818 lines
44 KiB
Plaintext
818 lines
44 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 3, Issue #3.22 (June 21, 1991) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / / Bob Kusumoto
|
||
ARCHMASTER: Brendan Kehoe
|
||
|
||
+++++ +++++ +++++ +++++ +++++
|
||
|
||
CONTENTS THIS ISSUE:
|
||
File 1: Moderators' Corner
|
||
File 2: From the Mailbag
|
||
File 3: Punishment and Control: Reply to Gene Spafford
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
CuD is available via electronic mail at no cost. Hard copies are available
|
||
through subscription or single issue requests for the costs of reproduction
|
||
and mailing.
|
||
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
Back issues of Computer Underground Digest on CompuServe can be found
|
||
in these forums:
|
||
IBMBBS, DL0 (new uploads) and DL4 (BBS Management)
|
||
LAWSIG, DL1 (Computer Law)
|
||
TELECOM, DL0 (New Uploads) and DL12 (Electronic Frontier)
|
||
Back issues are also available from:
|
||
GEnie, PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
||
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
|
||
(2) cudarch@chsun1.uchicago.edu;
|
||
(3) dagon.acc.stolaf.edu (130.71.192.18).
|
||
E-mail server: archive-server@chsun1.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission. It is assumed
|
||
that non-personal mail to the moderators may be reprinted unless
|
||
otherwise specified. Readers are encouraged to submit reasoned
|
||
articles relating to the Computer Underground. Articles are preferred
|
||
to short responses. Please avoid quoting previous posts unless
|
||
absolutely necessary.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Contributors assume all
|
||
responsibility for assuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
Date: 21 June, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.22: File 1 of 3: Moderators Corner ***
|
||
********************************************************************
|
||
|
||
+++++++++++++++++
|
||
Three LoD members form Comsec Data Security
|
||
+++++++++++++++++
|
||
|
||
Craig Neidorf sent over the following article announcing the formation
|
||
of a security company by three former members of the Legion of Doom.
|
||
The new company was not a sudden inspiration, but the result of
|
||
considerable research and groundwork prior to the announcement.
|
||
According to the partners, the Texas-based companies has already
|
||
landed several significant contracts. When asked why anybody should
|
||
hire ex-hackers, one commentator responded that security, like
|
||
hacking, is just another form of puzzle-solving, and those who can
|
||
find the holes are likely to those most-able to close them.
|
||
|
||
*****
|
||
|
||
From: TIME Magazine, June 24, 1991, page 13.
|
||
|
||
AFTER YOU'VE BEAT 'EM -- JOIN 'EM
|
||
|
||
After infiltrating some of America's most sensitive computer banks,
|
||
is there any challenge left for a digital desperado? Only to go legit,
|
||
say three former members of the notorious hacker group, the LEGION OF
|
||
DOOM, who have quit the outlaw game to start Comsec Data Security. The
|
||
Legionnaries claimed an 80% success rate in penetrating computer
|
||
networks, and now they want to teach private industry to protect itself
|
||
from the next generation of intruders. "You can't put a price tag on the
|
||
information we know," says Scott Chasin, a Comsec partner. But they'll
|
||
try.
|
||
|
||
(This article features a color photo of the three founding members:
|
||
Erik Bloodaxe, Doc Holiday, and Malefactor.)
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Various
|
||
Subject: From the Mailbag
|
||
Date: 21 June, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.22: File 2 of 3: From the Mailbag ***
|
||
********************************************************************
|
||
|
||
From: an288@CLEVELAND.FREENET.EDU(Mark Hittinger)
|
||
Subject: Elaboration and Response to Computer Computing
|
||
Date: Sun, 16 Jun 91 14:42:01 -0400
|
||
|
||
> These are D.W. James main points from his CuD 3.21 message:
|
||
|
||
1. College computing is still managed by centralized MIS, and in an
|
||
unfavorable manner. They aren't dead yet.
|
||
2. Centralized MIS has monopolistic control of the use of network
|
||
bandwidth.
|
||
3. College CC administrations dance to NSF's tune. (he who has the
|
||
gold ect)
|
||
4. Centralized MIS can arbitrarily stop something if it appears
|
||
questionable.
|
||
|
||
Mark's comment:
|
||
|
||
(A seasoned MIS type would put extra effort into quietly stopping
|
||
anything that a journalist or politician could construe as
|
||
questionable! People should not be surprised by this, it is a
|
||
standard reflex for a bureaucrat. I mentioned in my article that if
|
||
they could not cover up a hacking event that they would exaggerate it
|
||
instead. I know it is upsetting when something neat gets quietly
|
||
axed, however, think of the damage that is done when the
|
||
administrator is forced to exaggerate. They are forced because they
|
||
feel a need to protect their job and reputation. We shouldn't really
|
||
blame them too much, after all, it will be their red face on the TV
|
||
if something in their domain makes the news!)
|
||
|
||
Here is my response (related to my CuD 3.20 article - renaissance ect)
|
||
|
||
I could write another article on the network thing by itself. It is
|
||
true that computing administrations have moved towards selling
|
||
networking as opposed to computing. It is kind of like "Custer's last
|
||
stand" or should I say "job".
|
||
|
||
You know that the demand for bandwidth is growing at a rapid rate. It
|
||
is growing far faster than the budget money to fund it. What is the
|
||
result of these two factors? First, there are going to be more
|
||
network disappointments such as the one mentioned by D.W. James, that
|
||
is, the shutdown of various grey area network "services". Second, the
|
||
available bandwidth will soon be so clogged as to render the service
|
||
unusable. It is kind of like the old timesharing machines. No - I'm
|
||
not broadcasting a death-of-usenet or death-of-internet message. I'm
|
||
just saying that a squeeze is coming and it might be a good idea to
|
||
get out of the way. It is just a natural process that we've seen
|
||
before in the timesharing racket. People are transmitting images and
|
||
sound now! Its not just ASCII for breakfast any more! Were the
|
||
current production networks and hosts designed for this kind of thing?
|
||
Our desktop machines (and what we want to do with them) have already
|
||
outgrown yesterday's networks.
|
||
|
||
(So not only do we need a new multi-tasking DOS from Bill, and an
|
||
elegant new BOX from Ken, we need a new NET. I was quite pleased
|
||
with Apple's recent filing with the FCC for a personal radio net. Be
|
||
ready, they are heading in the right direction. Wouldn't it just
|
||
kill ya to see Apple make a bunch of money again?)
|
||
|
||
Technology can come to the rescue in networking too. It is just a
|
||
cost issue more than anything else. Centralized computing was created
|
||
when individuals could not afford computers. Centralized network
|
||
management exists because yesterday's networks are too expensive for
|
||
individuals to fund. Today there are alternatives to the network
|
||
supplied by your college. You can totally bypass these guys today!
|
||
It is just a matter of money and the costs are dropping like a rock.
|
||
D.W. James says that MIS isn't dead, however, I argue the clock is
|
||
sure ticking fast, and that was one of the points of my initial
|
||
article. The case for MIS survival is hopeless. The case for hackers
|
||
is that we'd better get busy thinking about what kind of 20 megabit
|
||
UHF cellular network software we'll need on our used 50 mip laptop.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: dalton.spence@CANREM.UUCP(Dalton Spence)
|
||
Subject: can it happen in canada?
|
||
Date: Wed, 5 Jun 1991 20:00:00 -0400
|
||
|
||
I am new to the electronic frontier, a greenhorn if you will. As a
|
||
programmer of midrange IBM systems (S/36 and AS/400) for many years, I
|
||
thought, sitting here in Canada, I was more objective about the events
|
||
of the last year than most Americans could be. After all, it wasn't
|
||
MY constitutional rights that had been threatened (YET). And since
|
||
most of my career has been spent working for small software companies,
|
||
the idea of unauthorized intruders in the systems I was working with
|
||
frightened and repelled me. Fortunately, so far the systems I have
|
||
worked on have been isolated from the outside world (much like I have
|
||
been), so hackers have not been a problem (YET).
|
||
|
||
However, I will not become TOO complacent, since the government of
|
||
Canada has a history of following the lead of the United States, even
|
||
when it would serve us better NOT to. I am worried that the recent
|
||
virus infestations of government computers, as described in the
|
||
attached article from "Toronto Computes!" magazine (June 3, Vol. 7,
|
||
#5, p. 3), may act as a catalyst for a crackdown on Canadian bulletin
|
||
boards. Which would be a shame, since I am just getting the hang of
|
||
using them.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
VIRUSES INFEST FEDERAL GOVERNMENT
|
||
|
||
By LAWRENCE BRUNER
|
||
|
||
Virus infection in computers is growing out of control. They're
|
||
doubling once every three months in the federal government, said a
|
||
source who asked not to be identified.
|
||
|
||
She said there have been about 30 cases of virus infection in the last
|
||
several months and there will probably be about 60 before the end of
|
||
summer.
|
||
|
||
"We have to do something about it and if we don't we'll be swamped,"
|
||
she said.
|
||
|
||
Viruses have occurred at the department of external affairs, the RCMP,
|
||
the Supreme Court and Atomic Energy of Canada Ltd. But the viruses
|
||
aren't concentrated in any departments or agencies, occurring randomly
|
||
throughout the government, she said.
|
||
|
||
The viruses range from merely annoying to very damaging. In the
|
||
annoying category is a virus that creates an on-screen ping pong ball
|
||
about the size of a cursor. The ball bounces up and down the screen,
|
||
but doesn't destroy any data. More damaging is the Stoned virus which
|
||
freezes the system and displays the message, "Your disk has been
|
||
stoned. Legalize marijuana."
|
||
|
||
In some cases the Stoned virus makes it impossible to reboot the
|
||
system without purging all the software and loading back-up programs.
|
||
Another virus called Dark Avenger destroys data. Most of the viruses
|
||
infiltrate the federal government when a civil servant gets software
|
||
from bulletin board systems.
|
||
|
||
"A civil servant might see some statistic or an article he needs on a
|
||
BBS and then downloads it," said the source. One of the viruses was
|
||
created by a 14-year-old boy living in Hull, Quebec, Ottawa's twin
|
||
city, but most originate in the United States. Viruses are doubling in
|
||
the U.S. government every two months, said the source.
|
||
|
||
"Things are bigger and better there, so more's happening. They have a
|
||
bigger population and access to more things."
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: "William Vajk (igloo)" <learn@GARGOYLE.UCHICAGO.EDU>
|
||
Date: Sun, 2 Jun 91 18:00:40 CDT
|
||
Subject: Punishment and Control: Reply to Gene Spafford
|
||
|
||
********************************************************************
|
||
*** CuD #3.22: File 3 of 3: Punishment and Control ***
|
||
********************************************************************
|
||
|
||
In CUD 3.14, Gene Spafford wrote:
|
||
|
||
> There is little doubt that law enforcement has sometimes been overzealous
|
||
> or based on ignorance. That is especially true as concerns computer-related
|
||
> crimes, although it is not unique to that arena.
|
||
|
||
I am concerned that while computer related interests isn't the only area in
|
||
which law enforcement has fallen so far short of the mark as to be noticeable,
|
||
it is the basis for one of the first relatively large scale interactions
|
||
between law enforcement and middle class. This is the reason for so many of us
|
||
noting cases which have acquired a notoriety exceeding past norms where the
|
||
investigation involved a lower class. Such treatments have been the usual fare
|
||
for the economically disadvantaged, sometimes those culturally distinct (see
|
||
the movie _Chinatown_ for an excellent example.) Complaints on their behalf
|
||
haven't been nearly as widespread in spite of the similarities of the behavior
|
||
by law enforcement. It isn't new. It is simply new to "us."
|
||
|
||
I have some serious reservations about the Chicago Police Department which
|
||
has declared war on "gangs." Possibly other such declarations have been
|
||
undertaken elsewhere as well. Just so we understand up front, I do not
|
||
condone criminal behavior. But my understandings of these events is confounded
|
||
by the difficulties I have in determining in advance of some criminal behavior
|
||
or another just what actually constitutes a gang. How does one determine what
|
||
is an Italian-American Sports Club, and which one is a sinister mob
|
||
organization. How does one differentiate a group of young men, wearing
|
||
identical attire while walking across town to play basketball in a park from
|
||
another group, walking about their turf, and the Boy Scouts.
|
||
|
||
A discussion I just had with the Public Relations officer at the Chicago
|
||
Police Department did little to help. The distinguishing characteristics
|
||
are looser and far more evasive than those mentioned by Pastor Niemoeller.
|
||
The PR officer told me they have something "better than an educated guess"
|
||
on which to base whether or not an individual or small group is gang related;
|
||
whether or not to question (should we call it harass) citizens within a
|
||
community. In the end, we are permitting the police to use personal judgment
|
||
in many ways. The personal judgment they have been using has now been brought
|
||
into play in middle class communities. Guess what. We're complaining about it.
|
||
|
||
I am concerned that Spafford's comments can be read to be forgiving and
|
||
conciliatory in nature where it regards errors made by professional law
|
||
enforcement. Officer Nemeth in California (see CUD 3.15) has said that he's
|
||
learning as he goes along. That's a hell of an answer to give some poor fellow
|
||
who was attempting to access a published bbs number after you've broken two of
|
||
his doors, confiscated his equipment, and subjected him to interrogation which
|
||
assumed guilt instead of trying to develop information in a reasonable manner
|
||
before using one of the most intrusive tactics permitted by law. There's an
|
||
entire mentality which we see exercised in the modern prototypical police
|
||
investigation. Officer Nemeth draws some conclusions of dubious worth even
|
||
after knowing the facts and that there will be no prosecution, "Hopson and the
|
||
other suspects should have given up after the first failed attempt" of trying
|
||
to gain access to a computer. "The laws are funny. You don't have to prove
|
||
malicious intent when you're talking about computer tampering. The first
|
||
attempt you might say was an honest mistake. More than that, you have to
|
||
wonder." ^^^^^^^^^ ^^^^^^^^^^^^^^
|
||
|
||
I suggest we put a rotary combination padlock on Nemeth's locker at work. Any
|
||
time he misses getting it on the first try, he takes the day off....at his
|
||
expense. But let's add a bit more realism. Someone should gently but
|
||
erratically shake his arm to emulate a bit of line noise.
|
||
|
||
The prosecutor in the case, Stephen Brown, didn't believe the police
|
||
overreacted in their investigation. "They had a legitimate concern." Is having
|
||
a legitimate concern reason to secure search warrants and damage property?
|
||
Aren't there any less intrusive investigatory techniques available? Of course
|
||
there are. The police didn't know where to begin their investigation of this
|
||
suspected criminal activity. I wasn't surprised at all to learn that PacBell
|
||
security knew. Given the involvement of yet another telephone company, is
|
||
the outcome, the overreaction, any surprise?????
|
||
|
||
We understand and feel compassion for one whose home has been violated by
|
||
burglars. Often we hear that they no longer feel comfortable in their own
|
||
home. Their inner feelings of security, something most of us take for granted,
|
||
have been damaged, sometimes irreparably. It is obvious in hindsight that
|
||
Nemeth's actions were unnecessary and counterproductive. I would not want him
|
||
on the local police force in my town. I am most concerned regarding his
|
||
ability to exercise judgment appropriate to the circumstances. But what is
|
||
worse by far is that some consider his investigative techniques acceptable.
|
||
|
||
N.B. Police brutality doesn't begin at the end of a
|
||
nightstick or hose. It begins with an attitude.
|
||
|
||
If you hire someone to write a bit of computer code for you which is to
|
||
perform some specific function, do you accept their learning to do that
|
||
task on the job and at your expense acceptable professionalism? I dare
|
||
say you wouldn't. Had you hired them with the understanding that they are
|
||
beginners and in training, then it would be considered acceptable.
|
||
|
||
Neither I nor any citizen in this nation has accepted the proviso that our
|
||
law enforcement agents are beginners learning the trade as they go along.
|
||
We demand the height of professionalism from them, each and every one. We
|
||
have granted them the extremes of the use of deadly force. I, for one, don't
|
||
take that lightly. I demand they be professionals and culpable for their
|
||
actions, whether working on my behalf or not. Spafford talks about
|
||
responsibility, let it begin with those who are PAID to be responsible and
|
||
have been evading that duty, manufacturers of software and law enforcement.
|
||
|
||
Who pays them to be responsible? We all do.
|
||
|
||
> Reporting of some of these incidents has also been incorrect.
|
||
|
||
Yes, Gene. In article 5462@accuvax.nwu.edu you misspoke and assisted
|
||
in proliferation of such incorrect reports :
|
||
|
||
"The information I have available from various sources
|
||
indicates that the investigation is continuing, others
|
||
are likely to be charged, and there MAY be some national
|
||
security aspects to parts of the discussion that have
|
||
yet to be disclosed."
|
||
|
||
Need I voice the obvious and ask how any "responsible" individual should
|
||
handle errors they have made? Need I voice the obvious and ask a simple
|
||
question. What has Gene Spafford done to correct errors he has made? Has
|
||
his behavior in these matters met the criteria for responsibility he demands
|
||
from others?
|
||
|
||
> Obviously, we all wish to act to prevent future such abuses,
|
||
> especially as they apply to computers.
|
||
|
||
'To thine own self be true' seems so appropriate right about here. Did you
|
||
wish to issue any corrections or retractions regarding some of your past
|
||
articles ?
|
||
|
||
> However, that being the case does not mean that everyone accused under
|
||
> the law is really innocent and the target of "political" persecution.
|
||
|
||
One of the elements common to propagandizing is to create a set of false issues
|
||
which sound like something your opposition might have said. In this instance,
|
||
I would appreciate most sincerely either having you repeat the source of such
|
||
a statement (by someone other than an obvious lunatic) in these newsgroups, or
|
||
to have you revise your statement into something more resembling the actual
|
||
circumstances.
|
||
|
||
> That is certainly not reality; in some cases the individuals charged
|
||
> are clearly at fault.
|
||
|
||
There are any number eventually found responsible and "at fault." I
|
||
haven't seen much mention made of them on the networks. See below for
|
||
one such case followed up. Is part of your problem, Gene, the fact that
|
||
we haven't been flogging dead horses on the net; the fact we haven't been
|
||
publishing news about those caught, prosecuted, and sentenced fairly? Given
|
||
another [name deleted] mentality I am certain we could find a volunteer.
|
||
|
||
> By representing all of them as innocents and victims, you further
|
||
> alienate the moderates who would otherwise be sympathetic to the
|
||
> underlying problems. By trying to represent every individual charged
|
||
> with computer abuse as an innocent victim, you are guilty of the same
|
||
> thing you condemn law enforcement of when they paint all "hackers" as
|
||
> criminals.
|
||
|
||
Really, this is a bit much. We presume innocence for all until they are
|
||
actually adjudged guilty. They are thus, at most, represented as suspects
|
||
until a verdict is handed down. But of course there are some folks who prejudge
|
||
the outcomes and place articles on the network explaining the involvements
|
||
of national security in the cases.........
|
||
|
||
Gaining momentum here, Gene? You laid the groundwork for a lie earlier,
|
||
in true propagandist style, and rush in for the kill in this paragraph.
|
||
Nowhere has anyone claimed every individual charged with computer abuse an
|
||
innocent victim. The other case of computer abuse in Naperville, Illinois
|
||
late last year had to do with an employee of Spiegel.
|
||
|
||
Michael H. Ferrell was charged with creating bogus invoices illegally
|
||
collecting sizable sums of money. He was also charged with authorizing
|
||
refunds to his credit cards using their cash registers. Although his scheme
|
||
resulted in a computer tampering charge (because it is a relatively new and
|
||
sexy action at the moment) he is more guilty in the ordinary sense of fraud
|
||
laws designed to protect against abuse of trust. Abbreviated charges (press
|
||
release) are available in CUD 3.00. He was found guilty (two of the charges
|
||
were nolle pros) and sentenced as follows :
|
||
|
||
24 months probation
|
||
|
||
240 hours of public service work
|
||
|
||
restitution of $30,861.85
|
||
|
||
periodic imprisonment (weekends) for 6 weekends. Two to be served immediately,
|
||
and four subject to future motion to vacate to be filed 2/26/1993.
|
||
|
||
Here's a guy who really stole something. Money, lots in fact.
|
||
|
||
> In particular, you portray Len Rose as an innocent whose life has been
|
||
> ruined through no fault of his own, and who did nothing to warrant
|
||
> Federal prosecution. That is clearly not the case. Len has acknowledged
|
||
> that he was in possession of, and trafficking in, source code he knew was
|
||
> proprietary.
|
||
|
||
I believe you would do well to look up the definition of the term (and
|
||
charge) of trafficking. There were no monetary considerations or agreements.
|
||
In fact, similar charges were brought against Neidorf. The fact that the case
|
||
was dropped precluded a proper addressing of such issues as exchange of
|
||
information (proprietary or not) without financial consideration. One of the
|
||
original charges brought against Len involved the retransmittal by Neidorf of
|
||
the same login.c program back to Len. Raises the same issue we are going to be
|
||
examining regarding Express Mail where the U.S. Postal Inspectors are arresting
|
||
recipients of packages known by the US Postal Service to contain contraband
|
||
and delivered in spite of that knowledge.
|
||
|
||
Such a distancing by investigative and prosecutorial powers from rationality
|
||
is quite troubling. If someone from LA were to express mail a reefer to
|
||
Spaf, we might all be reading about a faculty member at Purdue arrested for
|
||
possession of a controlled substance. Need we ask about the culpability of
|
||
the sender?
|
||
|
||
Many other questions also have not been answered because of Len's plea
|
||
bargain. It seems that AT&T source code (according to one of the Foley
|
||
affidavits) bears legends which claim both proprietary rights and a
|
||
copyright. You stipulate proprietary. The dual labeling of the original
|
||
software should do a lot to remove it from consideration as truly proprietary
|
||
information. The laws regarding copyrights require that all copyright material
|
||
is subject to deposit at the Library of Congress, where any citizen has a
|
||
right to read and review.
|
||
|
||
If this is the case, then possession is not illegal, because the text is
|
||
protected from commercial exploitation by the copyright laws and Len should
|
||
not have been charged with criminal. Copyright violation is a matter for civil
|
||
suit. If someone makes 1000 copies of your newly released book and sends it to
|
||
friends and associates, is it reasonable to expect a criminal prosecution by
|
||
the U. S. Government, or will your publisher be required to undertake a civil
|
||
suit for damages? Does it matter whether the copies are electronic or paper?
|
||
|
||
Furthermore, if he sends all 1000 copies across state lines in a single
|
||
package, has he violated federal laws regarding stolen goods valued
|
||
at over $ 5000? Each unit is valued at $29.95 by the publisher. Does the
|
||
fact that he sent 1000 copies individually packaged across state lines negate
|
||
that federal interest? And when one bears in mind that the laws were
|
||
originally aimed at automobiles, the connotation assumes tangible goods
|
||
of substantial value, not tidbits of some larger intellectual property
|
||
which may or might not withstand as yet unresolved testing for proprietary
|
||
status, notwithstanding questions regarding the cost/value haphazardly
|
||
assigned for the sake of federal prosecution. Login.c, a program of some
|
||
approximately 2000 lines of code, has a value in excess of $ 5000? Official
|
||
representatives of AT&T have made such representations. The individual making
|
||
such an assessment has obviously crossed to the other side of the looking
|
||
glass and is presently enjoying tea with Alice and the Mad Hatter. In the end,
|
||
of course, all the original charges were supplanted.
|
||
|
||
What would have happened had Len chosen to modify the login.c version which
|
||
was written by David Ihnat and placed in the public domain? Which laws would
|
||
then have been broken? The entire rationale supported by your article, Gene,
|
||
falls apart into itty bitty pieces. Poor judgment alone is not a violation of
|
||
any laws.
|
||
|
||
What would have happened if Len sent the modified AT&T login.c file across
|
||
state lines in 10 line increments, to be recombined at the receiving end?
|
||
The challenges many of us feel are appropriate to such understandings haven't
|
||
been possible to date.
|
||
|
||
And finally, although by no means of least importance, the entire business
|
||
of ownership of any single piece of AT&T software, whether source code
|
||
or binaries needs to be examined. The ONLY owner is AT&T. Everyone who pays
|
||
fees is licensed to use the software. Thus enters yet another dilemma.
|
||
Possession is not licensed. Can possession be criminalized? Given this view,
|
||
new questions arise. Use licensing concepts are not new nor are they unique.
|
||
|
||
> The login changes were the source of the fraud charge.
|
||
|
||
Perhaps you should reread the original 5 count indictment and examine the
|
||
genesis of the adjustments the government made to the charges in the year plus
|
||
from beginning to settlement. The government's actions aren't at all pretty.
|
||
To say the real source of all charges is itself suspect would be an
|
||
understatement. The government kept digging around and throwing stuff at the
|
||
ceiling till something kinda stuck. And here's Gene Spafford pointing his
|
||
finger saying "Aha!" Sure reminds me of Salem. In science, how one acquires
|
||
data is just as important as the data itself. This doesn't change when it
|
||
comes to human interactions and the law.
|
||
|
||
> It is certainly security-related, and the application of the law
|
||
> appears to be appropriate.
|
||
|
||
There was a recent post made to the network regarding a serious security
|
||
flaw in the Interactive port of Unix to the 80386 machine. The article
|
||
and all the pertinent information was posted from abroad. If one reads
|
||
the law to which you refer carefully, every system administrator whose system
|
||
forwarded or displayed that article is chargeable and could be found guilty
|
||
under the same law. Indeed, the author of the article probably could have
|
||
been arrested had it originated here in the United States.
|
||
|
||
The law is erroneous in intent and stupid. It represents a feeble attempt to
|
||
gloss over technological problems and solve them by social restrictions which
|
||
are known not to work. The only workable solutions lie within the technology
|
||
which contains the faults.
|
||
|
||
Admissions were made recently by AT&T regarding internal security. Several
|
||
appear in the May 13, 1991 issue of BellLabs News. The document is copyright
|
||
with all rights reserved so I won't quote from it. Bell Labs reports on a
|
||
study run of their own internal terminals. They discovered inadequate
|
||
protections exercised by employees affecting (infecting) about 15% of their
|
||
sample. This comes from a company which lays claims to closely guarded
|
||
proprietary software? I rather think that a false claim. I had a discussion
|
||
with a former AT&T employee. Given these circumstances, it wouldn't be at all
|
||
difficult for an ex employee (and there are plenty of them about now-a-days...
|
||
some apparently still angry at their former employer) to enter a facility, log
|
||
in to the internal networks, and purloin proprietary secrets.
|
||
|
||
Interestingly in the same issue is a discussion regarding the newer speed
|
||
at which software is now being developed. One of the features is the
|
||
reuse of software in segments. Perhaps something akin to production line
|
||
tactics, with interchangeable parts. Comes right back around once more to
|
||
there being but a single severely flawed Unix port for the 80386 CPU. If you
|
||
have a security problem for one product, you'll have the same flaw in all of
|
||
them. There are advantages and disadvantages to everything.
|
||
|
||
At the end of the included (CUD 3.14) article, Spafford discuss
|
||
responsibility. It isn't as though manufacturers of software have exercised
|
||
sufficient of the legally mandate "prudent man" behaviors when it comes to
|
||
generating or safeguarding data and code. Almost adult children regularly
|
||
access sensitive information in computers all over this country at will.
|
||
Care to draw a conclusion regarding efforts by the industry to protect their
|
||
information? There is a well known and established "attractive nuisance"
|
||
consideration in liability actions. Culpability is thus shared by the
|
||
careless. Historically courts have forgiven criminal trespass of juveniles
|
||
and sustained lawsuits and judgments against those who are careless with
|
||
things known to attract the juvenile mind. In all states it is a violation
|
||
of the law to leave ones keys in the ignition of an automobile. In some
|
||
states this provision is actually enforced with fines levied against
|
||
offenders.
|
||
|
||
> By the comments Len made in the code, he certainly knew what he was
|
||
> doing, and he knew how the code was likely to be used: certainly not
|
||
> as a security aid. As somebody with claimed expertise in Unix as a
|
||
> consultant, he surely knew the consequences of distributing this
|
||
> patched code.
|
||
|
||
I don't give a nit. You and I and anyone familiar with system administration
|
||
knows that it only takes moments to install a trap door if a reasonably
|
||
knowledgeable individual has access to root privileges. This permits
|
||
subsequent iterations of improvement, usually equally undetected. It doesn't
|
||
take a Len_Rose_Modified_Code to achieve such goals. The self-evident
|
||
question which arises out of reviewing the court documents relating
|
||
to Len Rose is simply "why did they prosecute him?" Reading it all and
|
||
understanding most of it, I still raise the question.
|
||
|
||
Other than an insult to AT&T's sensitivities, I don't understand all the
|
||
hoopla associated with a relatively uninspired piece of what might best be
|
||
called 'theftware.' It actually has about as much value in real terms as any
|
||
other trophy. It has to do with the memory of acquisition. The swordfish on
|
||
the wall it is hardly tradable, being of no worth to anyone other than the
|
||
individual who worked to acquire it.
|
||
|
||
I'm not responding to the balance of your "Len Rose is an idiot and a
|
||
criminal" tirade. You obviously do lack sufficient information to make the
|
||
caliber of judgments you've attempted. It would be interesting to know what
|
||
your reactions might be were to suddenly be privy to, at the very least, *all*
|
||
those documents which constitute the complete court record to date. They are
|
||
court records, and available. Would you undertake writing a computer related
|
||
article, perhaps about an operating system, with as little to back up your
|
||
opinions as you have regarding computer crimes?
|
||
|
||
Please note that my position in writing this article is not to support Len's
|
||
cause to the exclusion of harsh realities. My interest in undertaking this
|
||
discussion is directed towards promoting understanding of the irrationality of
|
||
governmental behavior in this period of relative conservatism. I believe the
|
||
pendulum is newly swung too far.
|
||
|
||
Gene, none of the issues you've been so freely spouting off about are as
|
||
simple and straightforward as you imply. There are basically two levels of
|
||
publicly available information. The first is press releases by law enforcement
|
||
personnel, the second is the somewhat more complete court record. I really
|
||
shouldn't have to point out that press releases by law enforcement have
|
||
historically been highly skewed. Anyone can go back to some case or another
|
||
which had a press release by the prosecutor, and then read what eventually
|
||
transpired in court. Even if the individual discussed was guilty, there is
|
||
invariably a wide gap between the realities of the case and the publicity
|
||
statements made by prosecutors. And if one has the chance to interview those
|
||
who were directly involved in the case (on both sides,) the conclusions tend
|
||
to deviate even further from the understandings promulgated by the press
|
||
releases originally issued by the prosecution.
|
||
|
||
I have many reservations about the way the prosecutions have been run,
|
||
evidence handled, and the incestuous relationships between plaintiff,
|
||
prosecutor, and expert witness. What, for example, isn't readily apparent
|
||
in the published and court records in the Naperville case is the simple fact
|
||
that that Interactive office might just as well be a department of the labs
|
||
across the street. This is the old Lachman Associates, captive contractor to
|
||
the labs. The very building occupied by Interactive is owned by Bell Labs,
|
||
Murray Hill. I didn't know that till I visited the Du Page County Tax
|
||
Collector's office (on a hunch.) The lab's grounds crews cross the street to
|
||
mow the lawns. Therefore the plaintiff is AT&T. Every witness, including
|
||
those expected to provide expert testimony on behalf of the government, are
|
||
AT&T dependents for their livelihood. Sort of like getting into a dispute
|
||
with a merchant in a town where you are the only outsider, and everyone else
|
||
involved has a familial relationship.
|
||
|
||
But let's look even a bit deeper. Len was hired at Interactive to be on
|
||
assignment across the street at the labs. Not only that, but he was
|
||
interviewed at the labs by lab personnel. He was hired and started work on a
|
||
Monday morning. Len was terminated on Friday morning. Friday afternoon, a man
|
||
we all have heard about and a seemingly wannabe Telco employee, Tim Foley of
|
||
the US Secret Service, arrived at at Len's apartment to question him and read
|
||
him a Miranda warning. On Monday, local authorities (the Naperville Police
|
||
Department with Foley's assistance) had secured a search warrant and an
|
||
arrest warrant. One of these days I'm going to ask the question why the motion
|
||
requesting AT&T assistance on the raid to search Len's Naperville apartment
|
||
was approved by a judge but was undated. It COULD be pure oversight, but
|
||
given the context of the rest of the story, everything has become highly
|
||
suspect. At best, it was a very very bad procedural error.
|
||
|
||
Len was incarcerated on $ 50,000 bond. Interesting fact in itself, as the
|
||
bond level for most local violent crimes is only about $ 10,000, to which bond
|
||
was reduced on request by Len's attorney a week later. Vengeance by a
|
||
prosecutor effectively under AT&T control, perhaps????
|
||
|
||
> I share a concern of many computer professionals about the application
|
||
> of law to computing, and the possible erosion of our freedoms.
|
||
> However, I also have a concern about the people who are attempting to
|
||
> abuse the electronic frontier and who are contributing to the decline
|
||
> in our freedoms.
|
||
|
||
Thus far, it seems most computer laws have been written at the behest of
|
||
special interests instead of the public interest. The laws already inflict
|
||
restrictions contrary to generally understood and accepted constitutional
|
||
provisions. It seems that at every turn where a serious conflict has taken
|
||
place and law enforcement became involved, the government has taken every
|
||
possible action to prevent the constitutional challenges which are important
|
||
to reforming and refining societal understandings of these issues.
|
||
|
||
> Trying to defend the abusers is likely to result in a loss of
|
||
> sympathy for the calls to protect the innocent, too.
|
||
|
||
I cannot understand how anyone can make such a statement with a straight
|
||
face. It is essential to our system of justice that even (especially)
|
||
the obviously guilty get a good defense. If I were witness to my father's
|
||
murder, I would demand the killer have a good defense team in spite of the
|
||
fact I would do all in my power to see the person convicted.
|
||
|
||
Our system of justice is far from perfect, but it sure beats the dickens
|
||
out of whatever might be considered second best. We're not going to be
|
||
able to maintain our relative fairness is we go about spiffing down the
|
||
defense to suit someone's set of prejudices. I am glad the American Nazi
|
||
Party has the right to march in Skokie, in spite of the fact I detest their
|
||
platform. So long as the worse of my enemies is treated fairly, there's a
|
||
chance I too will receive fair treatment.
|
||
|
||
> However, I certainly do not want to ask people to rally around
|
||
> the cases of Robert Morris or Len Rose as examples of government
|
||
> excess, because I don't think they were, and neither would a
|
||
> significant number of reasonable people who examine the cases.
|
||
|
||
I wonder if, upon reading the court documents in the Maryland case for Len
|
||
Rose, you would consider the motions filed by Carlos M. Recio on May 21, 1990
|
||
to be a reasonable understanding of the excesses exercised by the government.
|
||
|
||
Recio studied the case at that time and prepared, as Len's attorney, a
|
||
voicing of serious concerns regarding the validity of the search warrant
|
||
obtained by Foley et troupe. In fact, they exercised what we know as a
|
||
'general warrant.'
|
||
|
||
"They seized Len Rose's Army medals from the master bedroom which were
|
||
contained in a chest of drawers." It is clear they knew this seizure, as page
|
||
3 of the inventory spells out "Bag w/ Misc Papers + Army Commendation Medals."
|
||
Thus, it was no oversight or accident.
|
||
|
||
Recio continues:
|
||
|
||
"The SS searched through the Rose family photo albums, removing a picture of
|
||
Len Rose and several photographs of computer equipment that he had taken for
|
||
insurance purposes."
|
||
|
||
More evidence????? More excess?
|
||
|
||
"The SS seized the Rose family's files (mortgage, loans, credit card bills,
|
||
army records, marriage paperwork, diplomas, resumes', etc.)."
|
||
|
||
I can see it now. Len's marriage paperwork was potentially additional evidence
|
||
of criminality. Mortgage papers, more criminality....and so on with diplomas
|
||
and army records.
|
||
|
||
Please bear in mind that the basis for requesting a search warrant was to
|
||
determine whether or not Len Rose was indeed the individual known as
|
||
"terminus" and that he was indeed the individual who had transmitted the
|
||
login.c program to Neidorf. That was the crime for which the government
|
||
was seeking evidence. What is very clear in the record is that the government
|
||
did in fact embark on a witch hunt, overtly seizing all sorts of things totally
|
||
unrelated to their case, as in the colonial examples of general warrants,
|
||
attempting to build prosecutable offenses out of thin air.
|
||
|
||
It then became not "in the ordinary course" of an investigation that other
|
||
issues surfaced, but as a direct result of the violation by the government
|
||
of the very laws they are sworn to uphold.
|
||
|
||
The usual course for charges originating on such a basis is dismissal, because
|
||
it is not in the best interest of the citizens or the state to reward law
|
||
enforcement officers for violating the rights of the citizens in order to
|
||
build a case for prosecution. In scientific rationale, evolutionary aspects
|
||
eventually will soon resolve the issues. Law enforcement will learn to keep
|
||
within guidelines while improving their conviction statistics, and if the
|
||
criminal escape this time, and he repeats, it is likely he will be caught
|
||
and better prosecuted in the next instance (by that recently improved law
|
||
enforcement.) And if the criminal reforms as a result of the close call, of
|
||
what benefit is incarceration or punishment?
|
||
|
||
Excessive? Actually yes, Gene, it was quite excessive. Now, to substantiate
|
||
your claim, go find yourself a "significant" sized group of individuals
|
||
prepared to take the time to seriously examine the Rose case, and when they're
|
||
done, let's then compare results. In the meantime, if you really believe the
|
||
case is important enough to elicit your commentary, read the documents proper
|
||
and stop with reliance on second or third hand information.
|
||
|
||
Twice now, regarding the resultants of the E-911 case you've been long on
|
||
assumptions, short on proof. Twice now, regarding the resultants of the E-911
|
||
case you've been long on promises, short on results. Given this history, I
|
||
ask, would a "responsible" man now seek truth and publish it, or retire
|
||
from this discussion.
|
||
|
||
This article isn't so much a defense of Len Rose as it is an indictment of the
|
||
prosecutions. I also feel it is necessary to point out in no uncertain terms
|
||
that those who support law enforcement blindly do themselves and their
|
||
community a disservice. There is little doubt that many well intentioned
|
||
individuals serve us well in careers supporting the justice system. There
|
||
has been movement by all branches at the federal level of law enforcement to
|
||
assume guilt before investigation and to trample rights freely utilizing the
|
||
immunity originally granted in order to protect officers making honest mistakes
|
||
as a standard operating procedure instead of an exceptional circumstance.
|
||
|
||
The complaints on the net have, for the most part, been related to our own
|
||
back yard. Computers are the baby here. Yet overall we see the same sorts
|
||
of problems creeping into the justice system everywhere. Historically we have
|
||
written our laws in such ways as to empower law enforcement personnel to
|
||
capture criminals and bring them to trial while limiting offense to the
|
||
sensibilities of the general population. The diverse thresholds of offense we
|
||
have regarding police actions are based on our niche in society. Because I
|
||
have become more concerned regarding police officers questioning long haired
|
||
men at roadside, spread eagled against a rattletrap of a car, doesn't imply
|
||
that my niche has changed. It does show that along with many others the level
|
||
at which I take offense has changed with the incursion of similar tactics by
|
||
police into the middle class middle aged community, the community to which I
|
||
belong. The activities of this community haven't changed. The actions taken by
|
||
the police have. We note, sadly, that finding or creating of "probable cause"
|
||
is used to bring my neighbors personal and financial grief.
|
||
|
||
So beware, Gene Spafford. The past immunities offered by class and perhaps
|
||
occupation are doing nothing for us these days. Nor is it enough to be
|
||
squeaky clean. Nor is it enough to have the general appearance of being
|
||
squeaky clean. You are now required to preemptively make every law
|
||
enforcement officer whose path you cross believe you are squeaky clean. If you
|
||
fail, you won't go to jail (probably) nor will you be fined (probably.) But it
|
||
can cost a lot of money in legal defense to keep oneself out of jail and
|
||
to maintain a void criminal record.
|
||
|
||
Bill Vajk
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #3.22**
|
||
********************************************************************
|
||
|
||
|