911 lines
43 KiB
Plaintext
911 lines
43 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 3, Issue #3.24 (July 3, 1991) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
PHILEMEISTER: Bob Krause // VACATIONMEISTER: Bob Kusumoto
|
||
MEISTERMEISTER: Brendan Kehoe
|
||
|
||
+++++ +++++ +++++ +++++ +++++
|
||
|
||
CONTENTS THIS ISSUE:
|
||
File 1: From the Mailbag (Response to "Cyberpunk" definition)
|
||
File 2: Bill Vajk, Len Rose, Gene Spafford
|
||
File 3: Comsec Security Press Release
|
||
File 4: Comments on ComSec Data Security
|
||
File 5: Police Confiscations and Police Profit
|
||
File 6: House Crime Bill (1400) and its Threat to Modemers
|
||
File 7: Law Panel Recommends Computer Search Procedures
|
||
File 8: The CU in the News (data erasing; cellular fraud)
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
CuD is available via electronic mail at no cost. Hard copies are available
|
||
through subscription or single issue requests for the costs of reproduction
|
||
and mailing.
|
||
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
Back issues of Computer Underground Digest on CompuServe can be found
|
||
in these forums:
|
||
IBMBBS, DL0 (new uploads) and DL4 (BBS Management)
|
||
LAWSIG, DL1 (Computer Law)
|
||
TELECOM, DL0 (New Uploads) and DL12 (Electronic Frontier)
|
||
Back issues are also available from:
|
||
GEnie, PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
||
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
|
||
(2) cudarch@chsun1.uchicago.edu;
|
||
(3) dagon.acc.stolaf.edu (130.71.192.18).
|
||
E-mail server: archive-server@chsun1.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission. It is assumed
|
||
that non-personal mail to the moderators may be reprinted unless
|
||
otherwise specified. Readers are encouraged to submit reasoned
|
||
articles relating to the Computer Underground. Articles are preferred
|
||
to short responses. Please avoid quoting previous posts unless
|
||
absolutely necessary.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Contributors assume all
|
||
responsibility for assuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: July 3, 1991
|
||
From: Various
|
||
Subject: From the Mailbag (Response to "Cyberpunk" definition)
|
||
|
||
********************************************************************
|
||
*** CuD #3.24: File 1 of 8: From the Mailbag ***
|
||
********************************************************************
|
||
|
||
Date: Tue, 2 Jul 91 12:44:22 cdt
|
||
From: <accidentally garbled by editors>
|
||
Subject: Brad Hicks and Cyber Definitions
|
||
|
||
I commend Brad Hicks for his generally concise set of definitions of
|
||
definitions of computer underground types which make it clear that
|
||
there are many different motivations and categories. However, I would
|
||
modify his following definition:
|
||
|
||
> CYBERPUNK: (n) A cyberpunk is to hackers/phreaks/crackers/crashers
|
||
> what a terrorist is to a serial killer; someone who insists that their
|
||
> crimes are in the public interest and for the common good, a
|
||
> computerized "freedom fighter" if you will.
|
||
|
||
In the works of Bruce Sterling, William Gibson, and others, cyberpunks
|
||
are not terrorists in the conventional sense of the term, and the
|
||
analogy to serial killers strikes me as a bit extreme. Cyberpunks are
|
||
characterized by their resistance to oppressive authority (which makes
|
||
them a form of freedom fighter), but the resistance tends to be highly
|
||
individualistic. I wonder if cyberpunks might be based on the
|
||
anti-hero model of westerns (Shane) or earlier science fiction in
|
||
which the marginal but basically decent outsider steps in to use
|
||
marginal skills to save the town, country, or civilization?
|
||
|
||
I hope Mr. Hicks' comments generate some needed discussion along these
|
||
lines.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
Date: Tue, 2 Jul 91 14:34:38 edt
|
||
From: wex@PWS.BULL.COM
|
||
Subject: Cyberpunks (response to Brad Hicks in Cu Digest, #3.23)
|
||
|
||
Hicks' gratuitous slap at cyberpunks tacked on to the end of his
|
||
definitions of hackers, crackers and phreaks should not be allowed to
|
||
pass.
|
||
|
||
He refers to cyberpunks as being more extreme forms of the above, with
|
||
an added dash of morality. I'd love to know where he got this idea.
|
||
|
||
The cyberpunks I know are those who, as the word implies, have taken
|
||
the punk ethic of disrespect for authority (and often for self, even
|
||
to the point of nihilism) and applied it to the cyber world.
|
||
Cyberpunks are those who think that the street has its own uses for
|
||
technology (they're out there decoding the signals from Mattel
|
||
Powergloves). They think that corporations are often a bigger threat
|
||
than governments, though they dis both - sometimes to the point of
|
||
breaking laws.
|
||
|
||
The only freedom these people are interested in is the freedom to be
|
||
left alone, both physically and, in the data world, to be left out of
|
||
the ubiquitous info files being accumulated on us all.
|
||
|
||
This combination often leads to a "fuck you, jack" attitude, not the
|
||
platitudinous %%freedom fighter'' ethos Hicks talks about.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 24 Jun 91 23:58:37 EDT
|
||
From: Jerry Leichter <@mp.cs.niu.edu:leichter@LRW.COM>
|
||
Subject: Bill Vajk, Len Rose, Gene Spafford
|
||
|
||
********************************************************************
|
||
*** CuD #3.24: File 2 of 8: Vill Vajk, Len Rose, Gene Spafford ***
|
||
********************************************************************
|
||
|
||
In CuD 3.22, Bill Vajk writes an (overly long, repetitive) note in
|
||
response to an earlier note of Gene Spafford's. I don't want to go
|
||
into the details of everything he has to say; I'll make one comment on
|
||
fact, and another a general observation.
|
||
|
||
On fact: Vajk tries to attack the claim that Rose violated a trade
|
||
secret or copyright of AT&T's by saying that AT&T claims both trade
|
||
secret and copyright protection on the Unix source code, and they are
|
||
incompatible because copyright protection requires deposit of a copy
|
||
of the code with the Library of Congress, where the copy is available
|
||
freely to the public.
|
||
|
||
This is dead wrong. First of all, deposit is required within 3 months
|
||
of PUBLICATION; however, even unpublished material can be protected by
|
||
copyright, and AT&T can reasonably claim that they never published the
|
||
source code.
|
||
|
||
Second, there are exceptions to the requirements for deposit which
|
||
will usually cover software. In any case, as a matter of law, even if
|
||
the copyright owner disregards the deposit requirement, the copyright
|
||
remains enforceable (though the owner may be subject to fines or other
|
||
penalties.)
|
||
|
||
Third, even where deposit is required - as when one wishes to register
|
||
the copyright, a necessary first step in defending it in court - the
|
||
Copyright Office has recognized the issue of trade secrecy, and does
|
||
not require the entire program to be deposited. There are a couple of
|
||
choices - e.g., you can deposit the entire first and last 10 pages of
|
||
source code, or the first and last 25 pages with no more than half of
|
||
the text blacked out, etc. (Note: This is taken from a Notice of
|
||
Proposed Rulemaking issued in 1986, as quoted in a 1990 book.
|
||
Apparently it is the policy that is being followed, although it has
|
||
yet to be made completely official.)
|
||
|
||
Finally, while it is true that copyright infringement as such is not a
|
||
criminal matter, the copyright law does provide criminal penalties for
|
||
fraudulent copyright notices and false representation. Also, going
|
||
beyond copyrights as such, once a property right exists, it can be
|
||
stolen. Depending on the circumstances, the theft may or may not be a
|
||
criminal matter. If you leave your car at my service station for some
|
||
repair work and I start using it and refuse to return it, you can sue
|
||
me civilly for conversion; I am probably also guilty of auto theft.
|
||
Civil and criminal law are not necessarily mutually exclusive.
|
||
|
||
On philosophy: Vajk is right in commenting that some of the pain
|
||
people are feeling is from seeing the law applied to "nice middle
|
||
class white kids" in a way it is usually applied to poor black ones.
|
||
The fact of the matter is that, for the most part, the law leaves the
|
||
nice white middle class alone. Its instincts and modes of operation
|
||
are developed for a much rougher atmosphere, where a kid being
|
||
rousted, whether for good reasons or bad, is quite likely to be armed,
|
||
or at least potentially dangerous. Sure, a cracker - or a whitecolor
|
||
criminal - is unlikely to attack the police who've arrested him; but
|
||
policy says that those under arrest will be handcuffed, because it's
|
||
safer (for the police) that way, and their safety outweighs the
|
||
arrestee's dignity.
|
||
|
||
Presumption of innocence or no, the gut feeling that police,
|
||
prosecuters, and probably most defense attornies have is that those
|
||
arrested are probably guilty, if not of the particular offense
|
||
charged, then of SOME offense. Guilt and innocence are of much less
|
||
importance than making sure the legal rules are followed - and those
|
||
legal rules can and do play rough. Innocent or guilty, you DON'T want
|
||
to be caught up in the criminal justice system.
|
||
|
||
Vajk is incensed that police officers are "learning on the job" how to
|
||
deal with computers. In "To Engineer is Human", a wonderful book,
|
||
Henry Petrofsky points out that engineering never learns much from
|
||
successes, only from failures. The law acts the same way. It's not
|
||
only police officers and prosecutors and judges who are "learning on
|
||
the job"; it's the entire legal system. Much of the law is based on
|
||
precedent; before a precedent is established, there IS no settled law
|
||
in a particular area. Even law that is based on statute doesn't come
|
||
out of nowhere: Laws are usually drafted in response to perceived
|
||
problems. Only rarely are they anticipatory, and then they often turn
|
||
out to be wrong.
|
||
|
||
What we are seeing right now is the legal system learning what the
|
||
right way to deal with "computer crimes" is. It tried ignoring them;
|
||
that eventually proved unsatisfactory. Now it is reacting, and as is
|
||
to be expected, it is doing so by pushing as hard as it can. The
|
||
eventual boundaries of the law will be determined by the sum of the
|
||
various pushes - by overzealous prosecuters, by defense attornies, by
|
||
citizens enraged by computer crimes and citizens enraged by government
|
||
over-reaction. One way or the other, the Steve Jackson case will
|
||
establish some of the boundaries of search and seizure of computers.
|
||
Had the Neidorf case gone through a full trial, it might well have
|
||
established something about First Amendment protections for electronic
|
||
publication. As it is, it made the prosecuters look stupid and AT&T
|
||
look like liars. The next time around, a prosecuter will think twice
|
||
about putting his reputation on the line based on some unverifiable
|
||
AT&T claims. That, too, is part of the education of the legal system.
|
||
|
||
The courts deliberately avoid deciding issues until they are forced to
|
||
by actual cases. (There are some minor exceptions to this rule.) In
|
||
practice, this means that if you want to challenge, say, an abortion
|
||
law in court, you have to violate it - and be prepared to go to jail
|
||
(as many challengers did) if your challenge fails. This method has
|
||
worked reasonably well over hundreds of years, but it has the
|
||
unfortunate property that while the boundaries of the law are being
|
||
paved, some people will end up in the wrong place at the wrong time
|
||
and will end up being squashed by an on-coming steamroller. The
|
||
steamroller may have to roll back later, but that doesn't do the
|
||
flattened fellow much good.
|
||
|
||
So ... don't look at the current problems as a sign that the legal
|
||
system is incapable of dealing with computer and communication
|
||
technology. That's not at all what is going on. Within a couple of
|
||
years we'll be on pretty firm ground on these issues. The important
|
||
things to do now are (a) help provide pressure to push the law in the
|
||
right directions before it "sets"; (b) help support the relatively few
|
||
casualties of the process. I applaud EFF's efforts to do (a) (even if
|
||
I don't always agree with the particular positions they may choose to
|
||
take). As far as I can see, EFF isn't deliberately doing (b), though
|
||
that will be a side-effect of some of their other actions; but in
|
||
general (b) is more effectively done by concerned individuals in any
|
||
case.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: June 11, 1991
|
||
From: COMSEC Press Release
|
||
Subject: Comsec Security Press Release
|
||
|
||
********************************************************************
|
||
*** CuD #3.24: File 3 of 8: Comsec Security Press Release ***
|
||
********************************************************************
|
||
|
||
|
||
COMSEC PRESS RELEASE
|
||
|
||
June 11, 1991
|
||
|
||
For future release
|
||
|
||
Contact Scott Chasin or Chris Goggins
|
||
713-721-6500
|
||
|
||
Houston, TX, Comsec Data Security announced its entrance into the
|
||
field of computer security consulting. Comsec, comprised mainly of
|
||
the now defunct computer group "The Legion of Doom," plans to offer a
|
||
full-scale security package to private industry.
|
||
|
||
The firm's officers are Scott Chasin, Robert Cupps, Chris Goggins and
|
||
Ken Shulman. The three key computer specialists Chasin, Goggins and
|
||
Shulman, all ex-members of LOD, each have over eight years experience
|
||
dealing with computer security. Cupps, a graduate of Emory School of
|
||
Business and former securities trader, will operate as the firm's
|
||
administrative partner and concentrate on the firm's marketing
|
||
efforts.
|
||
|
||
Since it's formation in the summer of 1984, the Legion of Doom had
|
||
been the object of much controversy in the media. Often referred to
|
||
as "the most notorious hacker group in America," LOD underwent four
|
||
major reorganizations of members. Goggins, one of the original nine
|
||
founding members of the group said of the final reorganization, "we
|
||
were looking for individuals who had the skills and desire to move
|
||
the group specifically to this point.
|
||
|
||
"We feel that we are bringing a fresh approach to security consulting
|
||
in the corporate marketplace. We were all the cream of the crop of
|
||
the computer underground and know precisely how systems are
|
||
compromised and what actions to take to secure them," said Goggins.
|
||
In fact, the group feels its success rate in the area of system
|
||
penetration is 80 to 85 percent.
|
||
|
||
Comsec will offer security penetration testing and full auditing
|
||
services to corporate clients. In addition, the firm aims to endorse
|
||
a wide range of software and hardware security products. "Our firm
|
||
has taken a unique approach to its sales strategy and is confident
|
||
that contracts currently under negotiation will firm up within the
|
||
next 30 days," said Cupps.
|
||
|
||
Aware of the possible shockwave among the hacking underground over
|
||
this venture, the firm maintains that they are security consultants
|
||
and not informants or hacker-trackers. "We are not going to go after
|
||
people, we are going to ensure that no one, hacker or corporate spy,
|
||
can compromise the security of our clients computers," said Chasin.
|
||
|
||
Comsec is ready to assume normal operations and is looking to provide
|
||
the business community with a much needed service. Comsec is located
|
||
at 60 Braeswood Square, in Houston, Texas, and can be reached at
|
||
713-721-6500 or 713-683-5742 (A/ hrs).
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 25 Jun 91 14:12:25 EST
|
||
From: Gene Spafford <spaf@CS.PURDUE.EDU>
|
||
Subject: Comments on ComSec Data Security
|
||
|
||
********************************************************************
|
||
*** CuD #3.24: File 4 of 8: Comments on ComSec ***
|
||
********************************************************************
|
||
|
||
I have a quick comment on the report of the start-up of Comsec Data
|
||
Security. I have been quoted as asking people if they would hire a
|
||
confessed/convicted arsonist to install their fire alarm system when
|
||
talking about hiring "reformed" system crackers to do computer
|
||
security. Personally and professionally, I think it is a dangerous
|
||
decision from a business perspective and from a professional
|
||
perspective.
|
||
|
||
From a business perspective, you need to ask yourself the following
|
||
questions:
|
||
* If these guys know how to break through certain kinds of
|
||
security, does that prove they know how to make the security
|
||
better?
|
||
|
||
Using an analogy to start with, does someone who has experience
|
||
putting sugar in the gas tank know how to tune the engine? Or, more
|
||
closely, does someone who has shown expertise at stealing cars with
|
||
the keys left in the ignition know how to tell you something more
|
||
valuable than not to leave the keys in the ignition? They can guess
|
||
at telling you to leave the doors locked and windows rolled up. But
|
||
can they tell you about car alarms, various forms of
|
||
insurance, removable stereos, LoJac (sic?) tracers, cost/benefit of
|
||
using various other models of car, etc?
|
||
|
||
Likewise, with computer security, because some people have had good
|
||
luck breaking weak passwords and circumventing poorly-placed controls,
|
||
that does not make them experts in security. What do these guys know
|
||
about formal risk assessment models, information theoretical background
|
||
of ComSec evaluation, formal legal requirements for security, business
|
||
resumption planning, employee training, biometric systems, .....?
|
||
|
||
* How do you know they are reformed?
|
||
|
||
Just because they claim they have reformed and hang a shingle out,
|
||
does that mean they have *really* reformed? If your business presents
|
||
a very tempting target, how do you know they aren't casing the system
|
||
to make a single big haul and then skip town? How do you know they
|
||
aren't going to traffic info on your system with their friends? One
|
||
big haul and a quick trip to another country with no extradition, and
|
||
that's it.
|
||
|
||
The literature is full of instances where people with clean records
|
||
couldn't resist the temptation to take advantage of their access to
|
||
the system to make a quick buck. How much more can you trust people
|
||
who have already shown they aren't particularly interested in niceties
|
||
of the law and ethics?
|
||
|
||
Ask the folks at SRI if hiring "reformed" crackers/phreakers is
|
||
ultimately a sound business decision....
|
||
|
||
* Can you be sure if these guys find some of their former
|
||
associates playing with your system, they will act in your best
|
||
interests?
|
||
|
||
This is a standard problem in a new realm -- will these guys really
|
||
turn in their former buddies if they find that they have penetrated a
|
||
client's system?
|
||
|
||
* If they miss a problem, or cause a problem, will your business
|
||
insurance pay off? Will you be immune from prosecution or
|
||
stock-holder's lawsuits?
|
||
|
||
These guys and others like them have a checkered history. Hiring them
|
||
to protect your systems against loss could be grounds for negligence
|
||
suits in the case of loss, or be sufficient to cause non-payment of
|
||
insurance policies. In the case of various state & federal laws, you
|
||
might be responsible for not showing a concerted effort to really
|
||
protect your data.
|
||
|
||
Are these guys bondable? If so, for how much? Can they receive
|
||
security clearances?
|
||
|
||
The decision is also a bad one professionally. What kind of statement
|
||
does hiring these guys send to the rest of the world? It says "Gee,
|
||
build up some experience hacking into other people's (or our ) systems
|
||
without permission, and we'll give you a job!"
|
||
|
||
That's a bad statement to make.
|
||
|
||
Furthermore, it says to the true professionals in the field, the
|
||
people who study the material, act professionally and ethically their
|
||
whole careers, and who make every attempt to be responsible: "We will
|
||
hire people who behave improperly instead; your training is equivalent
|
||
(or less than) experience gained from acting unethically."
|
||
|
||
That is a worse statement to make. Most of the professionals in the
|
||
field could easily break in to business systems because of lax
|
||
security, but would never dream of doing so. To prefer confessed
|
||
crackers over honorable professionals is quite an insult.
|
||
|
||
As a professional, I would refuse to do business with firms who hire
|
||
these guys as security consultants. They show surprisingly poor
|
||
business sense, and an (indirect) contempt for the people who work
|
||
hard and *ethically* their whole careers.
|
||
|
||
Note that I'm not stating that these three, in particular, are less
|
||
than honorable now or will commit any crimes in the future. I'm
|
||
stating that, in the general case, such "reformed" individuals are a
|
||
very poor choice for security consulting. Neither am I making the
|
||
statement (incorrectly attributed to me in CACM a year ago) that
|
||
people like these three should never be employed in computing-related
|
||
jobs. I am disturbed, however, that they would be hired *because*
|
||
of their unethical and illegal behavior-past.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: June 30, 1991
|
||
From: Moderators
|
||
Subject: Police Confiscations and Police Profit
|
||
|
||
********************************************************************
|
||
*** CuD #3.24: File 5 of 8: Police Confiscations and Profit ***
|
||
********************************************************************
|
||
|
||
The policy of indiscriminant confiscation of computer property in
|
||
search and seizure operations has drawn criticism. The roots of the
|
||
policy stem from RICO and anti-drug enforcement policies. A recent
|
||
article in _Law Enforcement News_ suggests that the police may be
|
||
significant beneficiaries of seized assets when they are "donated" to
|
||
the seizing agency. This creates the risk of police expansion of the
|
||
(ab)use of seizure power by providing an incentive to increase the
|
||
stockpiles of "forfeited" assets. The risky logic might run something
|
||
like this: "Our agency is need, so if we seize enough assets that we
|
||
can use, we can meet our needs." Although the seizure of assets in
|
||
drug raids far exceeds seizures in computer raids, the danger remains
|
||
the same: There is incentive for police to confiscate as much as they
|
||
can if they will be the ultimate recipients. Two blurbs from _Law
|
||
Enforcement News_ (April 30, 1991, p. 1, "Seized-asset funds prove
|
||
tempting") underscore this point.
|
||
|
||
One article subhead, "Mass. city seeks drug funds to avert layoffs of
|
||
officers," begins:
|
||
|
||
"The Mayor of a Massachusetts city says revenue shortfalls
|
||
are forcing him to lay off police officers, and he believes
|
||
he has a temporary solution to the bind: using forfeited
|
||
assets and cash from drug busts to forestall layoffs or
|
||
rehire furloughed officers."
|
||
|
||
According to the article, Somerville Mayoer Michael Capuano
|
||
introduced a petition to the Massachusetts Legislation in April to
|
||
allow police agencies to use funds for personnel. Fund are currently
|
||
restricted to drug enforcement expenditures.
|
||
|
||
A second subhead, "Illinois audit eyes using funds to upgrade
|
||
police wardrobe," indicates that:
|
||
|
||
"The Illinois State Police spent $408,000 in seized drug
|
||
assets to buy new uniforms--in an apparent violation of
|
||
provisions of the state's asset-forfeiture laws--but State
|
||
Police officials defended the purchase on the grounds that
|
||
the money was spent before an amendment went into effect
|
||
last year to require that such funds be spent only for drug
|
||
enforcement."
|
||
|
||
Liberal interpretation of law, expansion of policies intended for one
|
||
type of crime (drugs) to other types of crime (e.g., computers), and
|
||
the possibility that those who do the seizing have the most to gain by
|
||
incentives that reward more seizures, poses a threat to Constitutional
|
||
protections against deprivation of property. Given the erosion of
|
||
First and Fourth Amendment protections in a variety of areas, the
|
||
broader definitions of "criminal behavior" related to computer
|
||
behavior, and the sweeping scope of equipment eligible for seizure in
|
||
computer cases, expanding the profit motive for law enforcement
|
||
agencies strikes us as a continuation of the danger trend of "Big
|
||
Brotherism."
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: June 30, 1991
|
||
From: Moderators
|
||
Subject: House Crime Bill (1400) and its Threat to Modemers
|
||
|
||
********************************************************************
|
||
*** CuD #3.24: File 6 of 8: Threat of HR 1400 to Modemers ***
|
||
********************************************************************
|
||
|
||
Why should modemers be concerned about the Bush "war on crime?"
|
||
Proposed anti-crime legislation could, if passed, increase the risk
|
||
of intrusion of government into the lives of law-abiding citizens.
|
||
Among the provisions of HR 1400 (_The Comprehensive Violent Crime
|
||
Control Act of 1991_) is a change in 18 USSC (sect) 2709 that expands
|
||
the power of the FBI to intrude into the privacy of citizens. An
|
||
article in _First Principles_ (June, 1991, p. 6) describes the
|
||
proposed revision this way:
|
||
|
||
"Sections 743 and 744 %of HR 1400% would grant the FBI
|
||
authority to obtain subscriber information on persons with
|
||
nonpublished telephone numbers, as well as credit records,
|
||
simply by certifying in writing to the telephone company
|
||
or credit bureau that such information is relevant to an
|
||
authorized foreign counterintelligence investigation. The
|
||
proposals would seriously erode current privacy protections
|
||
by giving the FBI authority to obtain these records without
|
||
a subpoena or court order and without notice to the
|
||
individuals that their records have been obtained by
|
||
the bureau."
|
||
|
||
%/%/%/%/%/%/%/%/%/%/%/%/Current law%/%%/%/%/%/%/%/%/%/%/%/%/%
|
||
|
||
CHAPTER 121. STORED WIRE AND ELECTRONIC COMMUNICATIONS AND
|
||
TRANSACTIONAL RECORDS ACCESS
|
||
|
||
s 2709. Counterintelligence access to telephone toll and
|
||
transactional records
|
||
|
||
(a) Duty to provide. A wire or electronic communication service
|
||
provider shall comply with a request for subscriber information and
|
||
toll billing records information, or electronic communication
|
||
transactional records in its custody or possession made by the
|
||
Director of the Federal Bureau of Investigation under subsection
|
||
(b) of this section.
|
||
|
||
(b) Required certification. The Director of the Federal Bureau of
|
||
Investigation (or an individual within the Federal Bureau of
|
||
Investigation designated for this purpose by the Director) may
|
||
request any such information and records if the Director (or the
|
||
Director's designee) certifies in writing to the wire or electronic
|
||
communication service provider to which the request is made that
|
||
|
||
(1) the information sought is relevant to an authorized foreign
|
||
counterintelligence investigation; and
|
||
|
||
(2) there are specific and articulable facts giving reason to
|
||
believe that the person or entity to whom the information sought
|
||
pertains is a foreign power or an agent of a foreign power as
|
||
defined in section 101 of the Foreign Intelligence Surveillance Act
|
||
of 1978 (50 U.S.C. 1801).
|
||
|
||
(c) Prohibition of certain disclosure. No wire or electronic
|
||
communication service provider, or officer, employee, or agent
|
||
thereof, shall disclose to any person that the Federal Bureau of
|
||
Investigation has sought or obtained access to information or
|
||
records under this section.
|
||
|
||
(d) Dissemination by bureau. The Federal Bureau of Investigation
|
||
may disseminate information and records obtained under this section
|
||
only as provided in guidelines approved by the Attorney General for
|
||
foreign intelligence collection and foreign counterintelligence
|
||
investigations conducted by the Federal Bureau of Investigation,
|
||
and, with respect to dissemination to an agency of the United
|
||
States, only if such information is clearly relevant to the
|
||
authorized responsibilities of such agency.
|
||
|
||
(e) Requirement that certain Congressional bodies be informed. On
|
||
a semiannual basis the Director of the Federal Bureau of
|
||
Investigation shall fully inform the Permanent Select Committee on
|
||
Intelligence of the House of Representatives and the Select
|
||
Committee on Intelligence of the Senate concerning all requests
|
||
made under subsection (b) of this section.
|
||
|
||
|
||
%/%/%/%/%/%/%/%/%/%/%/%proposed law%/%/%/%/%/%/%/%/%/%/%/%/%
|
||
|
||
|
||
SEC. 743. COUNTERINTELLIGENCE ACCESS TO TELEPHONE RECORDS.
|
||
|
||
Section 2709 of title 18 of the United States Code is amended by-
|
||
|
||
(1) striking out subsections (b) and (c); and
|
||
|
||
(2) inserting the following new subsections (b) and (c):
|
||
|
||
"(b) REQUIRED CERTIFICATION.-The Director of the Federal Bureau of
|
||
|
||
Investigation (or an individual within the Federal Bureau of
|
||
|
||
Investigation designated for this purpose by the Director) may:
|
||
|
||
"(1) request any such information and records if the Director (or
|
||
|
||
the Director's designee) certifies in writing to the wire or
|
||
|
||
electronic communication service provider to which the request is
|
||
|
||
made that-
|
||
|
||
"(A) the information sought is relevant to an authorized
|
||
|
||
foreign counterintelligence investigation; and
|
||
|
||
"(B) there are specific and articulable facts giving reason to
|
||
|
||
believe that the person or entity about whom information is
|
||
|
||
sought is a foreign power or an agent of a foreign power as
|
||
|
||
defined in section 101 of the Foreign Intelligence Surveillance
|
||
|
||
Act of 1978 (50 U.S.C. 1801);
|
||
|
||
"(2) request subscriber information regarding a person or entity if
|
||
|
||
the Director (or the Director's designee certifies in writing to the
|
||
|
||
wire or electronic communications service provider to which the
|
||
|
||
request is made that-
|
||
|
||
"(A) the information sought is relevant to an authorized
|
||
|
||
foreign counterintelligence investigation; and
|
||
|
||
"(B) that information available to the FBI indicates there is
|
||
|
||
reason to believe that communication facilities registered in the
|
||
|
||
name of the person or entity have been used, through the services
|
||
|
||
of such provider, in communication with a foreign power or an
|
||
|
||
agent of a foreign power as defined in section 101 of the Foreign
|
||
|
||
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).
|
||
|
||
"(c) PENALTY FOR DISCLOSURE.-No wire or electronic communication
|
||
|
||
service provider, or officer, employee, or agent thereof, shall disclose
|
||
|
||
to any person that the Federal Bureau of Investigation has sought or
|
||
|
||
obtained access to information under this section. A knowing violation of
|
||
|
||
this section is punishable as a class A misdemeanor.".
|
||
|
||
/%/%/%/%/%//%//%the end/%/%/%/%/%/%/%/%/%/%//%
|
||
|
||
David Cole (_The Nation_, May 6, 1991, "The Secret Tribunal", p. 581)
|
||
describes aspects of the Crime Bill as a return to the seventeenth
|
||
century Star Chamber. We agree with his concern that the expanded
|
||
interpretation of the word "terrorism" creates new categories of
|
||
people vulnerable to investigation--not on the basis of what they have
|
||
done--but rather on the basis of who they may have associated with.
|
||
Although looking at a different, but related, provision of the Bill,
|
||
Cole's warning is sound: The current crime Bill contains changes that
|
||
expand the power of government to curtail fundamental rights. In
|
||
cloaking the rationale and the language in fears of terrorism,
|
||
something most rationale people oppose, the Bill, if passed, reduces
|
||
jeopardizes a broader number of law-abiding citizens to intrusion and
|
||
potential harm by zealous law enforcement agents, and makes it a crime
|
||
for other citizens to warn innocent folk of their vulnerability.
|
||
Secret police tactics are not the way to create a safe society in
|
||
a Constitutional democracy.
|
||
|
||
Questions about HR1400 can be directed to Ted Vandermede, staff attorney
|
||
for the House Criminal Justice subcommittee, at (202) 225-0600.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: July 2, 1991
|
||
From: Barbara E. McMullen and John F. McMullen (Newsbytes Reprint)
|
||
Subject: Law Panel Recommends Computer Search Procedures
|
||
|
||
********************************************************************
|
||
*** CuD #3.24: File 7 of 8: Law Panel and Search Procedures ***
|
||
********************************************************************
|
||
|
||
LAW PANEL RECOMMENDS COMPUTER SEARCH PROCEDURES
|
||
|
||
WASHINGTON, D.C., U.S.A., 1991 JULY 2 (NB) -- A panel of lawyers and
|
||
civil libertarians, meeting at the Computer Professionals for Social
|
||
Responsibility (CPSR) Washington roundtable, "Civilizing Cyberspace",
|
||
have proposed procedures for police searches and seizures which they
|
||
feel will both allow adequate investigations and protect the
|
||
constitutional rights of the subject of the investigation.
|
||
|
||
The panel, composed of Mike Godwin, staff counsel of Electronic
|
||
Frontier Foundation; Sharon Beckman attorney with Silverglate &
|
||
Good; David Sobel of CPSR, Jane Macht, attorney with Catterton, Kemp
|
||
and Mason; and Anne Branscomb of Harvard University, based its
|
||
proposals on the assumption that a person, in his use of computer
|
||
equipment, has protection under both the Fourth Amendment and the
|
||
free speech and association provisions of the first amendment.
|
||
|
||
The panel first addressed the requirements for a specific warrant
|
||
authorizing the search and recommended that the following guidelines
|
||
be observed:
|
||
|
||
1. The warrant must contain facts establishing probable cause to
|
||
believe that evidence of a particular crime or crimes will be found
|
||
in the computers or disks sought to be searched.
|
||
|
||
2. The warrant must describe with particularity both the data to be
|
||
seized and the place where it is to be found ("with particularity" is
|
||
underlined).
|
||
|
||
3. The search warrant must be executed so as to minimize the
|
||
intrusion of privacy, speech and association.
|
||
|
||
4. Officers may search for and seize only the data, software, and
|
||
equipment specified in the warrant.
|
||
|
||
5. The search should be conducted on-site.
|
||
|
||
6. Officers must employ available technology to minimize the
|
||
intrusive of data searches.
|
||
|
||
The panel then recommended limitations on the ability of officials to
|
||
actually seize equipment by recommending that "Officers may not seize
|
||
hardware unless there is probable cause to believe that the computer
|
||
is used primarily as an instrumentality of a crime or is the fruit of
|
||
a crime; or the hardware is unique and required to read the data; or
|
||
examination of hardware is otherwise required." The panel further
|
||
recommended that, in the event hardware or an original and only copy
|
||
of data has been seized, an adversary post-seizure hearing be held
|
||
before a judge within 72 hours of the seizure.
|
||
|
||
Panel member Sharon Beckman commented to Newsbytes on the
|
||
recommendations, saying "It is important that we move now to the
|
||
implementation of these guidelines. They may be implemented either by
|
||
the agencies themselves through self-regulation or through case law
|
||
or legislation. It would be a good thing for the agencies t o take
|
||
the initiative."
|
||
|
||
The panels recommendations come at a time in which procedures used in
|
||
computer investigations have come under criticism from computer and
|
||
civil liberties groups. The seizure of equipment by the United Secret
|
||
Service from Steve Jackson Games has become the subject of litigation
|
||
while the holding of equipment belonging to New York hacker "Phiber
|
||
Optic" for more than a year before his indictment has prompted calls
|
||
from law enforcement personnel as well as civil liberties for better
|
||
procedures and technologies.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: July 3, 1991
|
||
From: Various
|
||
Subject: The CU in the News (data erasing; cellular fraud)
|
||
|
||
********************************************************************
|
||
*** CuD #3.24: File 8 of 8: The CU in the News ***
|
||
********************************************************************
|
||
|
||
From: <garbled>
|
||
Subject: Ex-employee Attacks Data-base
|
||
Date: Thu, 27 Jun 91 17:19:23 CDT
|
||
|
||
"Ex-Employee Guilty of Erasing Data"
|
||
By Joseph Sjostrom
|
||
CHICAGO TRIBUNE, June 27, 1991, Section 2, p. 2
|
||
|
||
A computer technician pleaded guilty Wednesday in Du Page County Court
|
||
to erasing portions of his former employer's database last November in
|
||
anger over the firing of his girlfriend.
|
||
|
||
Robert J. Stone, 30, of 505 W. Front St., Wheaton, entered the plea on
|
||
a charge of computer fraud to Associate Judge Ronald Mehling. In
|
||
exchange for the guilty plea, prosecutors dismissed a burglary charge.
|
||
Mehling scheduled sentencing for Aug. 8.
|
||
|
||
Defense lawyer Craig Randall said after the hearing that Stone still
|
||
has a 30-day appeal period during which he can seek to withdraw the
|
||
guilty plea.
|
||
|
||
"I don't think he erased anything as alleged, and I don't think the
|
||
%prosecution% would be able to prove that he did," Randall said.
|
||
|
||
Stone was indicted last January for one count of burglary and one
|
||
count of computer fraud for entering the office of his former
|
||
employer, RJN Environmental, 202 W. Front St., Wheaton, and deleting
|
||
eight programs from the company computer.
|
||
|
||
Assistant Du Page County State's Atty. David Bayer, who prosecuted the
|
||
case along with Assistant State's Atty. Brian Ruxton, said the progams
|
||
were part of a company project for the state of Florida in which RJN
|
||
was, in effect, redrawing maps in digital form and storing them in a
|
||
computer.
|
||
|
||
Bayer said Stone had left the company the previous April and that his
|
||
girlfriend, who was not identified, worked there too but was fired in
|
||
November.
|
||
|
||
Bayer said Stone entered the firm's office last Nov. 24, a Saturday
|
||
when nobody else was there.
|
||
|
||
Employees who came to work on Sunday discovered that data had been
|
||
erased and a quantity of data storage disks were missing.
|
||
|
||
Bayer said the disks contained several months' worth of work, but were
|
||
recovered. It took about a week to restore the rest of the missing
|
||
computer information, Bayer said.
|
||
|
||
Bayer said Wheaton police Detective Kenneth Watt interviewed Stone the
|
||
following Monday, and said Stone admitted to erasing data and taking
|
||
the disks. Bayer said Stone told the detective where to find the disks,
|
||
which he had left under a stairwell at RJN.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
Date: Tue, Jul 2, 1991 (22:30)
|
||
From: Barbara E. McMullen and John F. McMullen (Newsbytes Reprint)
|
||
Subject: Arrests in "Multi-Million" Cellular Phone Fraud
|
||
|
||
****ARRESTS IN "MULTI-MILLION" CELLULAR PHONE FRAUD 07/01/91
|
||
|
||
ALBANY, NEW YORK U.S.A., 1991 JUL 1 (NB) -- The New York State Attorney
|
||
General's office has announced the arrest and arraignment of four individuals
|
||
for allegedly illegally utilizing Metro One's cellular service for
|
||
calls totalling in excess of $1 million per month.
|
||
|
||
According to the charges, the arrested individuals duplicated a Metro
|
||
One customer's electronic serial number (ESN) -- the serial number
|
||
that facilitates customer billing -- and installed the chip in a
|
||
number of cellular phones. Th defendants then allegedly installed the
|
||
phones in cars which they parked in a location near a Metro One cell
|
||
site in the Elmhurst section of Queens in New York City.
|
||
|
||
From these cars, the defendants allegedly sold long distance service
|
||
to individuals, typically charging $10 for a 20 minute call. Metro
|
||
One told investigators that many of the calls were made to South
|
||
American locations an that its records indicate that more than $1
|
||
million worth of calls were made in this manner in May 1991.
|
||
|
||
The arrests were made by a joint law enforcement force composed of
|
||
investigators from The New York State Police, New York City Police
|
||
Special Frauds Squad, United States Service, and New York State
|
||
Attorney General's office. The arrests were made after undercover
|
||
officers, posing as customers, made phone calls from the cellular
|
||
phones to out-of-state locations. The arrests were, according to a
|
||
release from the Attorney General's office, the culmination of an
|
||
investigation begun in September 1990 as the result of complaints
|
||
from Metro One.
|
||
|
||
The defendants, Carlos Portilla, 29, of Woodside, NY; Wilson
|
||
Villfane, 33, of Jackson Heights, NY; Jaime Renjio-Alvarez, 29, of
|
||
Jackson Heights, NY and Carlos Cardona, 40, of Jackson Heights, NY,
|
||
were charged with computer tampering in the first degree and
|
||
falsifying business records in the first degree, both Class E
|
||
felonies,- and theft of services, a Class A misdemeanor.
|
||
Additionally, Portilla and Villfane were charged were possession of
|
||
burglar tools, also a Class A misdemeanor. At the arraignment,
|
||
Portilla and Renjio-Alvarez pleaded guilty to computer tampering and
|
||
the additional charges against those individuals were dropped.
|
||
|
||
New York State Police Senior Investigator Donald Delaney, commenting
|
||
on the case to Newsbytes, said "This arrest is but the tip of the
|
||
iceberg. There is an on-going investigation in the area of cellular
|
||
phone fraud and we are looking for those that are organizing this
|
||
type of criminal activity."
|
||
|
||
(Barbara E. McMullen & John F. McMullen/Press Contact: Edward
|
||
Barbini, NYS Department of Law, 518-473-5525/19910701)
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #3.24**
|
||
********************************************************************
|
||
|
||
|
||
|