839 lines
43 KiB
Plaintext
839 lines
43 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun July 4 1993 Volume 5 : Issue 49
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Editor: Etaoin Shrdlu, Seniur
|
||
|
||
CONTENTS, #5.49 (July 4 1993)
|
||
File 1--*GEnie* Roundtable transcript of VIRUS/SECURITY
|
||
File 2--CPSR Workplace Privacy Test
|
||
File 3--JOB OPENING AT EFF
|
||
File 4--CuDs on BBSes: "Other Side of Infinity"
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 11 Jun 93 21:01:22 EDT
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 1--*GEnie* Roundtable transcript of VIRUS/SECURITY
|
||
|
||
The following is a transcript from the VIRUS/SECURITY RoundTable on
|
||
GEnie. Note that "ga" in the text stands for "go ahead" and signals
|
||
that the current speaker has finished their thought. This transcript
|
||
is reprinted with permission.
|
||
|
||
Real Time Conference in the Virus/Security RoundTable on GEnie with
|
||
Ken Citarella, Assistant District Attorney, Deputy Bureau Chief of the
|
||
Frauds Bureau for Westchester County, New York. Sysop: Ross
|
||
Greenberg. Assistant sysops: Mitch Wagner and Sarah Collier. June 2,
|
||
1993, 9:00 PM EDT.
|
||
|
||
-----# Participants #-----
|
||
|
||
<[ken] GUEST-3>
|
||
<[ross] GREENBER>
|
||
<SARAH>
|
||
<[Mitch] MITCHWAGNER>
|
||
<[AmigaNut] JABBA>
|
||
<[Cy TROic] F.GLYNN>
|
||
<MIKE.C>
|
||
<[Chuck] C.LEPAGE>
|
||
<[Dennis] D.MCCAULEY1>
|
||
<[Ron] R.RITCH>
|
||
<[Joe] J.HOLLIDAY6>
|
||
<[Dennis] D.MCCAULEY1>
|
||
<R.GREENBERG5>
|
||
<N C.HORNER1>
|
||
<[Janet] J.ATTARD>
|
||
|
||
-----# Room 1 #-----
|
||
|
||
<SARAH> Welcome, Ken! We're glad to have you here. ga
|
||
<[Mitch] MITCHWAGNER> Hi, Ken. Could you give a brief rundown of your
|
||
experience? ga
|
||
<[ken] GUEST-3> OK. Hi everyone. Let me introduce myself. I am an
|
||
Asst DA in Westchester County, NY (just north of NYC).
|
||
I do fraud cases, with a speciality in tech crimes.
|
||
Whatever you would like to talk about is ok with me.
|
||
I have been a prosecutor for 12 years, and helped
|
||
write the NY computer crime laws.
|
||
<SARAH> What kinds of tech crimes, Ken? ga
|
||
<[ken] GUEST-3> I do telephone fraud and computer crimes, ranging
|
||
from intrusions to theft of developmental software.
|
||
ga
|
||
<SARAH> Theft of developmental software? ga
|
||
<[ken] GUEST-3> Yes, I have had two investigations in which it was
|
||
alleged that person A stole software developed by
|
||
person B. B claimed it was worth zillions. ga
|
||
<[AmigaNut] JABBA> Ken, any comments/opinion on the controversial
|
||
"Clipper Chip" proposal?
|
||
<[ken] GUEST-3> Well, we are a bit out of my league, but I share many
|
||
of the concerns that have appeared in the media: why
|
||
the secret development? why no public debate over
|
||
adoption, etc. ga
|
||
<[AmigaNut] JABBA> How about your view of the necessity of such a thing
|
||
for law enforcement?
|
||
<[ken] GUEST-3> If I may be so bold, I think what you and others are
|
||
really asking is if the need to tap any and all
|
||
communications is a necessary skill for LE. That is a
|
||
societal balancing act. What LE can do helps it fight
|
||
crime. It also raises the spectre of abuse. And that
|
||
can be scary. ga
|
||
<[ross] GREENBER> LE = Law Enforcement
|
||
<SARAH> More on Jabba's question, how often would you say you
|
||
might have need of a phone tap on a scrambled phone?
|
||
ga
|
||
<[ken] GUEST-3> Not to be flippant, but whenever the bad guys use a
|
||
scrambled phone. Actually, there are relatively few
|
||
crimes for which taps are allowed, and the number
|
||
varies state by state. There is no hard data yet on
|
||
how often bad guys use scrambled phones. The real
|
||
threat is from their use of cellular clones which
|
||
makes tapping them as impossible as a scrambled phone
|
||
does. ga
|
||
<SARAH> Well, say, in your career, how many times have you had
|
||
to do it? ga
|
||
<[ken] GUEST-3> Never. ga
|
||
<[Chuck] C.LEPAGE> Ken, have you ever handled any cases of
|
||
harassment/obscene messaging on public BBs, or through
|
||
e-mail? Do you ever have to deal with "stalker" cases?
|
||
ga
|
||
<[ken] GUEST-3> I have recently had a case like that brought to my
|
||
attention. Frankly, it is not a fact pattern that I am
|
||
inclined to do much with. I view it more as a matter
|
||
internal to the bbs. I am more interested if the perp
|
||
used a stolen credit card to get the bbs account. Now
|
||
that's a real crime. ga
|
||
<SARAH> Follow-up, Chuck?
|
||
<[Cy TROic] F.GLYNN> Ken, what kind d of "intrusion" cases have you done?
|
||
ga
|
||
<[ken] GUEST-3> The most notable one is the outgrowth of the infamous
|
||
(grin) Pumpcon police action. I cannot go into too
|
||
much detail because charges are still pending.
|
||
But, I have one person under indictment for breaking
|
||
into a business computer and installing three user-ids
|
||
into the PASSWD file. Two were superusers. He is
|
||
charged with felony computer tampering and forgery.
|
||
ga
|
||
<[ross] GREENBER> Why only TWO superuser ids?
|
||
<SARAH> (You might oughta define superuser.)
|
||
<[ken] GUEST-3> One was set up as a regular id. ***(Prefer omission of
|
||
rest of this answer; or if you must proceed as edited)***Want to know why? Ask
|
||
the <intruder>. ga
|
||
<[ross] GREENBER> (A superuser can do anything they like to a system,
|
||
without exception.)
|
||
<[ken] GUEST-3> Superuser means the computer thought he was god. ga
|
||
<SARAH> This is the case I know as the Marriott Hotel Bust,
|
||
right? Thanks, Ross. ga
|
||
<[ken] GUEST-3> Right. ga
|
||
<SARAH> What about theft of phone service? Is it just mostly
|
||
kids cutting corners? ga
|
||
<[ken] GUEST-3> That's how it starts. Unfortunately, it is a
|
||
multi-billion dollar business that has caused at least
|
||
one street murder in NYC in a battle over control of
|
||
phone booths. ga
|
||
<SARAH> A murder?! ga
|
||
<[ken] GUEST-3> Yeah, the dead man tried to run his own call sell
|
||
operation. That means he used stolen access codes and
|
||
sold calls to people in the street. Ten bucks for 20
|
||
minutes, anywhere in the world. His competitor wanted
|
||
to control all the illegal street phone use in the
|
||
neighborhood. It seems they could not reach an
|
||
amicable settlement. ga
|
||
<SARAH> This is a pretty big business? ga
|
||
<[ken] GUEST-3> Estimates run from 1 to 6 billion dollars annually in
|
||
lost revenue. ga
|
||
<SARAH> Ouch! The Mafia? ga
|
||
<[ken] GUEST-3> If you mean the good ole La Cosa Nostra, I do not
|
||
know. If you mean organized crime: Yes! ga
|
||
|
||
|
||
***(Prefer omission of next q&a or use edited version)***
|
||
|
||
|
||
<[Chuck] C.LEPAGE> My gosh! How do you become a "super-user"? (Especially
|
||
here on GEnie.) <g> How could you ever convince a
|
||
system to let you do ANYTHING you wanted, as if you
|
||
were the sysop? ga
|
||
<[ken] GUEST-3> The <intruder> accessed the PASSWD file in an edit
|
||
mode, and simply typed in the superuser ids. ga
|
||
*****
|
||
|
||
<[ross] GREENBER> Follow-up, Chuck?
|
||
<[Chuck] C.LEPAGE> Thanks. Is the average BB that easy to break
|
||
into/tamper with?
|
||
<[ken] GUEST-3> This was not a bbs, but the business computer of a
|
||
retail store chain. It was very easy to break in to.
|
||
They had not removed any default passwords from the
|
||
initial login sequences. ga
|
||
<[ross] GREENBER> Another, Chuck?
|
||
<SARAH> Good grief!
|
||
<[ross] GREENBER> Cy's up now. Go ahead, Cy
|
||
<[Cy TROic] F.GLYNN> Ken, have you run into any cases involving Storm
|
||
Shadow (Morty Rosenfield) or Phiber Obtik (Mark
|
||
Abene). If so, what are your view of the cases? ga
|
||
<[ken] GUEST-3> I have heard of these gentlemen, and met Phiber once.
|
||
But no allegations against them have been made to me.
|
||
ga
|
||
<[ross] GREENBER> Follow up, Cy?
|
||
<[Cy TROic] F.GLYNN> As a follow up to your last comment, Ken... What is
|
||
your view about systems not getting rid of their
|
||
defaults or lowering their security. Shouldn't they be
|
||
held responsible for the "attacks" against them? ga
|
||
<[ken] GUEST-3> NO! The law permits people to be sloppy, lazy, even
|
||
stupid. None of that excuses an unauthorized break-in.
|
||
You can leave your car with the door open,
|
||
the key in the ignition, and the motor running, and no
|
||
one can use it w/o your permission. Why should a
|
||
computer be different?. ga
|
||
<[ross] GREENBER> Another, Cy?
|
||
<[Cy TROic] F.GLYNN> But, if you park your car in a bad section of the
|
||
city, and even w/out "THECLUB" in better parts, you
|
||
are asking for trouble. GA
|
||
<[ken] GUEST-3> I am not saying that sloppy security is bright, and it
|
||
is certainly true that LE looks askance at undue
|
||
stupidity, but those are practical questions .. of how
|
||
you treat a case, and separate from the question of
|
||
whether the intrusion was ok under the law. ga
|
||
<[ross] GREENBER> Done, Cy?
|
||
<[Cy TROic] F.GLYNN> Yes. Thanks. :) GA!
|
||
<[ross] GREENBER> Dennis, You're on! LE-to-LE!
|
||
<[Dennis] D.MCCAULEY1> Ken, what's your assessment of the hacker threat these
|
||
days? Is it mischief or is it a true concern to
|
||
society? ga
|
||
<[ken] GUEST-3> Sounding like a true lawyer, it is both! (g) Most
|
||
teenage hacking is mischief, just like most other
|
||
teenage misconduct. However, I know teenagers who
|
||
are in the racket of stealing credit profiles from
|
||
TRW-type companies and selling them to organized crime
|
||
for illicit use. ga
|
||
<[ross] GREENBER> Another, Dennis?
|
||
<[Dennis] D.MCCAULEY1> Well, I meant public concern in the sense of starting
|
||
World War III and that kind of thing.
|
||
Like Kevin Mitnick was said to be able to do. ga
|
||
<[ken] GUEST-3> No, that is pure media-hype BS! ga
|
||
<[ross] GREENBER> Done, Dennis? (I take it you LIKED Wargames?)
|
||
<[Dennis] D.MCCAULEY1> Well, I also wanted to ask Ken about porn on BBS's. ga
|
||
<[ross] GREENBER> Go for it, then!
|
||
<[ken] GUEST-3> Do you mean my favorite type <g>? ga
|
||
<[Dennis] D.MCCAULEY1> OK Ken - what about garden-variety dirty pix on BBS?
|
||
Seems to generate a lot of bad PR for the BBS world,
|
||
but most don't carry more than your average video
|
||
store. Not kiddie porn, of course, that's clearly
|
||
illegal. ga
|
||
<[ken] GUEST-3> The only problem has to do with the kids: can they get
|
||
at it? or are they in it?
|
||
Re the first issue, MOM and DAD are the best cops
|
||
there are. Re the second, that's just about the most
|
||
depraved bahavior there is. ga
|
||
<[ross] GREENBER> Mitch, you're FINALLY up.
|
||
<[Mitch] MITCHWAGNER> Okay, my question is whether computer crime really is
|
||
a big business. All the stuff we read about seems to
|
||
be penny-ante. Credit-card fraud for a couple of
|
||
thousand of dollars at most. Is anyone making big
|
||
money off of computer crime? This is something of a
|
||
follow-up to Dennis's question. -ga-
|
||
<[ken] GUEST-3> I am not aware of any big capers that I do not
|
||
personally handle unless they get some publicity.
|
||
The biggest bucks have been stolen as far as I know,
|
||
not through intrusions, but by using the computer as
|
||
the burglar tool or record keeper for the crime. In
|
||
those types of cases, tens of millions have been
|
||
stolen. ga
|
||
<[ross] GREENBER> Follow-up, Mitch?
|
||
<[Mitch] MITCHWAGNER> How did that work? ga
|
||
<[ken] GUEST-3> Take your pick. Making up phony insurance policies to
|
||
lure investors into the Equity Funding swindle about
|
||
15 years ago was the first biggie.
|
||
There is also the story that VW Corp in Germany got
|
||
ripped off for many millions due a computer-directed
|
||
fund transfer. But I cannot vouch for that. ga
|
||
<[ross] GREENBER> Done, Mitch?
|
||
<[Mitch] MITCHWAGNER> Yup.
|
||
<[ross] GREENBER> Jabba, the AmigaNut, is up.
|
||
<[AmigaNut] JABBA> Ken, when you participated in drafting the computer
|
||
crime statutes, was there any significant opposition
|
||
to the legislation? [ga]
|
||
<[ken] GUEST-3> Not to the idea of it, but there was a lot of fighting
|
||
about how they should be structured. The big problem
|
||
was whether teenage curiosity was to be outlawed or
|
||
not. ga
|
||
<[ross] GREENBER> Follow-up, Jabba?
|
||
<[AmigaNut] JABBA> Teenage curiosity? ga
|
||
<[ken] GUEST-3> Yeah, "hackers" breaking in just to look. The answer
|
||
was that it is illegal, but we trust the discretion of
|
||
LE to know when to prosecute or not, just like in
|
||
other crimes. ga
|
||
<[ross] GREENBER> Another, Jabba?
|
||
<[AmigaNut] JABBA> Ah. Does the statute contain confiscation provisions?
|
||
ga
|
||
<[ken] GUEST-3> No, not specifically. But if a computer is used to
|
||
commit a crime, it goes under the general idea that
|
||
the bad guy must forfeit the tools of his crime. ga
|
||
<[ross] GREENBER> Does this fit under RICO?
|
||
<[AmigaNut] JABBA> OK. Thanks.
|
||
<[ken] GUEST-3> No. RICO is a federal statute that would not apply to
|
||
a single person committing intrusions. ga
|
||
<[ross] GREENBER> Thanks. Mike, you're up!
|
||
<MIKE.C> Jabba just touched on this, but as a follow-up... Do
|
||
you feel that there are adequate computer crime laws
|
||
on the books? If not, is this because of a lack of
|
||
understanding among legislators of how serious
|
||
computer crime can be? ga
|
||
<[ken] GUEST-3> The laws in NY are okay, but could be tighter. For
|
||
example, there is no specific provision outlawing the
|
||
unauthorized insertion of a virus, and to prove
|
||
unauthorized use, LE has to show that the defendant
|
||
was warned to stay out of the system! The problem
|
||
is the ignorance of the legislature. ga
|
||
<[ross] GREENBER> Mike, another question for Ken?
|
||
<MIKE.C> Is a computer criminal prosecuted under the laws of
|
||
the state he/she lives in, or where the computer is
|
||
located? ga
|
||
<[ken] GUEST-3> Can be either or both. Just like shooting someone
|
||
across a state line. You can prosecute for murder in
|
||
either state. We can assert jurisdiction where the
|
||
actor was or where the penetrated computer was. ga
|
||
<[ross] GREENBER> Follow-up on that, Mike?
|
||
<MIKE.C> Do you think a strong national computer crime law
|
||
would be a good idea? ga
|
||
<[ken] GUEST-3> Sure, why not? But more important are well trained
|
||
cops and prosecutors at all levels, especially the
|
||
states. I hate to see the feds take over the field.
|
||
They tend to treat everything as a national
|
||
emergency. ga
|
||
<MIKE.C> Thanks Ken, Ross!
|
||
<[ross] GREENBER> Thanks for the questions, Mike. Cy's up!
|
||
<[Cy TROic] F.GLYNN> Ken, what do you think of cases where a user on a BIG
|
||
system (national), knows the system to a large extent.
|
||
The user tells the Sysops of the systems of bugs and
|
||
problems he has found. Do you think this user deserves
|
||
thanks, or at least recognition or his finding?
|
||
<[ken] GUEST-3> Is he an authorized user? ga
|
||
<[Cy TROic] F.GLYNN> In my opinion, this kind of "hacker" is a asset. To
|
||
other people, such as those on a system, he is a
|
||
hacker. The user is authorized -- it is a public
|
||
system. ga
|
||
<[ken] GUEST-3> If he is authorized and does not exceed his
|
||
authorization, then thank him. If he in not
|
||
authorized or exceeds the level, that's like thanking
|
||
the burglar for pointing out your loose window. ga
|
||
<[ross] GREENBER> Cy, another?
|
||
<[Cy TROic] F.GLYNN> Nope. Thanks!
|
||
<[ross] GREENBER> Okey doke. Chuck, you're on stage!
|
||
<[Chuck] C.LEPAGE> Ken, do you know if other countries have national
|
||
computer crime laws? How do other nations deal with
|
||
computer crime? Especially European nations. ga
|
||
<[ken] GUEST-3> Most European nations, at least western, do have them.
|
||
I do not know the details, however.ga
|
||
<[ross] GREENBER> I know that the UK has VERY strong laws against
|
||
Computer Misuse! Chuck, another?
|
||
<[Chuck] C.LEPAGE> Do you know of any international statutes concerning
|
||
computer crimes? ga
|
||
<[ken] GUEST-3> I have not heard of any international provisions of
|
||
any sort. ga
|
||
<[ross] GREENBER> Chuck, another question for Ken?
|
||
<[Chuck] C.LEPAGE> That's all for now.
|
||
<[ross] GREENBER> Thanks, Chuck. Sarah? You're up!
|
||
<SARAH> Backing up to computer porn, if someone handed you a
|
||
case where a kid (say 19) with a local BBS had a
|
||
closed directory for x-rated files, but a couple of
|
||
x-rated files were found in an open directory, what
|
||
would you do? ga
|
||
<[ken] GUEST-3> Didn't this just happen somewhere near Cleveland?...
|
||
<SARAH> I think so, but I don't remember the name.
|
||
<[ken] GUEST-3> If the availability of the porn was accidental, then
|
||
so what, IMHO. ga
|
||
<SARAH> How would the kid prove it was accidental? ga
|
||
<[ken] GUEST-3> By showing the protections he normally has in place.
|
||
ga
|
||
<SARAH> Ah, I see. Thanks. ga
|
||
<[ross] GREENBER> Ken: if a person unknowingly spreads a virus, are they
|
||
criminally negligent?
|
||
<[ken] GUEST-3> No, not if they do so knowingly. That's intentional.ga
|
||
Sorry, I misread your question....
|
||
If they did so unknowingly, they they are not guilty
|
||
of anything. Even criminal negligence requires a
|
||
grossly sloppy and negligent behavior. Simple not
|
||
knowing cannot convict you of anything. ga
|
||
<[ross] GREENBER> Sarah advises me that cops like to get up early and go
|
||
to bed early. This being Ken's first RTC (but
|
||
hopefully not his last), let's wrap up. Any last
|
||
questions?
|
||
<[ross] GREENBER> Okey doke. Last question for the evening. Chuck, you
|
||
have the honors!
|
||
<[Chuck] C.LEPAGE Would you prosecute someone who spread a harmless
|
||
virus, one that simply flashed a message at a given
|
||
time, or would you just "slap his wrist"? I mean,
|
||
would you NOT slap his wrist.
|
||
<[ken] GUEST-3> If the virus is harmless, but it did intrude without
|
||
any authorization, then some low level LE attention is
|
||
warranted. How low level would depend on the details
|
||
of the behavior and the extent of the spread. ga
|
||
<[ross] GREENBER> Chuck, last question?
|
||
<[Chuck] C.LEPAGE> That's it. Thank you, Ken.
|
||
<SARAH> Ken, thanks so much for coming. This has been a really
|
||
informative RTC. Can we ask you again some other time?
|
||
<[ken] GUEST-3> Sure, be delighted. ga
|
||
<SARAH> Then we'll say good night and let you get some sleep.
|
||
:)
|
||
<[ross] GREENBER> Ken, my thanks, too. I have a feeling that only about
|
||
10% of the questions people wanted to ask got asked.
|
||
So you'll be back sooner than you thought!
|
||
<[ken] GUEST-3> OK, good night to all, and thanks for the opportunity
|
||
to RTC with you. I think this sort of dialogue is
|
||
VIP. ga
|
||
<[ross] GREENBER> Good night, Ken!
|
||
<SARAH> 'Night, Ken. :)
|
||
<[ross] GREENBER> And, for those in the audience and for the
|
||
question-askers: thanks for being here and for asking
|
||
the questions!
|
||
|
||
|
|
||
| This listing was generated by LRTC Version 1.00
|
||
| (C)opyright by Hartmut W. Malzahn, 1991. All rights reserved.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 2 Jul 1993 16:00:05 EST
|
||
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
||
Subject: File 2--CPSR Workplace Privacy Test
|
||
|
||
CPSR Workplace Privacy Testimony
|
||
=====================================================
|
||
|
||
Prepared Testimony
|
||
and
|
||
Statement for the Record
|
||
of
|
||
Marc Rotenberg,
|
||
Director, CPSR Washington office,
|
||
Adjunct Professor, Georgetown University Law Center
|
||
on
|
||
H.R. 1900,
|
||
The Privacy for Consumers and Workers Act
|
||
|
||
Before
|
||
The Subcommittee on Labor-Management Relations,
|
||
Committee on Education and Labor,
|
||
U.S. House of Representatives June 30, 1993
|
||
|
||
Mr. Chairman, members of the Subcommittee, thank for the opportunity
|
||
to testify today on H.R. 1900, the Privacy for Consumers and Workers
|
||
Act. My name is Marc Rotenberg and I am the director of the CPSR
|
||
Washington office and an adjunct professor at Georgetown University
|
||
Law Center where I teach a course on information privacy law.
|
||
|
||
Speaking on behalf of CPSR, we strongly endorse the Privacy for
|
||
Consumers and Workers Act. The measure will establish important
|
||
safeguards for workers and consumers in the United States. We believe
|
||
that H.R. 1900 is particularly important as our country becomes more
|
||
dependent on computerized information systems and the risk of privacy
|
||
abuse increases.
|
||
|
||
CPSR has a special interest in workplace privacy. For almost a
|
||
decade we have advocated for the design of computer systems that
|
||
better serve the needs of employees in the workplace. We do not view
|
||
this particular goal as a trade-off between labor and management. It
|
||
is our belief that computer systems and information policies that are
|
||
designed so as to value employees will lead to a more productive work
|
||
environment and ultimately more successful companies and
|
||
organizations. As Charles Hecksher of the Harvard Business School has
|
||
said good managers have no use for secret monitoring.
|
||
|
||
Equally important is the need to ensure that certain fundamental
|
||
rights of employees are safeguarded. The protection of personal
|
||
privacy in the information age may be as crucial for American workers
|
||
as the protection of safety was in the age of machines. Organizations
|
||
that fail to develop appropriate workplace privacy policies leave
|
||
employees at risk of abuse, embarrassment, and harassment.
|
||
|
||
The concern about workplace privacy is widely felt in the computer
|
||
profession. This month MacWorld magazine, a leading publication in
|
||
the computer industry, released a special report on workplace privacy.
|
||
The report, based on a survey of 301 companies in the United States
|
||
and authored by noted science writer Charles Piller, made clear the
|
||
need for a strong federal policy.
|
||
|
||
Among the key findings of the MacWorld survey:
|
||
|
||
> More than 21 percent of those polled said that they had
|
||
"engaged in searches of employee computer files, voice mail,
|
||
electronic mail, or other networking communications."
|
||
|
||
> "Monitoring work flow" is the most frequently cited reason for
|
||
electronic searches.
|
||
|
||
> In two out of three cases, employees are not warned about
|
||
electronic searches.
|
||
|
||
> Only one third of the companies surveyed have a written policy on
|
||
privacy
|
||
|
||
What is also interesting about the MacWorld survey is the high level
|
||
of concern expressed by top corporate managers about electronic
|
||
monitoring. More than a half of those polled said that electronic
|
||
monitoring was either "never acceptable" or "usually or always
|
||
counterproductive." Less than five percent believed that electronic
|
||
monitoring was a good tool to routinely verify honesty.
|
||
|
||
These numbers suggest that managers would support a sensible privacy
|
||
law. Indeed, they are consistent with other privacy polls conducted
|
||
by Professor Alan Westin for the Lou Harris organization which show
|
||
that managers are well aware of privacy concerns and may, with a
|
||
little prodding, agree to sensible policies.
|
||
|
||
What would such a policy look like? The MacWorld report also
|
||
includes a model privacy policy that is based on several U.S. and
|
||
international privacy codes. Here are the key elements:
|
||
|
||
> Employees should know what electronic surveillance tools are used,
|
||
and how management will use the data gathered.
|
||
|
||
> Management should minimize electronic monitoring as much as
|
||
possible. Continuous monitoring should not be permitted.
|
||
|
||
> Data should only be used for clearly defined, work-related
|
||
purposes.
|
||
|
||
> Management should not engage in secret monitoring unless there is
|
||
credible evidence of criminal activity or serious wrongdoing.
|
||
|
||
> Data gathered through monitoring should not be the sole factor in
|
||
employee evaluations.
|
||
|
||
> Personal information gathered by employers should not be disclosed
|
||
to any third parties, except to comply with legal requirements.
|
||
|
||
> Employees or prospective employees should not be asked to waive
|
||
privacy rights.
|
||
|
||
> Managers who violate these privacy principles should be subject to
|
||
discipline or termination.
|
||
|
||
Many of these provisions are contained in H.R. 1900, the Privacy for
|
||
Consumers and Workers Act. Clearly, the policies and the bill itself
|
||
are not intended to prohibit monitoring, nor to prevent employers from
|
||
protecting their business interests. What the bill will do is help
|
||
establish a clear framework that ensures employees are properly
|
||
notified of monitoring practices, that personal information is not
|
||
misused, and that monitoring capability is not abused. It is a
|
||
straightforward, sensible approach that does not so much balance
|
||
rights as it clarifies interests and ensures that both employers and
|
||
employees will respect appropriate limitations on monitoring
|
||
capability.
|
||
|
||
The need to move quickly to establish a framework for workplace
|
||
privacy protection is clear. Privacy problems will become more acute
|
||
in the years ahead as new monitoring schemes are developed and new
|
||
forms of personal data are collected. As Professor Gary Marx has made
|
||
clear, there is little that can be imagined in the monitoring realm
|
||
that can not be achieved. Already, some members of the computer
|
||
profession are wearing "active badges" that provide full-time
|
||
geographical monitoring. Properly used, these devices help employees
|
||
use new tools in the hi-tech workplace. Improperly used, such devices
|
||
could track the physical movements of an employee throughout the day,
|
||
almost like a blip on a radar screen.
|
||
|
||
Computers are certainly powerful tools. We believe that they can be
|
||
used to improve productivity and increase job satisfaction. But this
|
||
requires that appropriate policies be developed to address employee
|
||
concerns and that laws be passed, when necessary, to ensure that
|
||
computer abuse does not occur.
|
||
|
||
This concludes my testimony. I would be pleased to answer your
|
||
questions.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 30 Jun 1993 13:44:52 -0500
|
||
From: lbreit@EFF.ORG(Lisa Breit)
|
||
Subject: File 3--JOB OPENING AT EFF
|
||
|
||
Position Announcement
|
||
|
||
SYSTEMS ADMINISTRATOR
|
||
|
||
Electronic Frontier Foundation
|
||
|
||
The Electronic Frontier Foundation is a nonprofit public interest
|
||
organization located in Washington, D.C. We are looking for a skilled
|
||
Systems Administrator experienced with management of Unix-based Internet
|
||
hosts, Macintosh LAN management, business applications, and user support.
|
||
This is a key technical and administrative role in a rapidly growing
|
||
organization with national visibility.
|
||
|
||
EFF recently moved its headquarters from Massachusetts to Washington. The
|
||
Systems Administrator's initial responsibilities will include relocating
|
||
EFF's servers and setting up a tech center in the DC office. The Systems
|
||
Administrator reports to the Business Manager, and interfaces on a regular
|
||
basis with program and support staff, members, subcontractors,
|
||
collaborators, and the Board of Directors.
|
||
|
||
The current EFF Sun cluster includes a pair of SparcStation 2 workstations,
|
||
and a SparcStation ELC workstation, with 3.0+ Gb. storage, Exabyte 8200
|
||
(8mm) tape backup, and a CDROM drive. There is also a Telebit Netblazer
|
||
doing double duty as a router (56kb to PSInet) and a terminal server with
|
||
Telebit modems.
|
||
|
||
Most of EFF's projects are electronically mediated. Eff.org is the primary
|
||
host for the core staff and volunteers of EFF for whom electronic mail is a
|
||
"mission critical" function.
|
||
|
||
The Systems Administrator Position
|
||
|
||
The Electronic Frontier Foundation is seeking a hands-on, multi-talented
|
||
Systems Administrator. In the coming year EFF will be expanding its
|
||
internal system functions and providing more Internet-based services to
|
||
individuals who are frequent Net users. We are looking for an individual
|
||
with an outstanding technical background, good communication skills, a user
|
||
service orientation, and a commitment to the Electronic Frontier
|
||
Foundations's mission.
|
||
|
||
The Systems Administrator's job responsibilities include:
|
||
|
||
System Administration
|
||
|
||
o Eff.org is the Foundation's Internet access point. Support and
|
||
maintain all hardware, software, and net traffic related to eff.org,
|
||
including a cluster of Sun workstations, associated communications
|
||
equipment, and key systems including SMTP, ftp archive, Gopher, and WAIS
|
||
site.
|
||
|
||
o EFF LAN: Manage a 15 station Appletalk LAN (may be expanded).
|
||
|
||
o Voice Telephone System: Manage and maintain a 50 port PBX.
|
||
|
||
o System Maintenance: Ensure regular servicing, upgrading and
|
||
maintenance of all hardware and communications systems; maintain data
|
||
security and virus protections; perform regular backups.
|
||
|
||
o Record Keeping and Documentation: Maintain logs, inventories,
|
||
reports, and any other records or paperwork required for management,
|
||
insurance, administration, etc.; regularly draft and update documentation
|
||
for internal systems and procedures.
|
||
|
||
Application Support and Training
|
||
|
||
o Support EFF's internal systems for MIS, communication,
|
||
publications, and other functions, including hardware and software
|
||
selection, purchase, installation and upgrade, troubleshooting, problem
|
||
solving, and answering users' questions.
|
||
|
||
o Train staff and others as designated on a wide variety of
|
||
applications used at EFF, including Microsoft Word, Excel, Filemaker Pro,
|
||
Pagemaker, Internet-based utilities and other online services.
|
||
|
||
Program Support
|
||
|
||
o Work with policy, communications, and administrative staff to
|
||
conduct online political organizing, fundraising, and education efforts.
|
||
|
||
o Assist in development of database applications to support EFF
|
||
membership and fundraising.
|
||
|
||
o Support communications and membership staff by monitoring EFF's
|
||
email and EFF hosted on-line newsgroups and discussion groups.
|
||
|
||
o Provide technical advise and expertise necessary to comprehend or
|
||
formulate policy issues.
|
||
|
||
Qualifications:
|
||
|
||
This is a key position requiring a completely dependable individual who is
|
||
able to be keep the trains running on time for day to day operations while
|
||
completing special projects and a variety new development projects. S/he
|
||
occasionally may be required to do some weekend work, and will wear a
|
||
beeper. Ideal candidates will enjoy the challenge of a high demand job and
|
||
the unpredictability of an interrupt-driven environment: We are seeking:
|
||
|
||
Substantial experience in Unix systems administration, including mastery of
|
||
sendmail, DNS, and other Internet functions. Ability to write shell scripts
|
||
using Unix tools such as perl and awk. Background in C programming an
|
||
ability to customize, install and debug C programs.
|
||
|
||
Extensive Macintosh support including System 7.x, and networking both with
|
||
LocalTalk an dEthernet, plus MacTCP. Hardware experience a plus.
|
||
|
||
Minimum 3 years experience in systems administration, including hardware
|
||
and software purchase, setup and maintenance, record keeping, security,
|
||
etc.
|
||
|
||
Good communication skills, and a helpful, instructive approach to
|
||
supporting users;
|
||
|
||
Ability to work independently on multiple projects and as part of a team.
|
||
|
||
Ability to write clear and simple documentation, keep records and maintain
|
||
an organized, orderly environment;
|
||
|
||
Interest in EFF's mission a definite plus;
|
||
|
||
B.S. or other technical degree in Computer Science, Electrical Engineering,
|
||
MIS, or related field. Will consider experience in lieu of education.
|
||
|
||
Compensation:
|
||
|
||
Salary $28,000-$32,000 depending on experience
|
||
|
||
Full benefits include health insurance, disability, life insurance,
|
||
pension, vacation.
|
||
|
||
How to apply:
|
||
|
||
This position is located in Washington DC. Deadline for applications is
|
||
July 6. To apply, send a resume and cover letter by US mail to our
|
||
recruiter in Massachusetts:
|
||
|
||
Electronic Frontier Foundation
|
||
Systems Administrator Position
|
||
238 Main Street
|
||
Cambridge, MA 02142
|
||
Attn: Lisa Breit
|
||
|
||
by email (ASCII only please): lbreit@eff.org
|
||
|
||
About the Electronic Frontier Foundation (EFF)
|
||
|
||
The Electronic Frontier Foundation was founded in July, 1990 to ensure
|
||
freedom of expression in digital media, with a particular emphasis on
|
||
applying the principles embodied in the Constitution and the Bill of Rights
|
||
to computer-based communication. EFF has rapidly evolved into one of the
|
||
leading organizations that individuals, corporations, the media, and
|
||
government turn to when considering questions involving new communications
|
||
technology.
|
||
|
||
EFF's mission is to foster the opportunities of digital communication for
|
||
individuals and communities in a free and open society. The Foundation:
|
||
|
||
o Shapes the national policy debate on how the communications
|
||
infrastructure will develop, and how electronic communications will be
|
||
regulated;
|
||
|
||
o Facilitates discussion and organizes action around technology
|
||
policy issues of interest to a wide range of groups and individuals, such
|
||
as digital privacy and cryptography, the future of the Internet; etc. and
|
||
|
||
o Seeks and undertakes cases to defend the civil liberties of
|
||
individuals and organizations using computers and communication technology,
|
||
and provides informal legal services to net users;
|
||
|
||
o Engages in outreach and educational activities within the community
|
||
of electronic network users as well as among law enforcement officials,
|
||
policy makers, corporations and others.
|
||
|
||
EFF also creates forums, publications and information resources, available
|
||
in print and on a number of electronic networks, to raise awareness of
|
||
political, legal, social and cultural issues that result from the
|
||
widespread use of electronic communication. Over the next few years, EFF
|
||
will continue its work in the civil liberties, policy, and public education
|
||
arenas, while sponsoring research projects and events that explore the
|
||
nature of communities in Cyberspace, and support their evolution here and
|
||
abroad.
|
||
|
||
In the next two years, EFF expects to broaden its presence on a range of
|
||
electronic networks, expand its membership; experiment with organizing and
|
||
fundraising campaigns conducted on electronic networks; add new members to
|
||
its Board; and improve its communication program encompassing media
|
||
relations, public speaking engagements for staff and Board members, the
|
||
development of a number of online forums, and regular production of
|
||
electronic and printed publications. EFF currently has 7 full time
|
||
professional staff and two support staff. The staff size is expected to
|
||
double over the next year to accommodate the anticipated growth of EFF's
|
||
programs and operations.
|
||
|
||
EFF receives funding from a variety of sources, including corporations,
|
||
individual donors, and other foundations. EFF also receives membership fees
|
||
from several hundred individual and corporate members, which entitles them
|
||
to publications and online access to discussions and seminars on the
|
||
Internet.
|
||
|
||
oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
|
||
Lisa A. Breit o c/o EFF o 238 Main Street, Cambridge, MA 02142
|
||
Mailing address: 29 Beechwood Road, Waltham, MA 02154
|
||
617-894-5415 phone o email: lbreit@eff.org
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 29 Jun 1993 22:15:17 -0400 (EDT)
|
||
From: KAMAKIZE@DELPHI.COM
|
||
Subject: File 4--CuDs on BBSes: "Other Side of Infinity"
|
||
|
||
((MODERATORS' NOTE: About one-third of CuD readers obtain CuD from
|
||
local BBSes. We receive a few calls or letters each week from readers
|
||
wondering if there are BBSes in their area that carry CuD, but we
|
||
haven't kept formal list of boards that maintain up-to-date archives.
|
||
There are so many, we can't maintain systematic records. But, we'll
|
||
periodically publish a list of BBSes around the world that do. If your
|
||
board does, let us know. Send a summary of the board and other
|
||
information (in a brief paragraph or two) and every few months we will
|
||
list them. Here's another board that maintains complete CuD files)).
|
||
|
||
BBS Name : The Other Side Of Reality
|
||
BBS Phone: 703-366-4620
|
||
Hours: 24
|
||
All Cuds online and available on release date, and many EFF files
|
||
available on first call.
|
||
BBS is FREE.
|
||
Run on WWIV BBS Software with a 14.4K modem
|
||
Networked With WWIV-link,Icenet,Insanity
|
||
CD-Rom Online with approx 10,000+ files online for D/l on first call
|
||
|
||
located in Roanoke,Virginia
|
||
We also carry many Occult text Files, along with Computer related Files
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.49
|
||
************************************
|
||
|
||
|
||
|