834 lines
42 KiB
Plaintext
834 lines
42 KiB
Plaintext
|
||
|
||
Computer Underground Digest--Fri Aug 16, 1991 (Vol #3.30)
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
||
CONTENTS, #3.30 (AUGUST 16, 1991)
|
||
Subject: File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford)
|
||
Subject: File 2--Review of "Practical Unix Security" (Garfinkel & Spafford).
|
||
Subject: File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint)
|
||
Subject: File 4--Mystery Lurks In The Death of INSLAW Reporter
|
||
|
||
ARCHIVIST: BRENDAN KEHOE
|
||
RESIDENT CONVALESCENT: BOB KUSUMOTO
|
||
ULTRA-SCANMEISTER: BOB KRAUSE
|
||
|
||
CuD is available via electronic mail at no cost. Printed copies are
|
||
available by subscription. Single copies are available for the costs
|
||
of reproduction and mailing.
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu,
|
||
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Wed, 14 Aug 1991 11:22:00 CDT
|
||
From: "Jim Thomas" <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford)
|
||
|
||
Review of: _Practical UNIX Security_, by Simson Garfinkel and
|
||
Gene Spafford. Sebastopol, (Calif): O'Reilly & Associates, Inc.
|
||
481 pp. $29.95 pb.
|
||
|
||
Because I know virtually nothing about UNIX, I am eminently qualified
|
||
to comment on the Garfinkel/Spafford (G&S) volume. If I can understand
|
||
and learn from it, anybody can. I have no idea whether UNIX Whizzes
|
||
will find the tome worthwhile, but as a UNIX beginner, I judge the
|
||
book a first-rate primer for inquisitive, but uninformed, neophytes.
|
||
|
||
To label the G&S book a "security" manual is misleading. Their
|
||
introductory warning to would-be hackers who would interpret the book
|
||
as in invitation to break into the authors' systems is perhaps a bit
|
||
melodramatic (p. xxvii), but the book is about security as M*A*S*H is
|
||
about war. I suspect system administrators, such as the following
|
||
reviewer who is plagued by the screw-ups of folks like me who learn by
|
||
punching in commands to see what they do--would hope users read _UNIX
|
||
Security_ on the chance it would make them (the users, not the
|
||
sysads) better citizens and cause them (the sysads, not the users)
|
||
less hassle in answering obvious questions.
|
||
|
||
I'd guess that most users do not learn UNIX by taking classes, but
|
||
rather by trial and error, pestering the pros, and maybe even
|
||
purchasing a book or two. Unlike the detailed "how to" books, such as
|
||
_UNIX Made Easy_ (an oxymoronic title) that cover a wide range of UNIX
|
||
uses and commands from programming to learning the intricacies of vi,
|
||
_UNIX Security_ is more basic, focused, and appropriate for the UNIX
|
||
newnicks. Despite the focus on security, the book's emphasis is on
|
||
responsible system use by teaching, step-by-step, those aspects of use
|
||
at which security requisites arise. Such lessons obviously require an
|
||
overview of the basics, which the authors provide.
|
||
|
||
They begin with an overview of the history of UNIX dating from the
|
||
Mid-1960s with Multics to the rewriting and playful renaming of
|
||
Multics to UNIX derived from the fact that Multics tried to to
|
||
multiple things, and UNIX just one: Run programs (p. 7). But, the
|
||
openness and ease of UNIX also had a major drawback: The early
|
||
versions were not secure. Many of the original problems were the
|
||
result of holes in the software itself, but--and the authors stress
|
||
this throughout--the most serious security lapses are the result of
|
||
human error or indifference.
|
||
|
||
Cracking into any system in most cases requires access to an account
|
||
and then using that account to penetrate deeper by using various
|
||
tricks to obtain root privileges. As a consequence, the first line of
|
||
defense, argue the authors, is to assure that unauthorized logins are
|
||
prevented. There is little new for sysads in the book's first
|
||
substantive chapter, "Users, Groups, and the Superuser." But the new
|
||
user will find this explanation, along with the various charts
|
||
clarifying what all those symbols mean when we list the /etc/group
|
||
file, quite helpful. Subsequent chapters explaining files, defending
|
||
accounts, and securing data provide useful examples that can serve as
|
||
exercises for the beginner in ferreting out the complexity of UNIX as
|
||
well as for protecting one's own account against intruders. What for
|
||
experienced users might seem mundane serves newer users with ways to
|
||
develop and test knowledge of *one's own* account. The periodic
|
||
distinctions between legitimate curious use and inappropriate abuse
|
||
provide guidelines that encourage exploration while reminding the user
|
||
of the courtesies owed to the sysads and others.
|
||
|
||
For those active on the nets, a five chapter section on modems, UUCP,
|
||
Networks and Security, Sun's NFS, and other topics condenses much of
|
||
Quarterman's $50 _The Matrix_ into a few comprehensible chapters.
|
||
Although intended more for those setting up systems than using them,
|
||
the discussion illustrates what occurs when we dial into a UNIX system
|
||
and summarizes various operations of remote systems, including sending
|
||
mail and file transfer. I found that the general discussion helped
|
||
clarify the occasional error message and helps to use other systems
|
||
more efficiently, ranging from moving around within them to using ftp
|
||
and telnet.
|
||
|
||
Sysads may find little new in the discussion of what to do when a
|
||
breakin occurs, but the step-by step procedures might serve as a
|
||
mindful checklist. The cardinal rules--"don't panic" and "document"
|
||
are sound for all computer users when they suspect intrusion, and
|
||
inexperienced users should find the discussion helpful in reviewing
|
||
how systems track and identify other users.
|
||
|
||
Although most users do not encrypt files and know nothing about the
|
||
process, the early discussion of the process (pp 29-31) provides an
|
||
understandable overview of what encryption is and how it works. With
|
||
increasing emphasis on secure systems, discussions of encryption also
|
||
increase, and even for those of us who are functionally illiterate, it
|
||
helps to know what salt is and what it does to our password. Chapter
|
||
18 is devoted to a more detailed summary of encryption systems,
|
||
including ROT13 and crypt.
|
||
|
||
The chapter on "Computer Security and U.S. Law" is too brief. G&S
|
||
explain the legal options for prosecution and remind readers of the
|
||
hazards of criminal prosecution, which include law enforcement
|
||
illiteracy, the problems of search warrants, and the dangers of
|
||
equipment seized as evidence. Alluding to the experience of Steve
|
||
Jackson Games, where law enforcement seizure of equipment and a
|
||
pre-publication version of a new game had led to a suit against
|
||
Federal and private sector personnel, G&S warn employeers whose
|
||
employees--or they themselves--may have equipment taken by law
|
||
enforcement of their right to receipts and of the need to discuss the
|
||
conditions of return.
|
||
|
||
The section on law (p. 349) lists the laws likely to be used in
|
||
prosecuting computer intrustion along with a few word summary of the
|
||
violation each law represents. Because even the most recent laws tend
|
||
to be overly-broad and vague, the section on "Federal computer crime
|
||
laws" could have been expanded to include a discussion of the problems
|
||
of legal language and give a better summary of the relevant language
|
||
of each. It is also a bit disturbing that the chapters seems to
|
||
advocate (despite the caveats) prosecution in favor of other, less
|
||
punitive but equally effective, actions. My bias as an advocate of
|
||
decriminalization of many types of crimes and as a believer in
|
||
reducing, rather than increasing, the burden of the criminal justice
|
||
system led to me quibble, perhaps unduly, with what is otherwise a
|
||
well-summarized chapter. But, especially for students (who constitute
|
||
the bulk of the "hacker" population), there are numerous non-legal
|
||
options available, and to my mind there should have been greater
|
||
emphasis on elaborating the non-legal responses available and even
|
||
suggesting some new ones.
|
||
|
||
There is one irony in the G&S volume. Take the various chapters,
|
||
retitle them as "how to break into..." or "UNIX cryptography" and
|
||
rewrite the text in cyberese, then publish them in PHRACK or LoD/TJ,
|
||
and add at the end of each the caution "Don't get caught with this,"
|
||
and you might have law enforcement breathing down your neck. G&S have
|
||
written--albeit more articulately and with more detail and insight--on
|
||
the kinds of topics with similar examples to those found in some of
|
||
the better p/h newsletters. Proving, perhaps, that form can be more
|
||
important as content.
|
||
|
||
My goal here has been to suggest for the non-UNIX expert why they wold
|
||
find _Practical UNIX Security_ worth reading. Despite the title and
|
||
the authors' professed goal, is crammed with information on all phases
|
||
of UNIX use and with tips for utilizing the system's power. Those who
|
||
read and experiment with the volume are likely to become better system
|
||
and net citizens, both because of their knowledge and proficiency and
|
||
because of the socialization process entailed by practicing what the
|
||
authors teach us. It is well worth the price.
|
||
|
||
((Jim Thomas is CuD co-editor and trying to learn UNIX after
|
||
9 years on an IBM mainframe))
|
||
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 14 Aug 1991 11:22:00 CDT
|
||
From: Neil Rickert <rickert@CS.NIU.EDU>
|
||
Subject: File 2--Review of "Practical Unix Security" (Garfinkel & Spafford).
|
||
|
||
Following on the heals of the development of the microprocesor, the
|
||
last decade has seen an explosion of computers. However the expertise
|
||
to administer these computers has not grown at anything like the same
|
||
pace. The result is that there are large numbers of computers
|
||
administered by people who are seriously short of experience. Worse
|
||
still many of these computers are connected to Internet, readily
|
||
exposing them to would be electronic intruders.
|
||
|
||
Unix systems have particularly flexible networking facilities, but
|
||
while these provide great benefits to the Unix user, they also provide
|
||
portholes through which breakins can be attempted.
|
||
|
||
In the circumstances "Practical Unix Security" is a very timely
|
||
publication.
|
||
|
||
This is a book for all Unix admins, not just those concerned about
|
||
security. If you have a Unix work station on your desktop, and if you
|
||
are the sole user, and it not connected to any networks, you perhaps
|
||
have little to worry about in terms of security. But you can still
|
||
benefit greatly from reading "Practical Unix Security". For this is
|
||
not just a book about security. It also covers many aspects of
|
||
administering Unix systems. Indeed, it fills in many of the gaps left
|
||
by the system administration books that you will find in the Unix
|
||
section of your bookstore.
|
||
|
||
Doubtless the book will also be of interest to Unix detractors who
|
||
will welcome the opportunity to gloat at some of the security problems
|
||
in Unix. But while they are gloating, they should perhaps look more
|
||
closely at their own systems for problems which may be lurking just
|
||
below the surface, less well known perhaps, because their systems lack
|
||
the openness of Unix.
|
||
|
||
If you are looking for a specific list of steps to break into a Unix
|
||
system, this is not the book for you. The author's are quite careful
|
||
on this point. They do, however, give a guided tour through the
|
||
system indicating the points of weakness, and suggesting how to
|
||
configure your system to minimize the security problems. The book
|
||
covers passwords, file permissions and the use of umask, the risk of
|
||
trojan horses and selecting a PATH which reduces the risk, SUID and
|
||
SGID programs, logging activity, configuring UUCP to minimize security
|
||
problems, networking cautions including cautions on the use of NFS and
|
||
NIS services. It discusses Kerberos, SunOS secure rpc, and firewall
|
||
arrangements, as ways of enhancing security.
|
||
|
||
Some time is spent on discussing good system backup plans. A good
|
||
backup strategy can be important if your system security is broken,
|
||
for it allows you to recover any damaged files. But, more important,
|
||
it also provides recovery from the acts of incredible stupidity to
|
||
which even the most experienced computer administrators are
|
||
occasionally prone.
|
||
|
||
Security is not a technical problem, and the authors are careful to
|
||
point this out. It is a people problem. Technological fixes by
|
||
themselves don't work. If, for example, you impose a system of
|
||
machine generated passwords, this may create passwords that users can
|
||
not remember, causing them to write the passwords down on paper with a
|
||
net loss in security. There is always a tradeoff between security and
|
||
convenience. Some of the stricter security measures may generate
|
||
sufficient inconvenience that users will unthinkingly develop ways of
|
||
subverting the security mechanisms. Still, there is no excuse for
|
||
vendors favoring convenience to the extent that they sell systems with
|
||
virtually no security. Perhaps one of the most serious of these is
|
||
distribution of default configurations with a '+' in /etc/hosts.equiv
|
||
. The authors do not mince words on page 238, where they state "This
|
||
is a major security hole" and on the next page "If you have a plus
|
||
sign in your host.equiv (sic) file, REMOVE IT."
|
||
|
||
Any book this length is bound to contain a few mistakes. "Practical
|
||
Unix Security" is no exception. Here are some examples:
|
||
|
||
p. 54 The su command only changes your process's effective UID; the real
|
||
UID remains the same.
|
||
|
||
That sounds to me like a badly broken implementation of su.
|
||
|
||
p. 92 Letting a user run the Berkeley mail(1) program without logging in is
|
||
dangerous, because the mail program allows the user to run any command
|
||
by preceding a line of the mail message with a tilde and an
|
||
exclamation mark.
|
||
|
||
While I agree with the authors that it would be unwise, the risk is
|
||
not as obvious as they assert. When a user attempts such a shell
|
||
escape, 'mail' implements it by invoking the user's login shell. If,
|
||
as in this example, the login shell is 'mail', then the tilde escape
|
||
to execute say 'csh' would result in 'mail' attempting to execute
|
||
'/usr/ucb/mail -c csh', and that would not get you very far.
|
||
|
||
p. 218 Your mail system should not allow mail to be sent directly to a file.
|
||
Mailers that deliver directly to files can be used to corrupt system
|
||
databases or application programs. You can test whether or not your
|
||
system allows mail to be sent to a file with the command sequence:
|
||
|
||
mail /tmp/mailbug
|
||
this is a mailbug file test
|
||
^D
|
||
|
||
If the file mailbug appears in the /tmp directory, then your mailer is
|
||
insecure.
|
||
|
||
This is not a good test to try. If 'mail /tmp/mailbug < message-file'
|
||
happens to work, it doesn't do anything more dangerous than say
|
||
'cat >> /tmp/mailbug < message-file'. There is only a problem if you can
|
||
persuade 'mail' to write to a file you would not otherwise be able to
|
||
write to, or to create a file with permissions and ownership you could
|
||
not normally use. If, for example, your 'mail' program were to
|
||
directly handle mail to files, and pass all other mail off to
|
||
'sendmail', this would not be a security problem at all unless your
|
||
mail program runs suid or sgid.
|
||
|
||
+++++
|
||
|
||
These examples are really only minor failings. But they do have the
|
||
effect of making the inexperienced reader believe that Unix security
|
||
is much weaker than in reality it is. This will tend to make
|
||
inexperienced admins unnecessarily paranoid, and perhaps afraid to do
|
||
anything useful with their system.
|
||
|
||
My major criticism of this book, in fact, is that it seems to present
|
||
an excessively paranoid view of the subject. The authors make an
|
||
attempt to avoid this very early, when they discuss risk assessment,
|
||
and point at that you need not go overboard, but should provide
|
||
sufficient security for the likely risk given the nature of the data
|
||
on your computer and the way it is used.
|
||
|
||
Unfortunately, the author's seem to lose sight of this later on when
|
||
they are busily pointing out the likely weaknesses, and how to protect
|
||
against them. Experienced administrators will have no trouble
|
||
deciding how much security they need, and balancing this with the
|
||
convenience they wish to provide to their users. But I worry that
|
||
novice administrators will not be able to make this judgement. They
|
||
may either overreact, and be so restrictive that their system is not
|
||
as useful as it should be, or they may decide that achieving
|
||
reasonable security is hopeless, and not even take the simplest steps
|
||
which are often the most important.
|
||
|
||
In summary, I recommend this book for every Unix administrator and
|
||
would-be administrator, not just for the security information, but for
|
||
the insight it gives into the workings of Unix. But I hope the reader
|
||
will keep in mind that the authors have made things sound scarier than
|
||
they really are.
|
||
|
||
((Neil Rickert, a professor of computer science, is the sysad of
|
||
the UNIX system at Northern Illinois University)).
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 28 Jul 1991 10:15:13 CDT
|
||
From: elrose@well.sf.ca.us
|
||
Subject: File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint)
|
||
|
||
((Moderator's note: The following first appeared in Boardwatch, and
|
||
later was sent across the nets by the author. We reprint it as part
|
||
of the on-going discussion about life in cyberspace)).
|
||
|
||
Cyberspace and the Legal Matrix: Laws or Confusion?
|
||
((By Lance Rose))
|
||
|
||
Cyberspace, the "digital world", is emerging as a global arena of
|
||
social, commercial and political relations. By "Cyberspace", I mean
|
||
the sum total of all electronic messaging and information systems,
|
||
including BBS's, commercial data services, research data networks,
|
||
electronic publishing, networks and network nodes, e-mail systems,
|
||
electronic data interchange systems, and electronic funds transfer
|
||
systems.
|
||
|
||
Many like to view life in the electronic networks as a "new frontier",
|
||
and in certain ways that remains true. Nonetheless, people remain
|
||
people, even behind the high tech shimmer. Not surprisingly, a vast
|
||
matrix of laws and regulations has trailed people right into
|
||
cyberspace.
|
||
|
||
Most of these laws are still under construction for the new electronic
|
||
environment. Nobody is quite sure of exactly how they actually apply
|
||
to electronic network situations. Nonetheless, the major subjects of
|
||
legal concern can now be mapped out fairly well, which we will do in
|
||
this section of the article. In the second section, we will look at
|
||
some of the ways in which the old laws have trouble fitting together
|
||
in cyberspace, and suggest general directions for improvement.
|
||
|
||
LAWS ON PARADE
|
||
|
||
- Privacy laws. These include the federal Electronic Communications
|
||
Privacy Act ("ECPA"), originally enacted in response to Watergate, and
|
||
which now prohibits many electronic variations on wiretapping by both
|
||
government and private parties. There are also many other federal and
|
||
state privacy laws and, of course, Constitutional protections against
|
||
unreasonable search and seizure.
|
||
|
||
- 1st Amendment. The Constitutional rights to freedom of speech and
|
||
freedom of the press apply fully to electronic messaging operations of
|
||
all kinds.
|
||
|
||
- Criminal laws. There are two major kinds of criminal laws. First,
|
||
the "substantive" laws that define and outlaw certain activities.
|
||
These include computer-specific laws, like the Computer Fraud and
|
||
Abuse Act and Counterfeit Access Device Act on the federal level, and
|
||
many computer crime laws on the state level. Many criminal laws not
|
||
specific to "computer crime" can also apply in a network context,
|
||
including laws against stealing credit card codes, laws against
|
||
obscenity, wire fraud laws, RICO, drug laws, gambling laws, etc.
|
||
|
||
The other major set of legal rules, "procedural" rules, puts limits on
|
||
law enforcement activities. These are found both in statutes, and in
|
||
rulings of the Supreme Court and other high courts on the permissible
|
||
conduct of government agents. Such rules include the ECPA, which
|
||
prohibits wiretapping without a proper warrant; and federal and state
|
||
rules and laws spelling out warrant requirements, arrest requirements,
|
||
and evidence seizure and retention requirements.
|
||
|
||
- Copyrights. Much of the material found in on-line systems and in
|
||
networks is copyrightable, including text files, image files, audio
|
||
files, and software.
|
||
|
||
- Moral Rights. Closely related to copyrights, they include the
|
||
rights of paternity (choosing to have your name associated or not
|
||
associated with your "work") and integrity (the right not to have your
|
||
"work" altered or mutilated). These rights are brand new in U.S. law
|
||
(they originated in Europe), and their shape in electronic networks
|
||
will not be settled for quite a while.
|
||
|
||
- Trademarks. Anything used as a "brand name" in a network context
|
||
can be a trademark. This includes all BBS names, and names for
|
||
on-line services of all kinds. Materials other than names might also
|
||
be protected under trademark law as "trade dress": distinctive sign-on
|
||
screen displays for BBS's, the recurring visual motifs used throughout
|
||
videotext services, etc.
|
||
|
||
- Right of Publicity. Similar to trademarks, it gives people the
|
||
right to stop others from using their name to make money. Someone
|
||
with a famous on-line name or handle has a property right in that
|
||
name.
|
||
|
||
- Confidential Information. Information that is held in secrecy by
|
||
the owner, transferred only under non-disclosure agreements, and
|
||
preferably handled only in encrypted form, can be owned as a trade
|
||
secret or other confidential property. This type of legal protection
|
||
is used as a means of asserting ownership in confidential databases,
|
||
from mailing lists to industrial research.
|
||
|
||
- Contracts. Contracts account for as much of the regulation of
|
||
network operations as all of the other laws put together.
|
||
|
||
The contract between an on-line service user and the service provider
|
||
is the basic source of rights between them. You can use contracts to
|
||
create new rights, and to alter or surrender your existing rights
|
||
under state and federal laws.
|
||
|
||
For example, if a bulletin board system operator "censors" a user by
|
||
removing a public posting, that user will have a hard time showing his
|
||
freedom of speech was violated. Private system operators are not
|
||
subject to the First Amendment (which is focused on government, not
|
||
private, action). However, the user may have rights to prevent
|
||
censorship under his direct contract with the BBS or system operators.
|
||
|
||
You can use contracts to create entire on-line legal regimes. For
|
||
example, banks use contracts to create private electronic funds
|
||
transfer networks, with sets of rules that apply only within those
|
||
networks. These rules specify on a global level which activities are
|
||
permitted and which are not, the terms of access to nearby systems and
|
||
(sometimes) to remote systems, and how to resolve problems between
|
||
network members.
|
||
|
||
Beyond the basic contract between system and user, there are many
|
||
other contracts made on-line. These include the services you find in
|
||
a CompuServe, GEnie or Prodigy, such as stock quote services, airline
|
||
reservation services, trademark search services, and on-line stores.
|
||
They also include user-to-user contracts formed through e-mail. In
|
||
fact, there is a billion-dollar "industry" referred to as "EDI" (for
|
||
Electronic Data Interchange), in which companies exchange purchase
|
||
orders for goods and services directly via computers and computer
|
||
networks.
|
||
|
||
- Peoples' Rights Not to be Injured. People have the right not to be
|
||
injured when they venture into cyberspace. These rights include the
|
||
right not to be libelled or defamed by others on-line, rights against
|
||
having your on-line materials stolen or damaged, rights against having
|
||
your computer damaged by intentionally harmful files that you have
|
||
downloaded (such as files containing computer "viruses"), and so on.
|
||
|
||
There is no question these rights exist and can be enforced against
|
||
other users who cause such injuries. Currently, it is uncertain
|
||
whether system operators who oversee the systems can also be held
|
||
responsible for such user injuries.
|
||
|
||
- Financial Laws. These include laws like Regulations E & Z of the
|
||
Federal Reserve Board, which are consumer protection laws that apply
|
||
to credit cards, cash cards, and all other forms of electronic
|
||
banking.
|
||
|
||
- Securities Laws. The federal and state securities laws apply to
|
||
various kinds of on-line investment related activities, such as
|
||
trading in securities and other investment vehicles, investment
|
||
advisory services, market information services and investment
|
||
management services.
|
||
|
||
- Education Laws. Some organizations are starting to offer on-line
|
||
degree programs. State education laws and regulations come into play
|
||
on all aspects of such services.
|
||
|
||
The list goes on, but we have to end it somewhere. As it stands, this
|
||
list should give the reader a good idea of just how regulated
|
||
cyberspace already is.
|
||
|
||
|
||
LAWS OR CONFUSION?
|
||
|
||
The legal picture in cyberspace is very confused, for several reasons.
|
||
|
||
First, the sheer number of laws in cyberspace, in itself, can create a
|
||
great deal of confusion. Second, there can be several different kinds
|
||
of laws relating to a single activity, with each law pointing to a
|
||
different result.
|
||
|
||
Third, conflicts can arise in networks between different laws on the
|
||
same subject. These include conflicts between federal and state laws,
|
||
as in the areas of criminal laws and the right to privacy; conflicts
|
||
between the laws of two or more states, which will inevitably arise
|
||
for networks whose user base crosses state lines; and even conflicts
|
||
between laws from the same governmental authority where two or more
|
||
different laws overlap. The last is very common, especially in laws
|
||
relating to networks and computer law.
|
||
|
||
Some examples of the interactions between conflicting laws are
|
||
considered below, from the viewpoint of an on-line system operator.
|
||
|
||
1. System operators Liability for "Criminal" Activities.
|
||
|
||
Many different activities can create criminal liabilities for service
|
||
providers, including:
|
||
|
||
- distributing viruses and other dangerous program code;
|
||
|
||
- publishing "obscene" materials;
|
||
|
||
- trafficking in stolen credit card numbers and other unauthorized
|
||
access data;
|
||
|
||
- trafficking in pirated software;
|
||
|
||
- and acting as an accomplice, accessory or conspirator in these and
|
||
other activities.
|
||
|
||
The acts comprising these different violations are separately defined
|
||
in statutes and court cases on both the state and federal levels.
|
||
|
||
For prosecutors and law enforcers, this is a vast array of options for
|
||
pursuing wrongdoers. For service providers, it's a roulette wheel of
|
||
risk.
|
||
|
||
Faced with such a huge diversity of criminal possibilities, few
|
||
service providers will carefully analyze the exact laws that may
|
||
apply, nor the latest case law developments for each type of criminal
|
||
activity. Who has the time? For system operators who just want to
|
||
"play it safe", there is a strong incentive to do something much
|
||
simpler: Figure out ways to restrict user conduct on their systems
|
||
that will minimize their risk under *any* criminal law.
|
||
|
||
The system operator that chooses this highly restrictive route may not
|
||
allow any e-mail, for fear that he might be liable for the activities
|
||
of some secret drug ring, kiddie porn ring or stolen credit card code
|
||
ring. The system operator may ban all sexually suggestive materials,
|
||
for fear that the extreme anti-obscenity laws of some user's home town
|
||
might apply to his system. The system operator may not permit
|
||
transfer of program files through his system, except for files he
|
||
personally checks out, for fear that he could be accused of assisting
|
||
in distributing viruses, trojans or pirated software; and so on.
|
||
|
||
In this way, the most restrictive criminal laws that might apply to a
|
||
given on-line service (which could emanate, for instance, from one
|
||
very conservative state within the system's service area) could end up
|
||
restricting the activities of system operators all over the nation, if
|
||
they happen to have a significant user base in that state. This
|
||
results in less freedom for everyone in the network environment.
|
||
|
||
2. Federal vs. State Rights of Privacy.
|
||
|
||
Few words have been spoken in the press about network privacy laws in
|
||
each of the fifty states (as opposed to federal laws). However, what
|
||
the privacy protection of the federal Electronic Communications
|
||
Privacy Act ("ECPA") does not give you, state laws may.
|
||
|
||
This was the theory of the recent Epson e-mail case. An ex-employee
|
||
claimed that Epson acted illegally in requiring her to monitor e-mail
|
||
conversations of other employees. She did not sue under the ECPA, but
|
||
under the California Penal Code section prohibiting employee
|
||
surveillance of employee conversations.
|
||
|
||
The trial judge denied her claim. In his view, the California law
|
||
only applied to interceptions of oral telephone discussions, and not
|
||
to visual communication on video display monitors. Essentially, he
|
||
held that the California law had not caught up to modern technology -
|
||
making this law apply to e-mail communications was a job for the state
|
||
legislature, not local judges.
|
||
|
||
Beyond acknowledging that the California law was archaic and not
|
||
applicable to e-mail, we should understand that the Epson case takes
|
||
place in a special legal context - the workplace. E-mail user rights
|
||
against workplace surveillance are undeniably important, but in our
|
||
legal and political system they always must be "balanced" (ie.,
|
||
weakened) against the right of the employer to run his shop his own
|
||
way. Employers' rights may end up weighing more heavily against
|
||
workers' rights for company e-mail systems than for voice telephone
|
||
conversations, at least for employers who use intra-company e-mail
|
||
systems as an essential backbone of their business. Fortunately, this
|
||
particular skewing factor does not apply to *public* communications
|
||
systems.
|
||
|
||
I believe that many more attempts to establish e-mail privacy under
|
||
state laws are possible, and will be made in the future. This is good
|
||
news for privacy advocates, a growing and increasingly vocal group
|
||
these days.
|
||
|
||
It is mixed news, however, for operators of BBS's and other on-line
|
||
services. Most on-line service providers operate on an interstate
|
||
basis - all it takes to gain this status is a few calls from other
|
||
states every now and then. If state privacy laws apply to on-line
|
||
systems, then every BBS operator will be subject to the privacy laws
|
||
of every state in which one or more of his users are located! This
|
||
can lead to confusion, and inability to set reasonable or predictable
|
||
system privacy standards.
|
||
|
||
It can also lead to the effect described above in the discussion of
|
||
criminal liability. On-line systems might be set up "defensively", to
|
||
cope with the most restrictive privacy laws that might apply to them.
|
||
This could result in declarations of *absolutely no privacy* on some
|
||
systems, and highly secure setups on others, depending on the
|
||
individual system operator's inclinations.
|
||
|
||
3. Pressure on Privacy Rights Created by Risks to Service Providers.
|
||
|
||
There are two main kinds of legal risks faced by a system operator.
|
||
First, the risk that the system operator himself will be found
|
||
criminally guilty or civilly liable for being involved in illegal
|
||
activities on his system, leading to fines, jail, money damages,
|
||
confiscation of system, criminal record, etc.
|
||
|
||
Second, the risk of having his system confiscated, not because he did
|
||
anything wrong, but because someone else did something suspicious on
|
||
his system. As discussed above, a lot of criminal activity can take
|
||
place on a system when the system operator isn't looking. In
|
||
addition, certain non-criminal activities on the system could lead to
|
||
system confiscation, such copyright or trade secret infringement.
|
||
|
||
This second kind of risk is very real. It is exactly what happened to
|
||
Steve Jackson Games last year. Law enforcement agents seized Steve's
|
||
computer (which ran a BBS), not because they thought he did anything
|
||
wrong, but because they were tracking an allegedly evil computer
|
||
hacker group called the "Legion of Doom". Apparently, they thought
|
||
the group "met" and conspired on his BBS. A year later, much of the
|
||
dust has cleared, and the Electronic Frontier Foundation is funding a
|
||
lawsuit against the federal agents who seized the system.
|
||
Unfortunately, even if he wins the case Steve can't get back the
|
||
business he lost. To this day, he still has not regained all of his
|
||
possessions that were seized by the authorities.
|
||
|
||
For now, system operators do not have a great deal of control over
|
||
government or legal interference with their systems. You can be a
|
||
solid citizen and report every crime you suspect may be happening
|
||
using your system. Yet the chance remains that tonight, the feds will
|
||
be knocking on *your* door looking for an "evil hacker group" hiding
|
||
in your BBS.
|
||
|
||
This Keystone Kops style of "law enforcement" can turn system
|
||
operators into surrogate law enforcement agents. System operators who
|
||
fear random system confiscation will be tempted to monitor private
|
||
activities on their systems, intruding on the privacy of their users.
|
||
Such intrusion can take different forms. Some system operators may
|
||
declare that there will be no private discussions, so they can review
|
||
and inspect everything. More hauntingly, system operators may indulge
|
||
in surreptitious sampling of private e-mail, just to make sure no
|
||
one's doing anything that will make the cops come in and haul away
|
||
their BBS computer systems (By the way, I personally don't advocate
|
||
either of these things).
|
||
|
||
This situation can be viewed as a way for law enforcement agents to do
|
||
an end run around the ECPA's bar on government interception of
|
||
electronic messages. What the agents can't intercept directly, they
|
||
might get through fearful system operators. Even if you don't go for
|
||
such conspiracy theories, the random risk of system confiscation puts
|
||
great pressure on the privacy rights of on-line system users.
|
||
|
||
4. Contracts Versus Other Rights.
|
||
|
||
Most, perhaps all, of the rights between system operators and system
|
||
users can be modified by the basic service contract between them. For
|
||
instance, the federal ECPA gives on-line service users certain privacy
|
||
rights. It conspicuously falls short, however, by not protecting
|
||
users from privacy intrusions by the system operator himself.
|
||
|
||
Through contract, the system operator and the user can in effect
|
||
override the ECPA exception, and agree that the system operator will
|
||
not read private e-mail. Some system operators may go the opposite
|
||
direction, and impose a contractual rule that users should not expect
|
||
any privacy in their e-mail.
|
||
|
||
Another example of the power of contracts in the on-line environment
|
||
occurred recently on the Well, a national system based in San
|
||
Francisco (and highly recommended to all those interested in
|
||
discussing on-line legal issues). A Well user complained that a
|
||
message he had posted in one Well conference area had been
|
||
cross-posted by other users to a different conference area without his
|
||
permission.
|
||
|
||
A lengthy, lively discussion among Well users followed, debating the
|
||
problem. One of the major benchmarks for this discussion was the
|
||
basic service agreement between the Well and its users. And a
|
||
proposed resolution of the issue was to clarify the wording of that
|
||
fundamental agreement. Although "copyrights" were discussed, the
|
||
agreement between the Well and its users was viewed as a more
|
||
important source of the legitimate rights and expectations of Well
|
||
users.
|
||
|
||
Your state and federal "rights" against other on-line players may not
|
||
be worth fighting over if you can get a contract giving you the rights
|
||
you want. In the long run, the contractual solution may be the best
|
||
way to set up a decent networked on-line system environment, except
|
||
for the old bogeyman of government intrusion (against whom we will all
|
||
still need our "rights", Constitutional and otherwise).
|
||
|
||
CONCLUSION
|
||
|
||
There are many different laws that system operators must heed in
|
||
running their on-line services. This can lead to restricting system
|
||
activities under the most oppressive legal standards, and to
|
||
unpredictable, system-wide interactions between the effects of the
|
||
different laws.
|
||
|
||
The "net" result of this problem can be undue restrictions on the
|
||
activities of system operators and users alike.
|
||
|
||
The answers to this problem are simple in concept, but not easy to
|
||
execute. First, enact (or re-enact) all laws regarding electronic
|
||
services on a national level only, overriding individual state control
|
||
of system operators activities in cyberspace. It's time to realize
|
||
that provincial state laws only hinder proper development of
|
||
interstate electronic systems.
|
||
|
||
As yet, there is little movement in enacting nationally effective
|
||
laws. Isolated instances include the Electronic Communications
|
||
Privacy Act and the Computer Fraud and Abuse Act, which place federal
|
||
"floors" beneath privacy protection and certain types of computer
|
||
crime, respectively. On the commercial side, the new Article 4A of
|
||
the Uniform Commercial Code, which normalizes on-line commercial
|
||
transactions, is ready for adoption by the fifty states.
|
||
|
||
Second, all laws regulating on-line systems must be carefully designed
|
||
to interact well with other such laws. The goal is to create a
|
||
well-defined, reasonable legal environment for system operators and
|
||
users.
|
||
|
||
The EFF is fighting hard on this front, especially in the areas of
|
||
freedom of the press, rights of privacy, and rights against search and
|
||
seizure for on-line systems. Reducing government intrusion in these
|
||
areas will help free up cyberspace for bigger and better things.
|
||
|
||
However, the fight is just beginning today.
|
||
|
||
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||
|
||
Lance Rose is an attorney who works primarily in the fields of
|
||
computer and high technology law and intellectual property. His
|
||
clients include on-line publishers, electronic funds transfer
|
||
networks, data transmission services, individual system operators, and
|
||
shareware authors and vendors. He is currently revising SYSLAW, The
|
||
Sysop's Legal Manual. Lance is a partner in the New York City firm of
|
||
Greenspoon, Srager, Gaynin, Daichman & Marino, and can be reached by
|
||
voice at (212)888-6880, on the Well as "elrose", and on CompuServe at
|
||
72230,2044.
|
||
|
||
Copyright 1991 Lance Rose
|
||
|
||
The above article was originally published in Boardwatch, June, 1991
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 14 Aug 91 21:24 EDT
|
||
From: silicon.surfer@unixville.edu
|
||
Subject: File 4--Mystery Lurks In The Death of INSLAW Reporter
|
||
|
||
((Moderators' note: The death of INSLAW reporter J. Daniel Casolaro by
|
||
apparent suicide raises more questions about the entire affair.
|
||
Former U.S. Attorney General Elliot Richardson has called for a
|
||
Congressional investigation into the role of the Justice Department in
|
||
the affair. The Chicago Tribune (Aug.16, 1991, p. 14) reported that a
|
||
three hour autopsy this week found no evidence of anything other than
|
||
suicide, but that alternatives had not been ruled out, and no cause of
|
||
death has yet been given officially.))
|
||
|
||
|
||
Mystery Lurks In The Death Of Reporter
|
||
The Associated Press
|
||
|
||
Charleston, W. Va.- An investigative reporter found dead with his
|
||
wrists slashed in a hotel bathtub had warned others that he was on to
|
||
an explosive government scandal and might wind up dead in an
|
||
"accident".
|
||
|
||
The death of free-lance journalist Joseph D. Casolaro, 44, of Fairfax,
|
||
Va., initially was believed to be a suicide, but an autopsy was
|
||
ordered after the family members were contacted, police said Tuesday.
|
||
|
||
"He told us if he got killed in an accident not to believe it. That
|
||
was three months ago," said Casolaro's brother, Dr. M. Anthony
|
||
Casolaro of Alexandria, Va.
|
||
|
||
Casolaro had been working for a year on a book on allegations made in
|
||
1983 that the U.S. government stole software from INSLAW Inc., a
|
||
Washington company. The company has alleged in court that after it won
|
||
a $10 million contract with the Justice Department, the department
|
||
stole software designed to help law enforcement officials track cases.
|
||
|
||
Several of Casolaro's sources had warned him he would be in danger if
|
||
he continued his investigation, company owner Bill Hamilton said.
|
||
|
||
"I have some sources that Danny also had, and several of them told
|
||
him, 'These people will snuff you out without blinking an eye.' "
|
||
Hamilton said.
|
||
|
||
Dr. James Frost, an assistant state medical examiner, said a
|
||
preliminary report on the death would be completed today.
|
||
|
||
The body had been embalmed before the autopsy was held. Frost said
|
||
that was because early indications were that Casolaro had killed
|
||
himself.
|
||
|
||
Acquaintances said that they seen no indications of depression and
|
||
that Casolaro was in West Virginia to get more information.
|
||
|
||
In an outline of his book, Casolaro described his findings to Hamilton
|
||
as "an octopus, created in the 1950s and operating today with impunity
|
||
because it is intertwined with domestic and foreign intelligence
|
||
agencies...a criminal enterprise bent on making money.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #3.30
|
||
************************************
|
||
|
||
|