853 lines
41 KiB
Plaintext
853 lines
41 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Aug 1 1993 Volume 5 : Issue 57
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Coop Eitidor: Etaoin Shrdlu, Senior
|
||
|
||
CONTENTS, #5.57 ( Aug 1 1993)
|
||
File 1--Re: Hacker sentencing
|
||
File 2--Criminal Records Subject to Abuse
|
||
File 3--UPDATE: Ideas-Exchange listserv/ Legis Data Programmers
|
||
File 4--Observations from a "non-cyberhead"
|
||
File 5--Response to "Observations from a 'non-cyberhead'"
|
||
File 6--Response to Rep. Markey's Letter
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Fri, 30 Jul 1993 13:41:55 -0700
|
||
From: mcmullen@MINDVOX.PHANTOM.COM(John F. McMullen)
|
||
Subject: File 1--Re: Hacker sentencing
|
||
|
||
The following appeared on Newsbytes, a commercial copyrighted
|
||
international news service on July 29th. It is reposted here with the
|
||
express consent of the author (This notice must accompany any subsequent
|
||
re-postings which I am authorizing here)
|
||
|
||
========================================================================
|
||
(EDITORIAL) (GOVERN) (NYC)
|
||
Reflections On Hacker Sentencing 07/29/93
|
||
NEW YORK, NEW YORK, U.S.A.(NB) 072993 -- I sat in federal court
|
||
this week and watched two young men be sentenced to prison. It was not a
|
||
pleasant experience.
|
||
|
||
The young men, Elias Ladopoulos, known in the hacker world as "Acid
|
||
Phreak", and Paul Stira, a/k/a "Scorpion", were each sentenced to six
|
||
months imprisonment, six months home detention, seven hundred fifty
|
||
hours of community service, and $50 assessment charge for conspiracy to
|
||
commit computer crimes. Both had pled guilty on March 17th on this
|
||
charge so there was not a question of guilt or innocence.
|
||
|
||
The six months imprisonment also does not seem draconian -- six months
|
||
doesn't seem very long unless you happen to be the one serving it. Time is
|
||
extremely relative as I found out when I spent five years at Fort Sill,
|
||
Oklahoma between January 1963 and April 1963. It is safe to say that these
|
||
young men will find the six months loss of freedom to be a very long
|
||
period.
|
||
|
||
The penalty, however, may be reasonable. It is certainly well within the
|
||
sentencing guidelines for the infraction (The maximum sentence quoted for
|
||
the crime pled to is five years in prison and a $250,000 fine).
|
||
|
||
If I think that the sentencing may be just, or at least defensible, then
|
||
what is the problem? Well, first, I have known the young men for over
|
||
three years and like them both. I would have preferred that they not go to
|
||
prison. I also personally feel that Stira never should have been a part of
|
||
the indictment; a view shared by some law enforcement folks that I have
|
||
spoken to (he is only mentioned in the papers twice and any illegal
|
||
activities seeming stopped in January 1990; the activities enumerated
|
||
involved possession a "trap door" program and a list of user passwords to
|
||
systems).
|
||
|
||
I recognize that is a personal feeling and that all people want their
|
||
friends not to bear hardship. Some place Ted Bundy probably had a friend
|
||
who wanted him loose and running around.
|
||
|
||
Another problem relates to the procedures that got the defendants to the
|
||
sentence. Stira and Ladopoulos (along with Mark Abene a/k/a "Phiber Optik")
|
||
were the subjects of a search and seizure by Secret Service agents in
|
||
January 1990. Stira and Ladopoulos' fate then languished until July 1992
|
||
when they were indicted along with Abene and two new players, John Lee
|
||
a/k/a "Corrupt" and Julio Fernandez a/k/a "Outlaw", on conspiracy to
|
||
commit computer crimes.
|
||
|
||
During the over three years that have gone by, Stira and Ladopoulos have
|
||
undergone changes. They are both college students -- Stira would have
|
||
graduated had his college not pulled his computer account when he pled
|
||
guilty; an action which prevented him from completing his last course
|
||
requirement.
|
||
|
||
Both have performed community service through contacts provided by
|
||
Robert Ambrose, a director of the New York Amateur Computer Club
|
||
(NYACC). Ladopoulos is employed by a major New York broadcasting
|
||
company and has impressed his employer to the extent that the employer
|
||
wrote a letter to the judge, asking for leniency, and came to the sentencing.
|
||
|
||
Ladopoulos' attorney, Scott Tulman, speaking at the hearing, said "He goes
|
||
to school, works and donates time to working with the handicapped,
|
||
teaching them to use computers. He acknowledges his culpability and has
|
||
been attempting to atone for it. His probation officer noted his sincere
|
||
efforts to rehabilitate himself. The stupid young person, 'Acid Phreak',
|
||
who was involved with other person's computers no longer exists. It is
|
||
Elias Ladopoulos who will be sentenced and that will cause a hardship to
|
||
his family."
|
||
|
||
There are those who may say "It doesn't matter how long ago they did
|
||
something wrong. They did it and they have to pay the piper." They may
|
||
well be right in some cases but these are not past serial killers; they
|
||
are two young men who have been under tremendous pressure for a
|
||
substantial part of their lives (3 years out of 21 is significant) since
|
||
the indictment. Perhaps that should have been considered sufficient
|
||
punishment.
|
||
|
||
There is, further, an overriding problem. From day 1 of the case, the
|
||
judge, Richard Owen, showed a complete lack of understanding of the
|
||
technology related to the case. At the initial scheduling meeting, then-
|
||
Assistant US Attorney Steve Fishbein pointed out that the discovery
|
||
process might take a long time as the government had intercepted over "50
|
||
megabytes" of electronic evidence. The judge asked what a megabyte was
|
||
and, when told it was a million characters, seemed to look rather panicked
|
||
when he said "You're not going to show all that to a jury are you?"
|
||
Fishbein assured him that he would not.
|
||
|
||
It seemed obvious to those of us in attendance that Judge Owen had visions
|
||
of 50 million pieces of paper being delivered to a jury. He was
|
||
understandably concerned.
|
||
|
||
That was only day one and a federal judge may not be computer literate at
|
||
the start of such a case. That would certainly be a lot to expect. One
|
||
might expect, however, that, a year later, at the conclusion of the case,
|
||
knowledge would have been acquired. Sadly, that did not seem to be the
|
||
case.
|
||
|
||
One of the charges made against Stira and Ladopoulos (and Abene) was
|
||
that they both pulled a prank and caused damage to a computer system
|
||
belong to WNET, the PBS television channel in New York. While Stira and
|
||
Ladopoulos admitted being on the system, both deny causing any damage
|
||
(it is a common belief that another hacker, known for malicious actions,
|
||
left unindicted by the federal government because of his age, knowingly
|
||
committed the damage). A major part of the sentencing dialogue between
|
||
Ladopoulos and Judge Owen had to do with this incident. Newsbytes
|
||
reported it this way:
|
||
|
||
"In response to questions from Judge Owen concerning his involvement with
|
||
the damage to the WNET system, Ladopoulos said 'Another hacker whose name
|
||
I have already provided to the government was the one who took the system
|
||
down. When I saw the problem, I called the station and left my own phone
|
||
number and offered to help. If I had caused the damage, I would not have
|
||
done that. The person who caused the damage is a very deranged person.'
|
||
|
||
"Owen said that he could not believe that it was merely a coincidence that
|
||
the damage was done to the WNET system in the same time frame that
|
||
Ladopoulos was on the system. Ladopoulos replied by saying that the
|
||
system log showed that he was off the system when the damage occurred. A
|
||
discussion followed on the entire incident."
|
||
|
||
The discussion actually had knowledgeable persons in the court room
|
||
shaking their heads. The judge didn't understand. He said that there was
|
||
too much work for this mysterious hacker to have done to copy messages
|
||
from Ladopoulos, add destructive material to it and shut down the system
|
||
all on the same day -- just too much typing. Ladopoulos tried to explain
|
||
about capture routines, editors, etc. and then, seeming to realize the
|
||
futility of it, just gave up.
|
||
|
||
Speaking later to Newsbytes about the experience, Ladopoulos said "It was
|
||
terribly frustrating. The judge just didn't understand about WNET. I tried
|
||
to explain that I did not damage the system but he didn't understand."
|
||
|
||
Now it certainly is not clear that the judge based his sentencing on the
|
||
WNET episode. He may not have -- at John Lee's sentencing, the same
|
||
judge mentioned that evidence showed that Lee had insulted someone's
|
||
mother on the net. One suspects and hopes that this social transgression
|
||
played no part in Lee's yearand-a-day sentence; there were, after all,
|
||
substantive charges against Lee.
|
||
|
||
We will never know whether or how much this misunderstanding influenced
|
||
the sentence -- and it is a light sentence under the guidelines. So,
|
||
perhaps, no harm was done.
|
||
|
||
No harm? Not quite! At a minimum, the dialogue shook the confidence of
|
||
everyone in the room about the sentence. Perhaps the prosecution was
|
||
satisfied because the defendants were being punished for their illegal
|
||
acts -- perhaps the defense took it in stride because of the relative
|
||
lightness of the sentence -- perhaps it was a good sentence. However, any
|
||
one with an understanding of computers and telecommunications had to feel
|
||
that the judge had no grasp of these issues.
|
||
|
||
So what happens next? Organizations like the Electronic Frontier
|
||
Foundation (EFF), the Society for Electronic Access (SEA), and Computer
|
||
Professionals for Social Responsibility (CPSR) are trying to close the
|
||
knowledge gap between public officials and technologists. Congress is
|
||
holding hearings on technology issues. There is recognition at the
|
||
national level on the importance of understanding the changes that the
|
||
telecommunications revolution has brought.
|
||
|
||
Progress may be made. I hope so. Can you imagine if it were your case --
|
||
or that of a member of your family being sentencing? Scary, isn't it?
|
||
|
||
John F. McMullen/19930729)
|
||
|
||
|
||
John F. McMullen mcmullen@mindvox.phantom.com Consultant,
|
||
knxd@maristb.bitnet mcmullen@well.sf.ca.us Writer,
|
||
70210.172@compuserve.com mcmullen@panix.com Student,
|
||
GEnie - nb.nyc mcmullen@eff.org Teacher
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 29 Jul 93 21:21:45 EDT
|
||
From: trader@CELLAR.ORG
|
||
Subject: File 2--Criminal Records Subject to Abuse
|
||
|
||
I thought that this might interest you and other CuD readers.
|
||
|
||
Philadelphia Inquirer - 07/29/93
|
||
|
||
CRIMINAL RECORDS ARE VULNERABLE TO ABUSE, CONGRESS IS WARNED
|
||
|
||
Sometimes the information is for sale, the GAO said. It called for
|
||
greater security.
|
||
|
||
By Lawrence L. Knutson
|
||
ASSOCIATED PRESS
|
||
|
||
WASHINGTON -- In Arizona, a former police officer gained access to
|
||
print-outs from the FBI's National Crime Information Center, tracked
|
||
down his estranged girlfriend and murdered her.
|
||
|
||
In Pennsylvania, a computer operator used the system to conduct
|
||
background searches for her drug-dealer boyfriend, who wanted to learn
|
||
if new clients were undercover agents.
|
||
|
||
In colorado, Connecticut, Florida, Maryland and other states, private
|
||
investigators bought data from insiders with authorized access to the
|
||
criminal-record system.
|
||
|
||
These examples were presented to the House Judiciary and Government
|
||
Operations Committees yesterday by the General Accounting Office,
|
||
which con-cluded that the criminal-records system is vulnerable to
|
||
widespread misuse.
|
||
|
||
The GAO recommended that Congress enact legislation with "strong
|
||
criminal sanctions" barring the misuse of the criminal record files
|
||
and that the FBI encourage state users to enhance security.
|
||
|
||
Laurie E. Ekstrand, the GAO's associate director for administration of
|
||
justice issues, said that while the FBI and the states do not keep
|
||
adequate records, "we did obtain sufficient examples of misuse to
|
||
indicate that such misuse occurred throughout the system."
|
||
|
||
"Furthermore, all the reported misuse incidents involve insiders,
|
||
while none involved outside [computer] hackers," she said.
|
||
|
||
"It appears that there are employers, insurers, lawyers or
|
||
investigators who are willing to pay for illegal access to personal
|
||
information, and there are insiders who are willing to supply the
|
||
data," said Rep. Gary Condit (D., Calif.) summing up the GAO's
|
||
findings.
|
||
|
||
The National Crime Information Center, with 24 million records, is the
|
||
nation's largest computerized criminal justice information system.
|
||
Its 14 separate files contain an extensive range of data, including
|
||
information about fugitives, stolen vehicles and missing persons.
|
||
|
||
The largest single file, known as "the III file" gives users access to
|
||
17 million criminal-history information records maintained in separate
|
||
state systems.
|
||
|
||
The GAO said more than 19,000 federal, state and local law enforcement
|
||
agencies in the U.S. and Canada, using 97,000 terminals, have direct
|
||
access to the system.
|
||
|
||
The GAO called the Arizona case the most extreme example of misuse it
|
||
uncovered.
|
||
|
||
The agency said investigators learned that the former police officer
|
||
was able to locate his estranged girlfriend using data provided from
|
||
the national records system by three people working in different law
|
||
enforcement agencies.
|
||
|
||
"After an investigation, the printouts provided by the three
|
||
individuals were discovered and they were identified, prosecuted and
|
||
convicted," the GAO said.
|
||
|
||
Other examples provided by the GAO:
|
||
|
||
- In Maine, a police officer used the system to conduct a background
|
||
check on one of his wife's employees who was then fired for not
|
||
disclosing his criminal record
|
||
|
||
- In Iowa, a dozen cases of misuse were reported over the last two
|
||
years. All involved computer operators conducting background
|
||
searches on friends or relatives.
|
||
|
||
- In New York state, an employee of a law enforcement agency provided
|
||
criminal history information to be used by a local politician against
|
||
political opponents.
|
||
|
||
- In Pennsylvania, a police officer "accessed and widely disseminated"
|
||
a fellow officer's criminal history record.
|
||
|
||
- In South Carolina, a law enforcement agency conducted background
|
||
searches on members of the City Council.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 30 Jul 1993 16:29:35 -0700
|
||
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
||
Subject: File 3--UPDATE: Ideas-Exchange listserv/ Legis Data Programmers
|
||
|
||
July 30, 1993
|
||
|
||
On July 22nd, I broadcast details [Update #19] about a number of
|
||
sample files of legislative data, in the various forms used internally
|
||
by the Legislative Data Center and Office of State Printing, that are
|
||
available for anonymous ftp, with which volunteer-programmers could
|
||
begin experimenting.
|
||
|
||
Just before flying off to a tele-community conference in Colorado, Al
|
||
Whaley of cpsr.org (one of the volunteers) proposed an online
|
||
discussion group to facilitate the shared programming effort -
|
||
excellent idea! I had planned on broadcasting this message before
|
||
now, but was first distracted by the c onference, then came home with
|
||
a massive head code. Blushing apologies!
|
||
|
||
LEGISLATIVE-DATA PROGRAMMERS' INFORMATION EXCHANGE
|
||
This list is intended only for those who are developing software to
|
||
process the state legislative data - display it, print it, index it,
|
||
etc. Anyone, including non-subscribers, can send to this list.
|
||
Neither subscribers nor submissions are moderated. Subscribers'
|
||
identities are not currently concealed, but can be after subscribing.
|
||
|
||
TO SUBSCRIBE:
|
||
Send email to listserv@cpsr.org.
|
||
(The Subject is ignored.)
|
||
The email message should state:
|
||
SUBSCRIBE LDC-SW firstname lastname
|
||
where firstname and lastname are, of course, yours.
|
||
|
||
FOR HELP:
|
||
Send email as above, with the message HELP
|
||
|
||
Note: ldc-sw-request@cpsr.org is equivalent to listserv@cpsr.org.
|
||
|
||
SOFTWARE SUCCESSES WOULD BE HELPFUL AT AUGUST 18th HEARING
|
||
It would be *great* to flaunt printouts of the sample legislative data
|
||
along with a listing of the freeware source-code that created them at the
|
||
Aug. 18th Senate Rules Committee.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 27 Jul 93 06:47:00 EST
|
||
From: "Straw, Scott F." <sfs0@PHPMTS1.EM.CDC.GOV>
|
||
Subject: File 4--Observations from a "non-cyberhead"
|
||
|
||
With reference to the FOIA inquiry and the USSS affidavit
|
||
response, what is "the 2600 case?" (CuD 5.52) Having only subscribed
|
||
since issue 5.51, I probably just missed this important filler info.
|
||
You might consider the journalistic practice of briefing newcomers to
|
||
background material, even if only a sentence.
|
||
|
||
With regard to the E-fingerprinting of welfare recipients, and
|
||
its potential long range spread to other social service provisions, I
|
||
say here, here! Would we hesitate to issue a photo-ID to these
|
||
individuals to verify that the intended recipient is actually
|
||
receiving the aid? If not, why not a
|
||
fingerprint record? More unique than a photograph, and infinitely easier to
|
||
store electronically (being quasi-two dimensional and devoid of subtle
|
||
nuances of character), fingerprinting will allow positive, definitive
|
||
identification. Yes, it will detect and deter "double-dipping" fraud, but it
|
||
will also prevent unauthorized procurement/theft as well.
|
||
|
||
I would hope that CPSR (Computer Professionals for Social
|
||
Responsibility) would reconsider their stance in light of their tenet that
|
||
reads:
|
||
|
||
"We encourage the use of computer technology to improve the
|
||
quality of life." - Principle #5, CuD 5.55, File 1 (What is
|
||
CPSR and how can we join?)
|
||
|
||
If the social service recipient were, by the use of this
|
||
technology to eliminate fraud and theft (and because of the
|
||
elimination of these losses) able to receive a higher, more focused
|
||
and therefore, enhanced level of service, that could have strong
|
||
positive implications on that recipients quality of life.
|
||
|
||
I fail to see this as a "Big Brother" issue. After all, isn't
|
||
the goal of social services in a majority of the cases to provide
|
||
assistance temporarily? Once the assistance is no longer needed, the
|
||
recipient is no longer tracked.
|
||
|
||
------------------------------
|
||
|
||
((MODERATORS' NOTE: Jim Davis's reply clarifies the relevance of
|
||
computer technology as a cyberspace concern. The issues include the
|
||
power of technology to invade privacy and the problem of using
|
||
technology on groups lacking a strong constituency to protect
|
||
themselves. The fingerprinting policy seems to isolate a particular
|
||
group for more stringent monitoring. And, the possibility that
|
||
discretionary fingerprint IDS might spread to other states is noted by
|
||
joec@CFCSYS.LINET.ORG(Joseph Christie):
|
||
|
||
I noticed the article on fingerprinting public assistance
|
||
recipients in the San Francisco area and just wanted to
|
||
report that Suffolk County, New York is also considering
|
||
setting up a similar system and they are using the
|
||
"phenomenal" savings by the LA system as justification.
|
||
|
||
+++++
|
||
|
||
Date: Wed, 28 Jul 1993 10:47:50 -0700
|
||
From: "James I. Davis" <jdav@WELL.SF.CA.US>
|
||
Subject: File 5--Response to "Observations from a 'non-cyberhead'"
|
||
|
||
People concerned with privacy have always resisted the idea of a
|
||
national ID card, no matter how technically efficient it is. One could
|
||
possibly argue that having and requiring a positive ID for all social
|
||
transactions wd improve the quality of life, but I "using technology
|
||
to eliminate fraud wd result in a higher quality of life" could
|
||
include universal activities like shopping (more technology to prevent
|
||
shoplifting), recreation (more technology to monitor parks and
|
||
streets) or work (more technology to combat employee theft of
|
||
employers' supplies, "time", computer resources, etc.) and so on.
|
||
People who don't steal and don't defraud might enjoy cheaper goods,
|
||
safer streets and parks; and for the employers', higher profits;
|
||
everyone else could be put in prison or unemployment lines (a detour
|
||
on the way to prison). The question becomes how do we want to balance
|
||
the right to privacy and the freedom to go about our lives with a
|
||
desire to combat fraud and theft? At what point do we say, "this looks
|
||
like the road to a police state"?
|
||
|
||
As to whether such technology should be used only for poor people, or
|
||
only for people who need public assistance, it raises some obvious
|
||
problems about singling out a particular section of the population for
|
||
"special treatment."
|
||
|
||
Lest one should say, "well, they're only welfare recipients; what's
|
||
that got to do with me" (ignoring for the moment what a brutal and
|
||
short-sighted statement that would be), one should keep in mind that
|
||
some of the most serious breaches in overall privacy vis-a-vis
|
||
computer systems have started with the bogeyman of welfare fraud, and
|
||
then extended to more general use after the precedence is set. Jeffrey
|
||
Rothfeder, in _Privacy_at_Risk_, describes how federal computer
|
||
matching, where agencies go on data-fishing expeditions by matching up
|
||
different government databases, was initially considered outside of
|
||
what was allowed under the 1974 Privacy Act. Pressure from the
|
||
Department of Health, Education and Welfare under the Carter
|
||
administration stretched the rules, so to speak, to allow them to hunt
|
||
for people "double-dipping." The program was later extended to other
|
||
types of matches, including matching IRS returns and Social Security
|
||
records. All along, the benefits from these dragnet searches have been
|
||
questionable. In 1988, the House Committee on Government Operations
|
||
noted that "the cost-effectiveness of computer matching has yet to be
|
||
demonstrated." (Rothfeder pp 140 - 146) "Cost-effectiveness" of course
|
||
does not include the additional cost of the loss of privacy such
|
||
searches imply.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 26 Jul 1993 19:21:33
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: Representative Markey's Letter in re AIS BBS
|
||
|
||
((MODERATORS' NOTE: Like the flooding Mississippi, the AIS BBS
|
||
incident just keeps over-flowing the levees and spreading beyond
|
||
reasonable boundaries. CuD readers will recall that AIS ("Automated
|
||
Information Systems," a BBS operated by the Treasury Department's
|
||
Bureau of Public Debt) was the target of an "anonymous" posting in
|
||
RISKS Digest. The poster objected particularly to the availability of
|
||
virus source code on the board. The post was routed to government
|
||
officials (see Crypt Newsletter #16 for details) and the offending
|
||
files, along with "underground" text files--including CuD--were
|
||
removed from the board. Perhaps, thanks to media hyperbole, CuDs are
|
||
perceived as nearly as dangerous as virus source code.
|
||
|
||
That should have ended the matter. Sadly, the Washington Post picked
|
||
up on the story and printer a slanted, simplistic, and rather
|
||
hyperbolic version of events in an account that raises serious
|
||
questions of journalistic ethics (see CuD #5.51). Even that should
|
||
have ended things. However, Rep. Edward J. Markey (D., Mass), Chair of
|
||
the House Committee on Energy and Commerce's Subcommittee on
|
||
Telecommunications and Finance, read the Post article and was
|
||
sufficiently concerned to write Lloyd Bentsen, Secretary of the
|
||
Treasury, demanding to know why AIS made certain types of files
|
||
available. Rep. Markey linked the AIS BBS files with other security
|
||
issues that the GAO found--even though the other alleged problems were
|
||
unrelated to the board. The impetus for the article, according to
|
||
Markey staffer Jeff Duncan, was the Washington Post depiction of
|
||
events, and the letter builds on the Post's narrative to substantiate
|
||
its own concerns. The letter assumes "guilt" without looking beyond
|
||
the media depiction. Sadly, it does not reflect well on the knowledge
|
||
of Rep. Markey or his staffers either about the technology or the
|
||
broader issues of freedom of information. We reprint below the
|
||
relevant two pages of the
|
||
four page letter)).
|
||
|
||
+++++
|
||
|
||
U.S. House of Representatives
|
||
Committee on Energy and Commerce
|
||
SUBCOMMITTEE ON TELECOMMUNICATIONS AND FINANCE
|
||
Washington, DC 20515-6119
|
||
July 6, 1993
|
||
|
||
The Honorable Lloyd Bentsen
|
||
Secretary
|
||
Department of the Treasury
|
||
1300 Pennsylvania Ave., N.W.
|
||
Washington, D.C. 20220
|
||
|
||
Dear Mr.Secretary:
|
||
|
||
I am writing with regard to recent reports about a computer
|
||
bulletin board service run under the auspices of the Department's
|
||
Bureau of Public Debt in Parkersburg, W.V. The Washington Post
|
||
reported on June 19, 1993, that the now-terminated service made
|
||
publicly available information about computer viruses and other
|
||
"hacker" information that could potentially inflict damage on
|
||
computer systems and data.
|
||
|
||
On June 9, 1993, the Subcommittee held a hearing on data and
|
||
network security. Testimony received by the Subcommittee at that
|
||
time revealed that the computer hacking and telecommunications
|
||
toll fraud problem in the United States is increasing. In
|
||
addition, the average computer site will spend more than
|
||
$176,000 on computer virus clean-up and the cost of virus damage
|
||
to all U.S. computer users has been over a Billion dollars over
|
||
the last three years.
|
||
|
||
While it is true that many such virus programs as well as
|
||
hacker and "phone phreak" information is available on other
|
||
bulletin board systems, I am troubled that the Treasury
|
||
Department would play a role in disseminating such information
|
||
publicly, especially in light of the fact that viruses and
|
||
toll fraud together are estimated to inflict $4 to $6 Billion in
|
||
economic loss annually to U.S. consumers and industry. Such
|
||
dissemination goes well beyond any precautionary security measure the
|
||
Department might take in testing the integrity of its computer
|
||
systems.
|
||
|
||
Moreover, in a recent report to Congress, the General Accounting
|
||
Office (GAO) raised concerns that the Department's Treasury
|
||
Automated Auction Processing System (TAAPS) had "skipped certain
|
||
system development steps necessary to ensure that the risks
|
||
associated with building and operating a system are adequately
|
||
controlled" and may not achieve anticipated benefits such as
|
||
reducing auction processing time. Specifically, the GAO
|
||
|
||
The Honorable Lloyd Bentsen
|
||
July 6, 1993
|
||
Page 2
|
||
|
||
raised concerns about the fact that neither the Department nor
|
||
the Federal Reserve Bank of New York (FRBNY) -- which serves as
|
||
Treasury's agent in conducting the auctions -- had performed risk
|
||
analysis, documented detailed functional requirements, or tested
|
||
the TAAPS system thoroughly. In addition, GAO questioned whether
|
||
the system would reduce the time it takes Treasury to process
|
||
auctions and announce winners.
|
||
|
||
Treasury's willingness to disseminate data regarding computer
|
||
viruses and other hacker information is particularly troubling in
|
||
light of its failure to perform a full risk analysis of its
|
||
automated auction system. Any catastrophic failure of this
|
||
system, or branch of its security by computer hackers or viruses,
|
||
could have a serious adverse effect on the orderly functioning
|
||
of the secondary market for Treasury securities.
|
||
|
||
As the country embarks on plans to upgrade the national
|
||
telecommunications infrastructure over the next few years, data
|
||
and network security issues will increasingly need to be
|
||
addressed. To assist the subcommittee in its ongoing analysis of
|
||
these issues and its ongoing oversight and legislative
|
||
activities, please respond to the following questions by July 27,
|
||
1993:
|
||
|
||
1. Why was the Department's Automated Information System bulletin
|
||
board, where the virus codes were resident, advertised as "open
|
||
to the public" and the telephone number for the board made publicly
|
||
available through a listing in the Computer Underground Digest?
|
||
What was the rationale behind making such potentially harmful
|
||
information generally available?
|
||
|
||
2. Why were "dissected" viruses, which may be easily altered to
|
||
produce variations capable of eluding current virus detection
|
||
tools, also made publicly available?
|
||
|
||
3. Why were steps not taken to limit access to the bulletin board
|
||
services? For instance, why were steps not taken to limit or
|
||
effectively prohibit the ability of individuals to download
|
||
information off the bulletin board? Were passwords needed to
|
||
access data? If not, why not?
|
||
|
||
4. GAO reports that neither the Department nor the FRBNY
|
||
performed a risk assessment of TAAPS because "they believed the
|
||
Federal Reserve telecommunication and computer system selected
|
||
for the system is already safe and secure." GAO further reports that
|
||
shortly before issuance of its report, the FRBNY provided the GAO with a
|
||
"risk assessment" which "did not contain many of the key elements of a
|
||
risk assessment such as valuation of
|
||
|
||
The Honorable Lloyd Bentsen
|
||
July 6, 1993
|
||
Page 3
|
||
|
||
assets, probability of risk occurrance, and annualized loss
|
||
expectancy." In addition, the report "did not describe how risks would
|
||
be adequately controlled." Please provide responses to the following
|
||
questions:
|
||
|
||
<Eight questions on pages 3 and 4 of letter related to TAAPS deleted>
|
||
|
||
Thank you in advance for our time and attention in responding to this
|
||
request. If you have any questions, please have
|
||
your staff contact Jeff Duncan or Colin Crowell of the
|
||
Subcommittee staff at 226-2424.
|
||
|
||
Sincerely,
|
||
|
||
|
||
Edward J. Markey
|
||
Chairman
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 21 July 1993 22:51:01 EDT
|
||
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 6--Response to Rep. Markey's Letter
|
||
|
||
18 July, 1993
|
||
|
||
|
||
Representative Edward J. Markey
|
||
Chair, Subcommittee on Telecommunications and Finance
|
||
Committee on Energy and Commerce
|
||
U.S. House of Representatives
|
||
2133 Rayburn Building
|
||
Washington, DC 10515-2107
|
||
|
||
Dear Representative Markey:
|
||
|
||
I am writing in response to your letter of 6 July, 1993 to
|
||
Secretary of Treasury Lloyd Bentsen. In that letter, you
|
||
expressed concerns about available files on the AIS BBS, a
|
||
computer bulletin board run by the Department of Treasury's
|
||
Bureau of Public Debt. I am informed by Jeff Duncan, a staff
|
||
contact for questions regarding your letter, that the primary,
|
||
indeed the only, basis for your letter was an article authored
|
||
by Joel Garreau that appeared in the Washington Post on June 19,
|
||
1993. As we wrote in a recent issue of Cu Digest, the Post
|
||
article suffered from hyperbole and misinformation. It also
|
||
raised serious issues of journalistic ethics (See CuD 5.51).
|
||
Because Computer underground Digest (or CuD, of which I am
|
||
co-editor) is named in both the Post article and in your letter,
|
||
I feel compelled clarify several issues.
|
||
|
||
You pose several questions in your letter. The first, in which
|
||
you mentioned Cu Digest, states:
|
||
|
||
1. Why was the Department's Automated Information System
|
||
bulletin board, where the virus codes were resident,
|
||
advertised as "open to the public" and the telephone
|
||
number for the board made publicly available through a
|
||
listing in the Computer Underground <sic> Digest? What was
|
||
the rationale behind making such potentially harmful
|
||
information generally available?
|
||
|
||
As I am sure you are aware, there are many government BBSes open
|
||
to the public that provide access to files. I myself have used
|
||
several that have been invaluable in my work as a criminal
|
||
justice professional. The available resources, in the form of
|
||
software programs, text files, press releases, and a broad menu
|
||
of other services, vary. The available information on other
|
||
public government boards, which some might argue could help drug
|
||
dealers, fraud perpetrators, and others, is by some standards as
|
||
"sensitive" as the information to which you allude on the AIS
|
||
BBS. However, if one applies the same standards to these boards
|
||
as you would apply to the AIS BBS, questions of propriety of the
|
||
accessible information could be raised of all of them.
|
||
|
||
There is nothing unusual about an open and public BBS being run
|
||
by the government. What strikes me as unusual is to single out
|
||
one particular BBS and demand a justification for a common
|
||
practice. It should also be noted that at the time we wrote our
|
||
story on the AIS BBS (20 August, 1992, CuD #4.37/File 4), we
|
||
were impressed with the professionalism and competence by which
|
||
the board was run. At the time of our calls, users were required
|
||
to sign on, were not given immediate access (as they are to some
|
||
government boards, such as the Bureau of Justice Statistics'
|
||
BBS), and--contrary to some media reports--real names, not
|
||
"handles," were required.
|
||
|
||
Both the Post article and your letter indicate that AIS BBS
|
||
personnel "advertised" the board in CuD, and your letter demands
|
||
an explanation. However, contrary to the report in the
|
||
Washington Post and the wording of your letter, AIS BBS
|
||
personnel did not make the number available to CuD. Nor did AIS
|
||
BBS personnel solicit publicity or advertise that the board was
|
||
public. I came across the BBS through my professional
|
||
activities. Ironically, my initial interest in AIS BBS occurred
|
||
because of rumors that it was a U.S. Secret Service "sting"
|
||
operation created to identify and apprehend callers. After
|
||
calling the board, I found it potentially helpful in my own
|
||
sphere of academia, which includes computer
|
||
crime/security/culture, and I requested more information from
|
||
AIS BBS personnel. They agreed to a short interview. Had they
|
||
not agreed, we still would have run a story. In fact, had your
|
||
staff engaged in minimal research, the answers to the bulk of
|
||
the AIS-related questions you pose were published in CuD
|
||
#4.37/File 4.
|
||
|
||
It strikes me as odd that you would demand an accounting from a
|
||
government official explaining the motivation and content of a
|
||
media story that AIS BBS personnel did not initiate and over
|
||
which they had no control. This poses a chilling effect to free
|
||
speech by intimidating the legitimate flow of information and by
|
||
implicitly self-censoring journalists and others lest even an
|
||
innocent story have repercussions for the subordinates of
|
||
government officials who may not like what is written. An
|
||
example of this "chilling effect" in fact occurred with AIS BBS.
|
||
The apparent fear of repercussions for carrying so-called
|
||
"underground" electronic publications and other files, most of
|
||
which were of no value for criminal activity, but of
|
||
considerable value to computer professionals and scholars, were
|
||
removed. Cu Digest, classified as an "underground" publication
|
||
(presumably because of the name), was among them. When removal
|
||
of legitimate publications occurs because because of subtle
|
||
intimidation, valuable sources of information are lost through
|
||
informal (albeit "voluntary") censorship. Both the tone and
|
||
content of your letter contribute to this form of censorship.
|
||
The stigma attached to certain types of electronic messages,
|
||
created by an apparent lack of understanding of their content,
|
||
spills over into other forums and shapes policies, public
|
||
images, and law in ways that subvert freedom of speech in
|
||
electronic media.
|
||
|
||
Your letter also expresses concern for some of the files,
|
||
including virus source code, found on the AIS BBS. There is
|
||
considerable room for honest disagreement over the
|
||
"dangerousness" of such files. I tend to find the concern
|
||
grossly exaggerated. Yes, it is always possible for isolated
|
||
individuals to abuse information. However, if we are to stifle
|
||
the flow of information because of the excesses of the
|
||
occasional predator, then we ought also be concerned about
|
||
government-funded public libraries, computer science and other
|
||
courses in public institutions, and other sources of information
|
||
that might be twisted for the perverse ends of a rare
|
||
malcontent. There is considerable evidence that users of AIS BBS
|
||
found the available files to be significant in enhancing
|
||
computer security and performing other computer-related
|
||
functions. To assume that useful information in so-called
|
||
"underground" files ought be restricted because some may find
|
||
that information objectionable seems a dangerous precedent that
|
||
restricts freedom of speech and information flow in electronic
|
||
media. The intimidation created by the accusatory nature of your
|
||
letter suppresses both information and public dialogue of what
|
||
is or is not appropriate by imposing an arbitrary litmus test of
|
||
"correctness."
|
||
|
||
In sum, I am concerned about several issues raised by your
|
||
letter. First, your staff's understanding of AIS BBS and its
|
||
files seems partial. Basing an accusatory letter of inquiry on
|
||
an unchecked media source and linking disparate security issues
|
||
in the letter raises serious concerns about the credibility of
|
||
your staff's competency in matters of computer security and
|
||
technology. Your staff apparently did not do its homework.
|
||
|
||
Second, your letter seems to close off debate about the role of
|
||
the government in information dissemination, rather than invite
|
||
rigorous discussion of the issues. It assumes impropriety
|
||
rather than invite discussion about the role of government BBSes
|
||
and the nature of information that ought be made available to
|
||
the public.
|
||
|
||
Finally, your letter suggests that you extend to electronic
|
||
media a lower threshold of protection of information
|
||
dissemination than hardprint media, such as can be found in
|
||
libraries or government documents. Am I incorrect in inferring
|
||
from your letter that you do not extend to "cyberspace" the same
|
||
First Amendment and other protections granted print media?
|
||
|
||
As a taxpayer and as a criminal justice professional, I am
|
||
disturbed by the implications of your letter, and especially by
|
||
its failure to recognize the technological and social issues it
|
||
raises. In my opinion, by isolating and attacking AIS BBS for
|
||
carrying electronic versions of hardprint information available
|
||
through other government sources, you seem to be discriminating
|
||
against electronic media in general and AIS BBS in particular in
|
||
a way that potentially limits Constitutional rights in what is
|
||
known as "cyberspace." The underlying concerns you raise in your
|
||
letter are legitimate, but the implications of the manner in
|
||
which you raise them and the assumptions you appear to make may
|
||
have the unanticipated consequence of contributing to dangerous
|
||
precedents in the relationship between government control and
|
||
freedom of information.
|
||
|
||
|
||
Sincerely,
|
||
|
||
|
||
Jim Thomas, Professor
|
||
Sociology/Criminal Justice
|
||
Co-editor, Cu Digest
|
||
Northern Illinois University
|
||
DeKalb, IL 60115
|
||
Voice: (815) 756-3839 / Fax: (815) 753-6302
|
||
Internet: tk0jut1@mvs.cso.niu.edu / jthomas@well.sf.ca.us
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.57
|
||
************************************
|
||
|
||
|
||
|