in a fundamental difference over how material is to
|
||
be presented. In highly volatile topics, sensationalistic portrayals
|
||
strike me as irresponsible and reinforce attitudes that lead to
|
||
unacceptable social responses. The Forbes piece and Jerry's
|
||
uncritical acceptance of it contribute to what in past times were
|
||
called witch hunts. Jerry seems to find it odd that one would object
|
||
to claims being made without evidence:
|
||
|
||
>He ((Thomas)) criticizes the article for lack of
|
||
>evidence. He ((Thomas))'s right, but after all, this
|
||
>was a criminal enterprise, and the criminals weren't
|
||
>caught. Just what evidence would he expect?
|
||
|
||
Crimes are detected in two ways. First, the criminal is apprehended in
|
||
the act. Second, a victim reports the crime. As a criminologist, I've
|
||
been taught that however one measures crime, it is generally done
|
||
either by some combination of crimes known to police or by
|
||
victimization surveys. In an article ostensibly describing crime, I
|
||
would assume that there would be at least minimal evidence for the
|
||
hard core crimes attributed to "hackers". It's obvious Jerry and I
|
||
did not read the same words. Didn't he read Managing Editor Lawrence
|
||
Minard's introduction?
|
||
|
||
>While working with Bill Flanagan on the multibillion-dollar
|
||
>telephone toll fraud phenomenon (Forbes, Aug. 3), Brigid
|
||
>McMenamin was intrigued to find that organized crime was
|
||
>hiring young computer hackers to do some of their electronic
|
||
>dirty work.
|
||
|
||
This is a claim. Other claims are made in the article. It's not
|
||
unreasonable to expect at least minimal evidence for the claims made.
|
||
The story was not based on facts but on innuendo. The Forbes piece
|
||
was criticized *not* because it was in opposition to a preferred view
|
||
of a particular social group, but because it took a stigmatized group
|
||
and further demonized it by making claims without recourse to specific
|
||
cases.
|
||
|
||
3. WHAT'S AT STAKE IN THIS DISCUSSION
|
||
|
||
As I stated explicitly in my original Forbes commentary, the issue is
|
||
not whether "hackers" are portrayed to one's liking. The point is how
|
||
one creates images of groups or behaviors that lead to social stigma
|
||
and criminal sanctions. I judged the Forbes piece to grossly err on
|
||
the side of falsely dramatizing a label that has been misused, abused,
|
||
and used to create what many judge as inappropriate or chaotic laws.
|
||
|
||
If the Forbes piece were limited to identifying new types of computer
|
||
crime without attempting to exaggerate the link between "hackers" and
|
||
organized crime, and if it had been more factual, it would not have
|
||
been objectionable. If it had focused on computer delinquents and the
|
||
problems they cause by identifying explicit instances of security
|
||
transgressions, telephone abuse, or other identifiable behaviors, it
|
||
would have been less objectionable. Had it made a clear distinction
|
||
between the culture of "hackers," whether the old-guard explorer or
|
||
the newer nuisance and computer criminals who do use a computer to
|
||
prey (but are not "hackers"), it would have been less objectionable.
|
||
The Forbes piece did none of this. Instead, it distorted both
|
||
"hacking" and computer crime. The authors did nothing to clarify a
|
||
complex problem and did much to obscure it. There is computer crime?
|
||
Old news. Some hackers commit computer crimes? Old news. What is new
|
||
in the piece is that it implies a logic in which a) anyone adept at a
|
||
computer is a hacker; b) Computer criminals (by definition) are adept
|
||
at computers; c) Computer criminals are hackers.
|
||
Conclusion: Look out for the hackers!
|
||
|
||
Consider: Substitute the term "computer professionals" or "sys ads"
|
||
for "hackers." "Sys ad bullies?" "Sys ads learn to type and commit
|
||
crimes?" Computer criminals, by definition, have computer skills, and
|
||
to conflate all computer crime with "hacking" makes as much sense as
|
||
conflating computer criminals with any other label that captures the
|
||
imagination of a public that can't distinguish between the reality and
|
||
the simulacrum. In the Forbes piece, the symbol, "hackers," becomes an
|
||
abstract demon. Forbes employed its resources, which are considerable,
|
||
to produce a misleading piece that subverts the efforts of those who
|
||
attempt to balance fair laws and their application to civil liberties.
|
||
I doubt that Forbes' readers, over one million of them, were able to
|
||
ascertain the complexities of this delicate balance from the article.
|
||
|
||
The visibility of the Forbes article also put one author, William
|
||
Flanagan, in the public eye on a National Public Radio "Morning
|
||
Edition" segment (21 December, '92). Flanagan essentially repeated his
|
||
points from the article. When asked by reporter Renee Montagne "But
|
||
are we talking about computer hackers who've become criminals, or is
|
||
it criminals who've become computer hackers?" Flanagan responded:
|
||
|
||
It's--it's a bit of both actually. You really have three
|
||
categories. You have the--the sport hackers who used to
|
||
fool around and show off. They would go into a government
|
||
or a telephone company computer and pull out a sensitive
|
||
file and then show it off as a trophy. They really didn't
|
||
have too much malice in what they were doing other than the
|
||
anarchic thing that you will find among a lot of
|
||
late-teenage boys and--and it's mainly boys. But some of
|
||
them have been co-opted into it by the Mafia, by organized
|
||
crime. They give them money and drugs and they perform some
|
||
stunts for them like come up with telephone numbers. Then,
|
||
there are those who are larcenous to start with and--and who
|
||
have developed the techniques or have hired others to do it.
|
||
Then, the third category--and perhaps this is even the most
|
||
dangerous. It's people who have an awful lot of computer
|
||
knowledge and are suddenly out of work and are very angry
|
||
and have the capability of creating all kinds of mayhem or
|
||
stealing great deals of money.
|
||
|
||
Of course there are hackers who commit crimes, just as there are
|
||
systems administrators who commit crimes. But, in putting
|
||
together the beginnings of a data base on computer crime in
|
||
recent years, I have yet to come across a pointer to a Mafia-related
|
||
"hacker" case. The thinking reflected in Flanagan's commentary
|
||
resembles that of someone who's read one too many National Inquirer
|
||
articles or seen one too many Geraldo shows. It distorts the problem,
|
||
distorts possible solutions, and offers no new information.
|
||
When we distort the nature of the problem, we obstruct a solution.
|
||
|
||
Flanagan repeats the error of equating Robert T. Morris, of
|
||
"the Internet work" fame with "hackers." The reporter notes that
|
||
he was given probation, and asks, "What about now?"
|
||
|
||
Flanagan: He would be in jail and I guarantee you, his
|
||
father's connections wouldn't have helped him in this day
|
||
and age.
|
||
|
||
Montagne: His father was...
|
||
|
||
Flanagan: Was a high government official I think with the
|
||
FTC. Throughout most of the '80s when these kids were
|
||
caught, they would be given a rap on the knuckles and there
|
||
was a widespread belief that all they had to do was to tell
|
||
law enforcement or tell the telephone company how they did
|
||
something and to give up that information or maybe give up
|
||
the names of some of their friends, and they'd be let go.
|
||
But that's not the case any more.
|
||
|
||
Now, it's a seemingly minor error to assume that Morris's father's
|
||
connections helped him, a claim for which there's no evidence. It's
|
||
also relatively minor that a detail such as linking Morris' father to
|
||
the FTC was wrong (the senior Morris was a computer security expert
|
||
who was the chief scientist at the NSA's National Computer Security
|
||
Center). It's also a minor quibble that Flanagan thinks that three
|
||
years probation, a $10,000 fine, 400 of community service and almost
|
||
$150,000 in legal fees is a light punishment. But, in the aggregate,
|
||
these errors indicate that Flanagan, speaking as an "expert" on the
|
||
issues of hacking and computer crime, doesn't know his subject. His
|
||
pronouncements have a high profile: If it's in Forbes *and* on NPR, it
|
||
*must* be true. Yet, his factual errors and the style of crafting them
|
||
into narrative demonic images cast fatal doubt on his credibility. One
|
||
way to counter this kind of hyperbole and disinformation is to provide
|
||
an antidote by challenging the veracity of the facts and the images.
|
||
This, as Jerry's response indicates, bothers some people.
|
||
|
||
As I argued, I hope clearly, in the original Forbes commentary, the
|
||
concern isn't with "hackers," but with law and justice. For over a
|
||
decade, we have witnessed the curtailment of civil and other rights
|
||
that were thought to be well-established. We have seen the
|
||
criminalization of a variety of new behaviors and the imposition of
|
||
harsher sentences on old ones. We have seen the abuses of a few law
|
||
enforcement officials and others in pursuing their targets. We have
|
||
seen creative use of seizure and forfeiture laws to take property and
|
||
disrupt lives. We have seen a public, frustrated by crime, succumb to
|
||
the hyperbole and rhetoric of politicians and media sensationalism.
|
||
To oppose the Forbes piece and those who defend it is not to take
|
||
issue with personalities or a given medium. Rather, it is a modest,
|
||
perhaps chimerical attempt to joust with those repressive windmills
|
||
that substitute emotionalism and ignorance in solving problems for the
|
||
harder task of coming to grips with thier complexity and nuances.
|
||
|
||
So, no, Jerry, we did not read the same words, nor do we see the world
|
||
in the same way. Which is fine. We learn through the dialogic
|
||
competition of ideas. And, yes, I do recognize that the world is a far
|
||
more nasty place than suits my liking. However, I also recognize that
|
||
not all of the nastiness is caused by criminals.
|
||
|
||
To modify a line from Stephenson's Snow Crash, condensing fact from
|
||
the vapor of nuance is fine, but replacing facts with vaporous nuances
|
||
isn't.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 30 Jan 1993 15:12:11 EST
|
||
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
||
Subject: 3--Revised Computer Crime Sent
|
||
|
||
Revised Computer Crime Sentencing Guidelines
|
||
|
||
>From Jack King (gjk@well.sf.ca.us)
|
||
|
||
The U.S. Dept. of Justice has asked the U.S. Sentencing Commission to
|
||
promulgate a new federal sentencing guideline, Sec. 2F2.1,
|
||
specifically addressing the Computer Fraud and Abuse Act of 1988 (18
|
||
USC 1030), with a base offense level of 6 and enhancements of 4 to 6
|
||
levels for violations of specific provisions of the statute.
|
||
|
||
The new guideline practically guarantees some period of confinement,
|
||
even for first offenders who plead guilty.
|
||
|
||
For example, the guideline would provide that if the defendant
|
||
obtained %%protected'' information (defined as %%private information,
|
||
non-public government information, or proprietary commercial
|
||
information), the offense level would be increased by two; if the
|
||
defendant disclosed protected information to any person, the offense
|
||
level would be increased by four levels, and if the defendant
|
||
distributed the information by means of %%a general distribution
|
||
system,'' the offense level would go up six levels.
|
||
|
||
The proposed commentary explains that a %%general distribution
|
||
system'' includes %%electronic bulletin board and voice mail systems,
|
||
newsletters and other publications, and any other form of group
|
||
dissemination, by any means.''
|
||
|
||
So, in effect, a person who obtains information from the computer of
|
||
another, and gives that information to another gets a base offense
|
||
level of 10; if he used a 'zine or BBS to disseminate it, he would get
|
||
a base offense level of 12. The federal guidelines prescribe 6-12
|
||
months in jail for a first offender with an offense level of 10, and
|
||
10-16 months for same with an offense level of 12. Pleading guilty
|
||
can get the base offense level down by two levels; probation would
|
||
then be an option for the first offender with an offense level of 10
|
||
(reduced to 8). But remember: there is no more federal parole. The
|
||
time a defendant gets is the time s/he serves (minus a couple days a
|
||
month "good time").
|
||
|
||
If, however, the offense caused an economic loss, the offense level
|
||
would be increased according to the general fraud table (Sec. 2F1.1).
|
||
The proposed commentary explains that computer offenses often cause
|
||
intangible harms, such as individual privacy rights or by impairing
|
||
computer operations, property values not readily translatable to the
|
||
general fraud table. The proposed commentary also suggests that if the
|
||
defendant has a prior conviction for %%similar misconduct that is not
|
||
adequately reflected in the criminal history score, an upward
|
||
departure may be warranted.'' An upward departure may also be
|
||
warranted, DOJ suggests, if %%the defendant's conduct has affected or
|
||
was likely to affect public service or confidence'' in %%public
|
||
interests'' such as common carriers, utilities, and institutions.
|
||
Based on the way U.S. Attorneys and their computer experts have
|
||
guesstimated economic "losses" in a few prior cases, a convicted
|
||
tamperer can get whacked with a couple of years in the slammer, a
|
||
whopping fine, full "restitution" and one to two years of supervised
|
||
release (which is like going to a parole officer). (Actually, it *is*
|
||
going to a parole officer, because although there is no more federal
|
||
parole, they didn't get rid of all those parole officers. They have
|
||
them supervise convicts' return to society.)
|
||
|
||
This, and other proposed sentencing guidelines, can be found at 57 Fed
|
||
Reg 62832-62857 (Dec. 31, 1992).
|
||
|
||
The U.S. Sentencing Commission wants to hear from YOU. Write: U.S.
|
||
Sentencing Commission, One Columbus Circle, N.E., Suite 2-500,
|
||
Washington DC 20002-8002, Attention: Public Information. Comments
|
||
must be received by March 15, 1993.
|
||
|
||
* * *
|
||
|
||
Actual text of relevant amendments:
|
||
|
||
UNITED STATES SENTENCING COMMISSION
|
||
AGENCY: United States Sentencing Commission.
|
||
57 FR 62832
|
||
|
||
December 31, 1992
|
||
|
||
Sentencing Guidelines for United States Courts
|
||
|
||
ACTION: Notice of proposed amendments to sentencing guidelines,
|
||
policy statements, and commentary. Request for public comment.
|
||
Notice of hearing.
|
||
|
||
SUMMARY: The Commission is considering promulgating certain
|
||
amendments to the sentencing guidelines, policy statements, and
|
||
commentary. The proposed amendments and a synopsis of issues to be
|
||
addressed are set forth below. The Commission may report amendments
|
||
to the Congress on or before May 1, 1993. Comment is sought on all
|
||
proposals, alternative proposals, and any other aspect of the
|
||
sentencing guidelines, policy statements, and commentary.
|
||
|
||
DATES: The Commission has scheduled a public hearing on these
|
||
proposed amendments for March 22, 1993, at 9:30 a.m. at the
|
||
Ceremonial Courtroom, United States Courthouse, 3d and Constitution
|
||
Avenue, NW., Washington, DC 20001.
|
||
|
||
Anyone wishing to testify at this public hearing should notify
|
||
Michael Courlander, Public Information Specialist, at (202) 273-4590
|
||
by March 1, 1993.
|
||
|
||
Public comment, as well as written testimony for the hearing,
|
||
should be received by the Commission no later than March 15, 1993,
|
||
in order to be considered by the Commission in the promulgation of
|
||
amendments due to the Congress by May 1, 1993.
|
||
|
||
ADDRESSES: Public comment should be sent to: United States
|
||
Sentencing Commission, One Columbus Circle, NE., suite 2-500, South
|
||
Lobby, Washington, DC 20002-8002, Attention: Public Information.
|
||
|
||
FOR FURTHER INFORMATION CONTACT: Michael Courlander, Public
|
||
Information Specialist, Telephone: (202) 273-4590.
|
||
|
||
* * *
|
||
|
||
59. Synopsis of Amendment: This amendment creates a new guideline
|
||
applicable to violations of the Computer Fraud and Abuse Act of 1988
|
||
(18 U.S.C. 1030). Violations of this statute are currently subject
|
||
to the fraud guidelines at S. 2F1.1, which rely heavily on the
|
||
dollar amount of loss caused to the victim. Computer offenses,
|
||
however, commonly protect against harms that cannot be adequately
|
||
quantified by examining dollar losses. Illegal access to consumer
|
||
credit reports, for example, which may have little monetary value,
|
||
nevertheless can represent a serious intrusion into privacy
|
||
interests. Illegal intrusions in the computers which control
|
||
telephone systems may disrupt normal telephone service and present
|
||
hazards to emergency systems, neither of which are readily
|
||
quantifiable. This amendment proposes a new Section 2F2.1, which
|
||
provides sentencing guidelines particularly designed for this unique
|
||
and rapidly developing area of the law.
|
||
|
||
Proposed Amendment: Part F is amended by inserting the following
|
||
section, numbered S. 2F2.1, and captioned "Computer Fraud and
|
||
Abuse," immediately following Section 2F1.2:
|
||
|
||
|
||
"S. 2F2.1. Computer Fraud and Abuse
|
||
|
||
(a) Base Offense Level: 6
|
||
|
||
(b) Specific Offense Characteristics
|
||
|
||
(1) Reliability of data. If the defendant altered information,
|
||
increase by 2 levels; if the defendant altered protected
|
||
information, or public records filed or maintained under law or
|
||
regulation, increase by 6 levels.
|
||
|
||
(2) Confidentiality of data. If the defendant obtained protected
|
||
information, increase by 2 levels; if the defendant disclosed
|
||
protected information to any person, increase by 4 levels; if the
|
||
defendant disclosed protected information to the public by means of
|
||
a general distribution system, increase by 6 levels.
|
||
|
||
Provided that the cumulative adjustments from (1) and (2), shall
|
||
not exceed 8.
|
||
|
||
(3) If the offense caused or was likely to cause
|
||
|
||
(A) interference with the administration of justice (civil or
|
||
criminal) or harm to any person's health or safety, or
|
||
|
||
(B) interference with any facility (public or private) or
|
||
communications network that serves the public health or safety,
|
||
increase by 6 levels.
|
||
|
||
(4) If the offense caused economic loss, increase the offense
|
||
level according to the tables in S. 2F1.1 (Fraud and Deceit). In
|
||
using those tables, include the following:
|
||
|
||
(A) Costs of system recovery, and
|
||
|
||
(B) Consequential losses from trafficking in passwords.
|
||
|
||
(5) If an offense was committed for the purpose of malicious
|
||
destruction or damage, increase by 4 levels.
|
||
|
||
(c) Cross References
|
||
|
||
(1) If the offense is also covered by another offense guideline
|
||
section, apply that offense guideline section if the resulting level
|
||
is greater. Other guidelines that may cover the same conduct
|
||
include, for example: for 18 U.S.C. 1030(a)(1), S. 2M3.2 (Gathering
|
||
National Defense Information); for 18 U.S.C. 1030(a)(3), S. 2B1.1
|
||
(Larceny, Embezzlement, and Other Forms of Theft), S. 2B1.2
|
||
(Receiving, Transporting, Transferring, Transmitting, or Possessing
|
||
Stolen
|
||
|
||
Property), and S. 2H3.1 (Interception of Communications or
|
||
Eavesdropping); for 18 U.S.C. 1030(a)(4), S. 2F1.1 (Fraud and
|
||
Deceit), and S. 2B1.1 (Larceny, Embezzlement, and Other Forms of
|
||
Theft); for 18 U.S.C. S. 1030(a)(5), S. 2H2.1 (Obstructing an
|
||
Election or Registration), S. 2J1.2 (Obstruction of Justice), and
|
||
S. 2B3.2 (Extortion); and for 18 U.S.C. S. 1030(a)(6), S. 2F1.1
|
||
(Fraud and Deceit) and S. 2B1.1 (Larceny, Embezzlement, and Other
|
||
Forms of Theft).
|
||
|
||
|
||
Commentary
|
||
|
||
Statutory Provisions: 18 U.S.C. 1030(a)(1)-(a)(6)
|
||
|
||
Application Notes:
|
||
|
||
1. This guideline is necessary because computer offenses often
|
||
harm intangible values, such as privacy rights or the unimpaired
|
||
operation of networks, more than the kinds of property values which
|
||
the general fraud table measures. See S. 2F1.1, Note 10. If the
|
||
defendant was previously convicted of similar misconduct that is not
|
||
adequately reflected in the criminal history score, an upward
|
||
departure may be warranted.
|
||
|
||
2. The harms expressed in paragraph (b)(1) pertain to the
|
||
reliability and integrity of data; those in (b)(2) concern the
|
||
confidentiality and privacy of data. Although some crimes will cause
|
||
both harms, it is possible to cause either one alone. Clearly a
|
||
defendant can obtain or distribute protected information without
|
||
altering it. And by launching a virus, a defendant may alter or
|
||
destroy data without ever obtaining it. For this reason, the harms
|
||
are listed separately and are meant to be cumulative.
|
||
|
||
3. The terms "information," "records," and "data" are
|
||
interchangeable.
|
||
|
||
4. The term "protected information" means private information,
|
||
non-public government information, or proprietary commercial
|
||
information.
|
||
|
||
5. The term "private information" means confidential information
|
||
(including medical, financial, educational, employment, legal, and
|
||
tax information) maintained under law, regulation, or other duty
|
||
(whether held by public agencies or privately) regarding the history
|
||
or status of any person, business, corporation, or other
|
||
organization.
|
||
|
||
6. The term "non-public government information" means
|
||
unclassified information which was maintained by any government
|
||
agency, contractor or agent; which had not been released to the
|
||
public; and which was related to military operations or readiness,
|
||
foreign relations or intelligence, or law enforcement investigations
|
||
or operations.
|
||
|
||
7. The term "proprietary commercial information" means non-public
|
||
business information, including information which is sensitive,
|
||
confidential, restricted, trade secret, or otherwise not meant for
|
||
public distribution. If the proprietary information has an
|
||
ascertainable value, apply paragraph (b) (4) to the economic loss
|
||
rather than (b) (1) and (2), if the resulting offense level is
|
||
greater.
|
||
|
||
8. Public records protected under paragraph (b) (1) must be filed
|
||
or maintained under a law or regulation of the federal government, a
|
||
state or territory, or any of their political subdivisions.
|
||
|
||
9. The term "altered" covers all changes to data, whether the
|
||
defendant added, deleted, amended, or destroyed any or all of it.
|
||
|
||
10. A "general distribution system" includes electronic bulletin
|
||
board and voice mail systems, newsletters and other publications,
|
||
and any other form of group dissemination, by any means.
|
||
|
||
11. The term "malicious destruction or damage" includes injury to
|
||
business and personal reputations.
|
||
|
||
12. Costs of system recovery: Include the costs accrued by the
|
||
victim in identifying and tracking the defendant, ascertaining the
|
||
damage, and restoring the system or data to its original condition.
|
||
In computing these costs, include material and personnel costs, as
|
||
well as losses incurred from interruptions of service. If several
|
||
people obtained unauthorized access to any system during the same
|
||
period, each defendant is responsible for the full amount of
|
||
recovery or repair loss, minus any costs which are clearly
|
||
attributable only to acts of other individuals.
|
||
|
||
13. Consequential losses from trafficking in passwords: A
|
||
defendant who trafficked in passwords by using or maintaining a
|
||
general distribution system is responsible for all economic losses
|
||
that resulted from the use of the password after the date of his or
|
||
her first general distribution, minus any specific amounts which are
|
||
clearly attributable only to acts of other individuals. The term
|
||
"passwords" includes any form of personalized access identification,
|
||
such as user codes or names.
|
||
|
||
14. If the defendant's acts harmed public interests not
|
||
adequately reflected in these guidelines, an upward departure may be
|
||
warranted. Examples include interference with common carriers,
|
||
utilities, and institutions (such as educational, governmental, or
|
||
financial institutions), whenever the defendant's conduct has
|
||
affected or was likely to affect public service or confidence".
|
||
|
||
------------------------------
|
||
|
||
Date: 22 Dec 92 15:31:52 EST
|
||
From: Ken Citarella <70700.3504@COMPUSERVE.COM>
|
||
Subject: 4--Balancing Computer Crime Statutes and Freedom
|
||
|
||
An Illustration of How Computer Crime Statutes Try To
|
||
Balance Competing Interests of Security and Freedom
|
||
-- and Come Up With Interesting Answers
|
||
|
||
copyright 1992, Kenneth C. Citarella
|
||
(CompuServe; 70700,3504)
|
||
|
||
Computers deserve protection. If we did not all agree on that
|
||
state legislatures and the Congress would not have passed computer
|
||
crime statutes. Exactly how much protection to afford them, however,
|
||
is the crux of the problem. Sometimes resolving that gets confused
|
||
with a desire to avoid criminalizing inquisitive and youthful computer
|
||
intruders.
|
||
|
||
The New York State computer crime statutes illustrate this
|
||
confusion. The basic computer crime in New York is Unauthorized Use
|
||
of a Computer, a misdemeanor. A person commits this crime when he
|
||
uses, or causes to be used, a computer without authorization, and the
|
||
computer is programmed to prevent unauthorized use. Thus, the
|
||
unauthorized use of any computer in New York which does not have
|
||
user-id/password security or some equivalent is arguably lawful under
|
||
this statute. Moreover, under the definition of "uses a computer
|
||
without authorization", the unauthorized user must be notified orally,
|
||
in writing, or by the computer itself that unauthorized users are not
|
||
welcome.
|
||
|
||
There are, therefore, two threshold protections that a system
|
||
owner must install to have his computer come under the protection of
|
||
the New York unauthorized use statute. First, there must be
|
||
protective programming; second, there must a warning to the
|
||
prospective intruder. These obligations do not seem excessive
|
||
regarding misuse by an employee or other user with limited access to
|
||
the computer in question. It is difficult to include with everyone's
|
||
employment materials a written warning regarding unauthorized use of
|
||
the computer, and it is certainly common enough to issue user-ids and
|
||
passwords.
|
||
|
||
Consider, however, the remote unauthorized user. If a
|
||
business has a computer with an unlisted modem number, has issued
|
||
user-ids and passwords to its authorized users, has dial back modems,
|
||
and has encrypted log-in procedures, its computer may still not be
|
||
protected by the unauthorized use statute. Should an intruder locate
|
||
the modem number by random demon dialling, guess at a password and
|
||
encryption code, and enter the system to install and operate a pirate
|
||
bulletin board, it may not be a criminal act. As long as the intruder
|
||
does not access government records, medical records, or corporate
|
||
secrets, alter any file or program, or download anything from the
|
||
system, there may not be a crime. As long as the system did not
|
||
display a warning that unauthorized users were not welcome, the crime
|
||
of unauthorized use cannot occur. Thus, the legislature has elevated
|
||
the display of a few words almost certain to deter no one to far
|
||
greater legal importance than actual technical protective steps, all
|
||
in the name of not criminalizing our inquisitive youths. Yet, if
|
||
technical security procedures cannot convince them not to intrude upon
|
||
a system, what importance can be attached to the displayed warning?
|
||
Aren't unlisted phones, passwords, and other standard security
|
||
procedures sufficient warning in and of themselves? Or, is form
|
||
really more important than substance?
|
||
|
||
It is curious to note that the legislature seized upon notice
|
||
as the prerequisite for computer crime law protection. It is a crime
|
||
to enter and drive away with a car without permission, even if the car
|
||
door is open, the key in the ignition, and the engine running. It is
|
||
a crime to enter a premises without permission, even if the door is
|
||
open, the lights on, and dinner on the table. In either scenario,
|
||
notice is implicit in the intruder's knowledge that he does not belong
|
||
there. The prosecutor must prove the absence of permission at trial,
|
||
just as he rightly should in a computer crime case. But under current
|
||
legislation, egregious computer intrusions must go unprosecuted if,
|
||
despite extensive technical protection, three little words --
|
||
"Authorized Users Only" -- do not appear to warn an intruder not to
|
||
enter where he already knows he does not belong.
|
||
|
||
If computers are ever to become as integrated into our lives
|
||
as cars and homes should they not be afforded the same protection
|
||
under the criminal law?
|
||
|
||
((The author is a Deputy Bureau Chief of the Frauds Bureau in the
|
||
District Attorney's Office, Westchester County, New York. The
|
||
opinions expressed herein are purely personal and do not necessarily
|
||
reflect the opinions or policies of the District Attorney's Office.))
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.09
|
||
************************************
|
||
|
||
|
||
|