975 lines
48 KiB
Plaintext
975 lines
48 KiB
Plaintext
|
||
|
||
Computer underground Digest Mon, Feb 10, 1992 Volume 4 : Issue 06
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Associate Moderator: Etaion Shrdlu
|
||
|
||
CONTENTS, #4.06 ( Feb 10, 1992)
|
||
File 1: Bust of "NotSoHumble Babe" / USA
|
||
File 2: Keystone Stormtroopers
|
||
File 3: Fine for "Logic Bomber"
|
||
File 4: Re: Newsbytes on the Oregon BBS Rates Case
|
||
File 5: Calif. "Privacy [& Computer Crime] Act of 1992"
|
||
File 6: DIAC-92 Workshop Call for Paraticipation and Workshop Guidelines
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
|
||
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
NOTE: THE WIDENER SITE IS TEMPORARILY RE-ORGANIZING AND IS CURRENTLY
|
||
DIFFICULT TO ACCESS. FTP-ERS SHOULD USE THE ALTERNATE FTP SITES UNTIL
|
||
FURTHER NOTICE.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 8 Feb 92 17:31: 39 CST
|
||
From: Moderators (tk0jut2@mvs.niu.edu)
|
||
Subject: File 1--Bust of "NotSoHumble Babe" / USA
|
||
|
||
The recent busts of three persons in the Detroit and Los Angeles areas
|
||
for alleged carding, theft, software copyright violations and fraud
|
||
raise a number of issues of CU relevance. Because of misinformation
|
||
circulating on the nature of the case, we summarize what we know of it
|
||
below. "Amy" (handle: "NotSoHumble Babe") was busted on her birthday,
|
||
and is not untypical of many CU types, so we focus on her.
|
||
|
||
1. "Amy" was busted on Jan 30, in Farmington Hills (Mi), by local,
|
||
state, and federal agents. There were reportedly up to 20 agents.
|
||
The large number was because there were several from each
|
||
department, including the FBI, SecServ, Mi State police, and
|
||
others. They reportedly showed no warrant, but knocked on the door
|
||
and asked if they could come in. When "Amy" said "yes," they burst
|
||
(rather than calmly entered) with weapons, including
|
||
"semi-automatics." Her boyfriend was reportedly asleep, and the
|
||
agents awakened him with a gun to his head. The agent in charge
|
||
was Tony Alvarez of the Detroit SecServ.
|
||
|
||
2. There has been no indictment, but the agents indicated that charges
|
||
would include theft, fraud, and copyright violations. (software
|
||
piracy and carding). The initial figure given was a combined $20,00
|
||
for the three ("Amy," "Tom," and Mike").
|
||
|
||
3. All equipment was confiscated, included "every scrap of paper in
|
||
the house. She was informed that, whatever the outcome of the case,
|
||
she would not receive the equipment back and that it would be kept
|
||
for "internal use."
|
||
|
||
The above account differs dramatically from one given by "anonymous"
|
||
in "Phantasy #6," which was a diatribe against the three for
|
||
"ratting." However, the above account seems fairly reliable, judging
|
||
from a news account and a source close to the incident.
|
||
|
||
"Amy" is 27, and reported to be the head of USA (United Software
|
||
Alliance), which is considered by some to be the current top
|
||
"cracking" group in the country. If memory serves, "ENTERPRISE BBS"
|
||
was the USA homeboard. She was questioned for about 10 hours, and
|
||
"cooperated." She has, as of Saturday (Feb 9) *not* yet talked to an
|
||
attorney, although she was put in contact with one late Saturday. The
|
||
prosecutor in Oakland County is the same one who is prosecuting Dr.
|
||
Kavorkian (of "suicide machine" fame). He has a reputation as
|
||
excessively harsh, and his demeanor in television interviews does not
|
||
contradict this.
|
||
|
||
The other two defendants, "Mike/The Grim Reaper," and "Tom/Genesis"
|
||
are from the Detroit and Los Angeles areas.
|
||
|
||
What are the issues relevant for us?
|
||
|
||
My own radiclib concern is with over-criminalization created by
|
||
imposing a label onto a variety of disparate behaviors and then
|
||
invoking the full weight of the system against the label instead of
|
||
the behaviors. It is fully possible to oppose the behaviors while
|
||
recognizing that the current method of labelling, processing, and
|
||
punishment may not be wise. Len Rose provides an example of how
|
||
unacceptable but relatively benign behaviors lead to excessive
|
||
punishment. This, however, is a broader social issue of which
|
||
computer-related crimes is simply a symptom.
|
||
|
||
Of more direct relevance:
|
||
|
||
1) It appears that the continued use of massive force and weaponry
|
||
continues. We've discussed this before in alluding to cases in New
|
||
York, Illinois, Texas, and California. The video tape of the bust
|
||
of the "Hollywood Hacker" resembles a Miami Vice episode: A
|
||
middle-aged guy is confronted with an army of yelling weapons with
|
||
guns drawn charging through the door. Others on the board have
|
||
reported incidences of being met with a shotgun while stepping out
|
||
of the shower, a gun to the head while in bed, and (my favorite) a
|
||
15 year old kid busted while working on his computer and the
|
||
agent-in-charge put her gun to his head and reportedly said, "touch
|
||
that keyboard and die." The use of such force in this type of bust
|
||
is simply unacceptable because of the potential danger (especially
|
||
in multi-jurisdictional busts, which reduces the precision of
|
||
coordination) of accidental violence.
|
||
|
||
2. Until indictments and supporting evidence are made public, we
|
||
cannot be sure what the occured. But, it seems clear that, for
|
||
"Amy" at least, we are not dealing with a major felon. Carding is
|
||
obviously wrong, but I doubt that, in situations such as this,
|
||
heavy-duty felony charges are required to "teach a lesson," "set
|
||
an example," and re-channel behavior into more productive outlets.
|
||
|
||
3. We can continue to debate the legal and ethical implications of
|
||
software piracy. There is a continuum from useful and fully
|
||
justifiable "creative sharing" to heavy-duty predatory rip-off for
|
||
profit. This case seems to be the former rather than the latter.
|
||
There is no sound reason for treating extreme cases alike.
|
||
|
||
3. We should all be concerned about how LE frames and dramatizes such
|
||
cases for public consumption. The Farmington newspaper gave it
|
||
major coverage as a national crime of immense proportions. We
|
||
should all be concerned about how piracy cases are handled, because
|
||
even extreme cases have implications for minor ones. Does
|
||
possession of an unauthorized copy of Aldus Pagemaker and Harvard
|
||
Graphics, collective worth more than $1,000, really constitute a
|
||
major "theft"? We have seen from the cases of Len and Craig how
|
||
evaluation of a product is inflated to justify indictments that
|
||
look serious but in fact are not.
|
||
|
||
I'm not sure what purpose it serves to simply assert that people--even
|
||
if guilty of carding or piracy--should "get what's coming to them"
|
||
without reflecting on what it is they get and why. The issue isn't
|
||
one of coddling or protecting "criminals," but to examine more
|
||
carefully what kinds of computer-related crimes should be
|
||
criminalized, which should be torts, and which should be accepted as
|
||
minor nuisances and--if not ignored--at least not criminalized.
|
||
|
||
To give the dead horse one last kick: I am not arguing that we condone
|
||
behaviors. I am only suggesting that we reflect more carefully on how
|
||
we respond to such behaviors. I do not know the circumstances of "Tom"
|
||
and "Mike," but "Amy's" case raises many issues we can address without
|
||
condoning the behavior.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 20 Jan 92 07:56 EST
|
||
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
|
||
Subject: File 2--Keystone Stormtroopers
|
||
|
||
GRID News. ISSN 1054-9315. vol 3 nu 3 January 19, 1992.
|
||
World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
(74 lines) SPA: Jackboot Fascists or Keystone Kops?
|
||
(C) 1992 by Michael E. Marotta
|
||
|
||
Suddenly the doors burst open! US marshals take the Acme Inc.,
|
||
employees by surprise!! "Nobody move! Keep your hands away from
|
||
those keyboards!" yells the copper. "Oh my gosh! It's the SPA!!"
|
||
"Quick stash the disks!!" This 50s cartoon is the cover story of
|
||
the June 17, 1991 issue of Information Week, "The Software
|
||
Police." Inside is the story of the Software Publishers Associa-
|
||
tion. There is nothing laughable about the $90,000 paid to SPA by
|
||
IPL, the $100,000 paid by Entrix, the $17,500 paid by Healthline,
|
||
the $350,000 paid by Parametrix. At SnapOn Tools, three US
|
||
Marshals and an SPAer spent two days going through every one of
|
||
280 PCs with their special audit package. Then the burden of proof
|
||
shifted to SnapOn to produce purchase orders, manuals, invoices
|
||
and asset tags.
|
||
|
||
"GOVERN-MENTALITY" The SPA claims a staff of 18 to 23 and a
|
||
budget of $3.8 million. I had to call three times to get the free
|
||
audit program, SPAudit. They also offer to sell a video "It's
|
||
Just Not Worth the Risk" for $10 but my three voicemail requests
|
||
(Nov, Dec 91 & Jan 92) for this tape were not answered.
|
||
+ People with govern-mentality are below norm and the program
|
||
SP+Audit underscores this fact.
|
||
+ First of all, the README file was created with WordPerfect 5.
|
||
Using LIST or TYPE gets you ascii garbage and uneven formating
|
||
am+id the text. If you want to view the README file, the
|
||
instructions tell you:
|
||
+ A) To display on screen type TYPE A:README:MORE
|
||
which is bad documentation and doesn't work. Hardcopy reveals the
|
||
same problems and when you get to the bottom of the page, you find
|
||
that the last few lines print over each other. Apparently, the
|
||
typist used the cursor keys to position the text, because it lacks
|
||
some necessary LFs (ascii 0A).
|
||
+ I created four dummy files 123.EXE, MSDOS.SYS, PROCOMM.EXE and
|
||
SK+.COM which are found in the PIF.TXT file of over 600 software
|
||
names. The files I created said:
|
||
"The problem of copyright looks somewhat different the moment one
|
||
accepts copying technology as uncontrollable." Michael Crichton.
|
||
+ Then I made more copies at lower directory levels. SPAudit
|
||
was indeed able to search down eight directory sublevels to find
|
||
copies. However, when I went to print these, the program produced
|
||
ascii garbage. It failed on
|
||
C:+%123%MIKE%ANOTHER%DEEPER%NEMO%PLUTO%CHIRON%DANTE%ORPHEUS being
|
||
unable to print beyond %NEMO.
|
||
+ Overall, the SPA proves itself unable to manage PC technology.
|
||
This lack of quality is not surprising. No matter how much you
|
||
pay for software, you know that the seller "makes no claim of
|
||
merchantability or fitness for a particular use..." and won't be
|
||
liable for "direct, indirect, special, incidental or consequential
|
||
damages arising out of the use or inability to use the software or
|
||
documentation." That is the disclaimer which comes with SPAudit.
|
||
+
|
||
"CATCH-22" Following SPAudit guidelines means that you can't
|
||
have more than one copy of a program on one computer. Also, all
|
||
oF the CARMEN SANDIEGO games run from CARMEN.EXE. The audit
|
||
thinks it is looking for EUROPE but will also trip on WORLD, and
|
||
TI+ME, etc., meaning that you can get busted for buying more than
|
||
one CARMEN, a catch-22.
|
||
+ Also, there should be some confusion over dBase, which is no
|
||
longer an Ashton-Tate but a Borland product. More importantly, US
|
||
District judge Terrence Hatter, Jr., ruled in late 1990 that the
|
||
copyright on dBase was voided by their not revealing that it is a
|
||
cl+one of a public domain program from JPL.
|
||
+ Again, consider the case of SnapOn Tools. The SPA used their
|
||
defective software to disrupt a business for two days -- and they
|
||
have the nerve to call other people pirates.
|
||
+
|
||
(GRID News is FREQable from 1:159/450, the Beam Rider BBS)
|
||
|
||
------------------------------
|
||
|
||
Date: 27 Jan 92 18:48:35 EST
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 3--Fine for "Logic Bomber"
|
||
|
||
"Logic Bomb Programmer Fined"
|
||
(Reprinted with permission from STReport 8.04 Jan 24, 1992)
|
||
|
||
Michael John Lauffenburger, a 31-year-old programmer formerly with
|
||
General Dynamics, pleaded guilty Nov. 4 to attempted computer
|
||
tampering. He has been fined $5,000, handed three years' probation
|
||
and was ordered to perform 200 hours of community service for
|
||
attempting to sabotage computers with a "logic bomb" that prosecutors
|
||
say could have erased national security data.
|
||
|
||
According to reports, Lauffenburger set up the logic bomb, then
|
||
resigned, intending to get hired on as high-priced consultant to help
|
||
reconstruct the data lost from the billion-dollar Atlas Missile Space
|
||
Program when the virus was unleashed. A co-worker accidentally
|
||
discovered the rogue program in early May. It had been set to go off
|
||
May 24. Investigators said at the time the bomb would have caused
|
||
about $100,000 in damage to computer systems at the Kearny Mesa
|
||
plant.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 07 Feb 92 06:10:49 PST
|
||
From: walter@HALCYON.COM(Walter Scott)
|
||
Subject: File 4--Re: Newsbytes on the Oregon BBS Rates Case
|
||
|
||
On 2-5-92, reporter Dana Blankenhorn released a copyrighted exclusive
|
||
story for Wendy Wood's Newsbytes covering the Oregon BBS rates case.
|
||
What follows is an abstract of that story.
|
||
|
||
Blankenhorn writes: "US West has launched a campaign before the Oregon
|
||
Public Utility Commission which would force all bulletin board systems
|
||
(BBSs) in that state to pay business rates on their phone lines." The
|
||
Newsbytes exclusive also asserts that US West "wants the Oregon PUC to
|
||
reinterpret its tariff so as to define any phone not answered by a
|
||
human voice as a business line."
|
||
|
||
Blankenhorn quotes extensively from an apparent interview with SysOp
|
||
Stewart Anthony Wagner while summarizing the chronology of events in
|
||
the case. Some folks here might find the chronology and alleged facts
|
||
be a bit different from what has been reported in the past.
|
||
|
||
According to Blankenhorn, Portland, Oregon SysOp Tony Wagner attempted
|
||
to subscribe to extra phone lines so as to expand his BBS from 2 lines
|
||
to 4, as well as make arrangements for a TDD. It was at this point
|
||
Wagner was informed he would have to pay business rates on all lines
|
||
by US West. According to Blankenhorn, US West relented on the voice
|
||
and TDD lines while maintaining that the BBS lines would have to be
|
||
classified as business lines. Wagner filed what Blankenhorn calls an
|
||
"appeal" at the Oregon PUC "for the BBS".
|
||
|
||
Wagner is reported to have closed his BBS almost immediately because
|
||
he "can't afford it" at business rates, which blankenhorn states to be
|
||
around $50 (presumably per month) on each line. Before closing his
|
||
system, Wagner says he alerted regional SysOps via FidoNet to his
|
||
plight. Wagner points out that some SysOps chipped in to pay for a
|
||
lawyer. Blankenhorn quotes Wagner on a so-called "compromise proposal"
|
||
that "they (US West) come up with a residential data line rate, as an
|
||
alternate form of service." Wagner's proposal apparently included a
|
||
guarantee of data quality at a rate that Wagner seems to assess at
|
||
$5.00 above standard residential rates. Wagner asserts the proposal
|
||
was rejected.
|
||
|
||
Wagner's comments on the hearing display optimism as he offers the
|
||
thought that "the hearing went quite well. The tariff says a
|
||
residential line is for social or domestic purpose. They ignored the
|
||
social, they talked only about domestic. The BBS is as social as you
|
||
can get."
|
||
|
||
In a series of quotes from Wagner on what he believes US West is
|
||
doing, a grim picture is painted for more than BBS operators. For
|
||
example: Wagner states "there is no question they want to apply this
|
||
to all SysOps. Their position is that if it's not answered by a human
|
||
voice, it's a business. A fax machine is a business, to them. So's an
|
||
answering machine."
|
||
|
||
Wagner spoke of what he might consider a silver lining in his cloudy
|
||
future as a SysOp when he told Blankenhorn that publicity must be bad
|
||
for US West. He reinforces this idea by noting "one thing that hurt
|
||
them (US West) badly was that they picked on me. I'm very hard of
|
||
hearing. Most of my users are disabled. A large percentage of our
|
||
SysOps here are disabled. And Mr. Holmes (US West's attorney in the
|
||
Wagner case) was unprepared for that."
|
||
|
||
Blankenhorn talked with Judith Legg in the hearings section at the
|
||
Oregon Public Utility Commission concerning the Wagner Case. He
|
||
reports Legg told him "a hearing was held on the case in January, and
|
||
US West has already submitted a 17-page brief supporting its
|
||
position." Hearings Officer Simon Fitch was attributed as informing
|
||
Newsbytes that Wagner "has until March 3 to file his own brief, after
|
||
which reply briefs will be sought from both sides." Fitch is also
|
||
reported to have said a decision in the case is due in late March or
|
||
early April with final oversight from the Commissioners.
|
||
|
||
Attempts, by Blankenhorn, to contact attorney Steven Holmes at US West
|
||
were unsuccessful. Apparently, no one else in the company was
|
||
available for comment. Thus, the Newsbytes article contained no
|
||
synopsis of US West's side of the issues in the Wagner case.
|
||
Blankenhorn left the door open to a future update by noting
|
||
information requested from US West would be reported as soon as that
|
||
information is made available to Newsbytes.
|
||
|
||
So much for the abstract...
|
||
|
||
A FEW OBSERVATIONS: It seems that Blankenhorn must not have been able
|
||
to obtain a copy of US West's brief before going to press. Otherwise,
|
||
Blankenhorn would realize, and could have noted, that US West's
|
||
comments have no impact on FAX or answering machines. BBS operation in
|
||
general, and Wagner's BBS in specific, are the myopic focus of the
|
||
brief. Blankenhorn also could have asked about and cleared up what
|
||
appears to be a discrepancy between Wagner's apparent indication that
|
||
he was running his BBS on 2 phone lines at the time he requested new
|
||
lines, and the repeated references in the US West brief to Wagner's
|
||
"3" BBS phone lines. Finally, I called Judith Legg myself on 2-6-92
|
||
and asked her about the actual timing of the hearing. She informed me
|
||
that the hearing was indeed in December. In Blankenhorn's defense,
|
||
Legg admits that she was under the mistaken impression that the
|
||
hearing took place in January, and that this is probably what she told
|
||
Blankenhorn. A check of the Oregon PUC's computerized schedules was
|
||
necessary to clarify the actual hearing date.
|
||
|
||
Walter Scott
|
||
|
||
**
|
||
The 23:00 News and Mail Service - +1 206 292 9048 - Seattle, WA USA
|
||
PEP, V.32, V.42bis
|
||
+++ A Waffle Iron, Model 1.64 +++
|
||
|
||
------------------------------
|
||
|
||
Date: 22 Jan 92 19:12:22 CST
|
||
From: Jim Warren (jwarren@well.sf.ca.us)
|
||
Subject: File 5--Calif. "Privacy [& Computer Crime] Act of 1992"
|
||
|
||
The Chair of the California State Senate, Bill Lockyer, is
|
||
introducing what he calls "The Privacy Act of 1992." It addresses
|
||
computer *crime* in a robust manner, but appears to be less concerned
|
||
with some of the more major privacy issues (e.g. personal
|
||
data/profiles built & used by government and private corporations)
|
||
posed during public testimony in December. I scanned it in, OCRed
|
||
it, proofed it, and believe this is an accurate copy of the original
|
||
cover letter and content. The latter has already been sent to
|
||
Legislative Counsel (on 1/8/92).
|
||
|
||
Please upload it and circulate it to all others who might be
|
||
interested. Note: Many consider that computer legislation at the
|
||
state level in major, "bellweather" states may/can/will provide
|
||
models for other states and for eventual federal legislation. Thus,
|
||
this deserves *early* and widespread circulation, review and *public
|
||
comment*.
|
||
|
||
jim warren [chair, First Conference on Computers, Freedom & Privacy, 1991]
|
||
|
||
**********************************************************************
|
||
|
||
====== TEXT OF COVER-LETTER, RECEIVED JAN. 17, 1992 =====
|
||
|
||
California State Senate
|
||
Bill Lockyer, Tenth [California] Senatorial District
|
||
[Chairman, California State Senate Judiciary Committee]
|
||
Southern Alameda County
|
||
|
||
January 15, 1992
|
||
|
||
TO: Interested Parties
|
||
|
||
FROM: Ben Firschein, Senator Lockyer's Office
|
||
|
||
RE: Privacy legislation emerging from the interim hearing
|
||
|
||
We have drafted language reflecting some of the suggestions made at
|
||
the privacy hearing on December 10 [1991] and have sent it to
|
||
Legislative Counsel. It is likely that Senator Lockyer will
|
||
introduce the language as a bill when it comes back from Legislative
|
||
Counsel.
|
||
|
||
We welcome and encourage your suggestions, comments and proposed
|
||
amendments. This language should be viewed as an initial proposal,
|
||
and it is likely that it will be amended as it proceeds through the
|
||
legislature.
|
||
|
||
The bill as submitted to Legislative Counsel does the following:
|
||
|
||
1. Information obtained from driver's licenses: prohibit businesses
|
||
from selling or using for advertising purposes information obtained
|
||
from driver's licenses without the written consent of the consumer.
|
||
|
||
2. Automatic vehicle identification [AVI]: Require Caltrans to
|
||
provide an opportunity to pre-pay tolls and use the facility
|
||
anonymously.
|
||
|
||
3. Violation of privacy of employees: language has been drafted
|
||
based on the Connecticut statute that Justice Grodin discussed at the
|
||
hearing. The proposed language goes further than the Connecticut
|
||
statute in that it also extends to prospective employees.
|
||
|
||
4. Amend Penal Code Section 502 (computer crime statute) as
|
||
follows:
|
||
|
||
a) Extend existing law to allow recovery by any injured party,
|
||
not just the owner or lessee of the computer.
|
||
|
||
b) Allow recovery for any consequential or incidental damages,
|
||
not just for expenditures necessary to verify that a computer system
|
||
was or was not damaged.
|
||
|
||
c) Create civil penalty of $ 10,000 per injured party up to a
|
||
maximum of fifty thousand dollars for recklessly storing data in a
|
||
manner which enables a person to commit acts leading to a felony
|
||
conviction. Failure to report to law enforcement a previous
|
||
violation under the statute would be deemed to be possible evidence
|
||
of recklessness
|
||
|
||
d) Require that owner or lessee of computer report to law
|
||
enforcement any known violations of the statute involving his/her
|
||
system. Such reports required within 60 days after they become
|
||
known to owner or lessee.
|
||
|
||
Warrants for electronically stored materials: We are interested in
|
||
working with interested parties on some of the proposals made at the
|
||
hearing, for possible inclusion in the bill as amendments.
|
||
Please direct your comments to:
|
||
|
||
Ben Firschein
|
||
Administrative Assistant
|
||
Office of Senator Lockyer
|
||
Room 2032 State Capitol
|
||
Sacramento, CA 95814
|
||
(916) 445Q6671
|
||
|
||
========== END OF JAN.17 COVER LETTER ==========
|
||
|
||
<<BEWARE! The entry following this one is about 5 print-pages long
|
||
-- the full text of Sen. Lockyer's draft legislation that has already
|
||
been sent to Legislative Counsel for review, apparently the final
|
||
prerequisite to formal introduction.>>
|
||
|
||
====== TEXT OF LEGISLATION, RECEIVED JAN. 17, 1992 =====
|
||
|
||
[hand-written] The people of the State of California do enact as follows:
|
||
|
||
[hand-written] Section 1. This Act may be cited as the Privacy Act of 1992.
|
||
[hand-written] Section 2. Section 1799.4 is added to the Civil Code to
|
||
read:
|
||
|
||
1799.4. A business entity that obtains information from a consumer's
|
||
driver's license or identification card for its business records or for
|
||
other purposes shall not sell the information or use it to advertise goods
|
||
or services, without the written consent of the consumer.
|
||
|
||
[hand-written] Sent to Leg Counsel 1/8
|
||
|
||
[hand-written] Section 3. Section 502 of the Penal Code is amended to read:
|
||
|
||
502. (a) It is the intent of the Legislature in enacting this section to
|
||
expand the degree of protection afforded to individuals, businesses, and
|
||
governmental agencies from tampering, interference, damage, and
|
||
unauthorized access to lawfully created computer data and computer
|
||
systems. The Legislature finds and declares that the proliferation of
|
||
computer technology has resulted in a concomitant proliferation of computer
|
||
crime and other forms of unauthorized access to computers, computer
|
||
systems, and computer data.
|
||
|
||
The Legislature further finds and declares that protection of the
|
||
integrity of all types and forms of lawfully created computers, computer
|
||
systems, and computer data is vital to the protection of the privacy of
|
||
individuals as well as to the well-being of financial institutions,
|
||
business concerns, governmental agencies, and others within this state
|
||
that lawfully utilize those computers, computer systems, and data.
|
||
|
||
(b) For the purposes of this section, the following terms have the
|
||
following meanings:
|
||
|
||
(l) "Access" means to gain entry to, instruct, or communicate with the
|
||
logical, arithmetical, or memory function resources of a computer, computer
|
||
system, or computer network.
|
||
|
||
(2) "Computer network" means any system which provides communications
|
||
between one or more computer systems and input/output devices including,
|
||
but not limited to, display terminals and printers connected by
|
||
telecommunication facilities.
|
||
|
||
(3) "Computer program or software" means a set of instructions or
|
||
statements, and related data, that when executed in actual or modified
|
||
form, cause a computer, computer system, or computer network to perform
|
||
specified functions.
|
||
(4) "Computer services" includes, but is not limited to, computer time,
|
||
data processing, or storage functions, or other uses of a computer,
|
||
computer system, or computer network.
|
||
|
||
(5) "Computer system" means a device or collection of devices, including
|
||
support devices and excluding calculators which are not programmable and
|
||
capable of being used in conjunction with external files, one or more of
|
||
which contain computer programs, electronic instructions, input data, and
|
||
output data, that performs functions including, but not limited to, logic,
|
||
arithmetic, data storage and retrieval, communication, and control.
|
||
|
||
(6) "Data" means a representation of information, knowledge, facts,
|
||
concepts, computer software, computer programs or instructions. Data may
|
||
be in any form, in storage media, or as stored in the memory of the
|
||
computer or in transit or presented on a display device.
|
||
|
||
(7) "Supporting documentation" includes, but is not limited to, all
|
||
information, in any form, pertaining to the design, construction,
|
||
classification, implementation, use, or modification of a computer,
|
||
computer system, computer network, computer program, or computer software,
|
||
which information is not generally available to the public and is
|
||
necessary for the operation of a computer, computer system, computer
|
||
network, computer program, or computer software.
|
||
|
||
(8) "Injury" means any alteration, deletion, damage, or destruction of
|
||
a computer system, computer network, computer program, or data caused by
|
||
the access.
|
||
|
||
(9) "Victim expenditure" means any expenditure reasonably and necessarily
|
||
incurred by the owner or lessee to verify that a computer system, computer
|
||
network, computer program, or data was or was not altered, deleted,
|
||
damaged, or destroyed by the access.
|
||
|
||
(10) "Computer contaminant" means any set of computer instructions that
|
||
are designed to modify, damage, destroy, record, or transmit information
|
||
within a computer, computer system, or computer network without the intent
|
||
or permission of the owner of the information. They include, but are not
|
||
limited to, a group of computer instructions commonly called viruses or
|
||
worms, which are self-replicating or self-propagating and are designed to
|
||
contaminate other computer programs or computer data, consume computer
|
||
resources, modify, destroy, record, or transmit data, or in some other
|
||
fashion usurp the normal operation of the computer, computer system, or
|
||
computer network.
|
||
|
||
(c) Except as provided in subdivision (h), any person who commits any of
|
||
the following acts is guilty of a public offense:
|
||
|
||
(1) Knowingly accesses and without permission alters, damages, deletes,
|
||
destroys, or otherwise uses any data, computer, computer system, or
|
||
computer network in order to either (A) devise or execute any scheme or
|
||
artifice to defraud, deceive, or extort, or (B) wrongfully control or
|
||
obtain money, property, or data.
|
||
|
||
(2) Knowingly accesses and without permission takes, copies, or makes use
|
||
of any data from a computer, computer system, or computer network, or takes
|
||
or copies any supporting documentation, whether existing or residing
|
||
internal or external to a computer, computer system, or computer network.
|
||
|
||
(3) Knowingly and without permission uses or causes to be used computer
|
||
services.
|
||
|
||
(4) Knowingly accesses and without permission adds, alters, damages,
|
||
deletes, or destroys any data, computer software, or computer programs
|
||
which reside or exist internal or external to a computer, computer system,
|
||
or computer network.
|
||
|
||
(5) Knowingly and without permission disrupts or causes the disruption of
|
||
computer services or denies or causes the denial of computer services to an
|
||
authorized user of a computer, computer system, or computer network.
|
||
|
||
(6) Knowingly and without permission provides or assists in providing a
|
||
means of accessing a computer, computer system, or computer network in
|
||
violation of this section.
|
||
|
||
(7) Knowingly and without permission accesses or causes to be accessed
|
||
any computer, computer system, or computer network.
|
||
|
||
(8) Knowingly introduces any computer contaminant into any computer,
|
||
computer system, or computer network.
|
||
|
||
(d) (1) Any person who violates any of the provisions of paragraph (1),
|
||
(2), (4), or (5) of subdivision (c) is punishable by a fine not exceeding
|
||
ten thousand dollars ($10,000), or by imprisonment in the state prison for
|
||
16 months, or two or three years, or by both that fine and imprisonment, or
|
||
by a fine not exceeding five thousand dollars ($5,000), or by imprisonment
|
||
in the county jail not exceeding one year, or by both that fine and
|
||
imprisonment.
|
||
|
||
(2) Any person who violates paragraph (3) of subdivision (c) is
|
||
punishable as follows:
|
||
|
||
(A) For the first violation which does not result in injury, and where
|
||
the value of the computer services used does not exceed four hundred
|
||
dollars ($400), by a fine not exceeding five thousand dollars ($5,000), or
|
||
by imprisonment in the county jail not exceeding one year, or by both that
|
||
fine and imprisonment.
|
||
|
||
(B) For any violation which results in a victim expenditure in an amount
|
||
greater than five thousand dollars ($5,000) or in an injury, or if the
|
||
value of the computer services used exceeds four hundred dollars ($400), or
|
||
for any second or subsequent violation, by a fine not exceeding ten
|
||
thousand dollars ($10,000), or by imprisonment in the state prison for 16
|
||
months, or two or three years, or by both that fine and imprisonment, or by
|
||
a fine not exceeding five thousand dollars ($5,000), or by imprisonment in
|
||
the county jail not exceeding one year, or by both that fine and
|
||
imprisonment.
|
||
|
||
(3) Any person who violates paragraph (6), (7), or (8) of subdivision (c)
|
||
is punishable as follows:
|
||
|
||
(A) For a first violation which does not result in injury an infraction
|
||
punishable by a fine not exceeding two hundred fifty dollars ($250).
|
||
|
||
(B) For any violation which results in a victim expenditure in an amount
|
||
not greater than five thousand dollars ($5,000), or for a second or
|
||
subsequent violation, by a fine not exceeding five thousand dollars
|
||
($5,000), or by imprisonment in the county jail not exceeding one year, or
|
||
by both that fine and imprisonment.
|
||
|
||
(C) For any violation which results in a victim expenditure in an amount
|
||
greater than five thousand dollars ($5,000), by a fine not exceeding ten
|
||
thousand dollars ($10,000), or by imprisonment in the state prison for 16
|
||
months, or two or three years, or by both that fine and imprisonment, or
|
||
by a fine not exceeding five thousand dollars ($5,000), or by imprisonment
|
||
in the county jail not exceeding one year, or by both that fine and
|
||
imprisonment.
|
||
|
||
(e) (1) In addition to any other civil remedy available, any injured
|
||
party. including but not limited to the owner or lessee of the computer,
|
||
computer system, computer network, computer program, or data, may bring a
|
||
civil action against any person convicted under this section for
|
||
compensatory damages, including any consequential or incidental damages. In
|
||
the case of the owner or lessee of the computer, computer system, computer
|
||
network, computer program, or data. such damages may include. but are not
|
||
limited to. any expenditure reasonably.and necessarily incurred by the
|
||
owner or lessee to verify that a computer system, computer network,
|
||
computer program, or data was or was not altered, damaged, or deleted by
|
||
the access.
|
||
|
||
(2) Whoever recklessly stores or maintains data in a manner which enables
|
||
a person to commit acts leading to a felony ["a felony" hand-written]
|
||
conviction under this section shall be liable for a civil penalty of ten
|
||
thousand dollars ($ 10,000) per injured party, up to a maximum of fifty
|
||
thousand dollars ($ 50.000). Failure to report to law enforcement a
|
||
previous violation under subsection (f) may constitute evidence of
|
||
recklessness.
|
||
|
||
(3) For the purposes of actions authorized by this subdivision, the
|
||
conduct of an unemancipated minor shall be imputed to the parent or legal
|
||
guardian having control or custody of the minor, pursuant to the provisions
|
||
of Section 1714.1 of the Civil Code.
|
||
|
||
(4) In any action brought pursuant to this subdivision the court may
|
||
award reasonable attorney's fees to a prevailing party.
|
||
|
||
(5) A community college, state university, or academic institution
|
||
accredited in this state is required to include computer-related crimes as
|
||
a specific violation of college or university student conduct policies and
|
||
regulations that may subject a student to disciplinary sanctions up to and
|
||
including dismissal from the academic institution. This paragraph shall
|
||
not apply to the University of California unless the Board of Regents
|
||
adopts a resolution to that effect.
|
||
|
||
(f) The owner or lesee of any computer, computer system, computer network,
|
||
computer program, or data shall report to law enforcement any known
|
||
violations of this section involving the owner or lesee's computer,
|
||
computer system, computer network, computer program, or data. Such reports
|
||
shall be made within 60 days after they become known to the owner or lesee.
|
||
|
||
(g) This section shall not be construed to preclude the applicability of
|
||
any other provision of the criminal law of this state which applies or may
|
||
apply to any transaction, nor shall it make illegal any employee labor
|
||
relations activities that are within the scope and protection of state or
|
||
federal labor laws.
|
||
|
||
(h) Any computer, computer system, computer network, or any software or
|
||
data, owned by the defendant, which is used during the commission of any
|
||
public offense described in subdivision (c) or any computer, owned by the
|
||
defendant, which is used as a repository for the storage of software or
|
||
data illegally obtained in violation of subdivision (c) shall be subject
|
||
to forfeiture, as specified in Section 502.01.
|
||
|
||
(i) (1) Subdivision (c) does not apply to any person who accesses his or
|
||
her employer's computer system, computer network, computer program, or
|
||
data when acting within the scope of his or her lawful employment.
|
||
|
||
(2) Paragraph (3) of subdivision (c) does not apply to any employee who
|
||
accesses or uses his or her employer's computer system, computer network,
|
||
computer program, or data when acting outside the scope of his or her
|
||
lawful employment, so long as the employee's activities do not cause an
|
||
injury, as defined in paragraph (8) of subdivision of (b), to the employer
|
||
or another, or so long as the value of supplies and computer services, as
|
||
defined in paragraph (4) of subdivision (b), which are used do not exceed
|
||
an accumulated total of one hundred dollars ($100).
|
||
|
||
(j) No activity exempted from prosecution under paragraph (2) of
|
||
subdivision (h) which incidentally violates paragraph (2), (4), or (7) of
|
||
subdivision (c) shall be prosecuted under those paragraphs.
|
||
|
||
(k) For purposes of bringing a civil or a criminal action under this
|
||
section, a person who causes, by any means, the access of a computer,
|
||
computer system, or computer network in one jurisdiction from another
|
||
jurisdiction is deemed to have personally accessed the computer, computer
|
||
system, or computer network in each jurisdiction.
|
||
|
||
(l) In determining the terms and conditions applicable to a person
|
||
convicted of a violation of this section the court shall consider the
|
||
following:
|
||
|
||
(1) The court shall consider prohibitions on access to and use of
|
||
computers.
|
||
|
||
(2) Except as otherwise required by law, the court shall consider
|
||
alternate sentencing, including community service, if the defendant shows
|
||
remorse and recognition of the wrongdoing, and an inclination not to repeat
|
||
the offense
|
||
|
||
[hand-written] Section 4. Section 12940.3 is added to the Government Code
|
||
to read:
|
||
|
||
(a) Any employer, including the state and any instrumentality or political
|
||
subdivision thereof, shall be liable to an employee or prospective
|
||
employee for damages caused by either of the following:
|
||
|
||
(1) subjecting the employee to discipline or discharge on account of the
|
||
exercise by such employee of rights guaranteed by Section l of Article I
|
||
of the California Constitution, provided such activity does not
|
||
substantially interfere with the employee's bona fide job performance or
|
||
working relationship with the employer.
|
||
|
||
(2) Denying employment to a prospective employee on account of the
|
||
prospective employee's exercise of rights guaranteed by Section 1 of
|
||
Article I of the California Constitution.
|
||
|
||
|
||
(b) The damages awarded under this Section may include punitive damages,
|
||
and reasonable attorney's fees as part of the costs of any such action for
|
||
damages. If the court decides that such action for damages was brought
|
||
without substantial justification, the court may award costs and reasonable
|
||
attorney's fees to the employer.
|
||
|
||
[hand-written] Section 5. Section 27565 of the Streets and Highways Code
|
||
is amended to read:
|
||
|
||
27565. Automatic vehicle identification systems for toll collection
|
||
(a) The Department of Transportation in cooperation with the district and
|
||
all known entities planning to implement a toll facility in this state
|
||
shall develop and adopt functional specifications and standards for an
|
||
automatic vehicle identification system, in compliance with the following
|
||
objectives:
|
||
|
||
(1) In order to be detected, the driver shall not be required to reduce
|
||
speed below the applicable speed for the type of facility being used.
|
||
|
||
(2) The vehicle owner shall not be required to purchase or install more
|
||
than one device to use on all toll facilities, but may be required to have
|
||
a separate account or financial arrangement for the use of these facilities.
|
||
|
||
(3) The facility operators shall have the ability to select from different
|
||
manufacturers and vendors. The specifications and standards shall encourage
|
||
multiple bidders and shall not have the effect of limiting the facilIty
|
||
operators to choosing a system which is able to be supplied by only one or
|
||
vendor.
|
||
|
||
(b) The vehicle owner shall have the choice of pre-paying tolls, or being
|
||
billed after using the facility. If the vehicle owner pre-pays tolls:
|
||
|
||
(1) The facility or the Department shall issue an account number to the
|
||
vehicle owner. The account number shall not be derived from the vehicle
|
||
owner's name, address, social security number, or driver's license number,
|
||
or the vehicle's license number, vehicle identification number, or
|
||
registration.
|
||
|
||
(2) Once an account has been established and an account number has been
|
||
given to the vehicle owner, neither the facility nor the Department shall
|
||
keep any record of the vehicle owner's name, address, social security
|
||
number or driver's license number, or the vehicle's license number.
|
||
vehicle identification number, or registration.
|
||
|
||
(3) The vehicle owner may make additional pre-payments by specifying the
|
||
account number and furnishing payment.
|
||
|
||
(c) Any automatic vehicle identification system purchased or installed
|
||
after January 1, 1991, shall comply with the specifications and standards
|
||
adopted pursuant to subdivision (a).
|
||
|
||
(d) Any automatic vehicle identification system purchased or installed
|
||
after January 1, 1993. shall comply with the specifications and standards
|
||
adopted pursuant to subdivisions (a) and (b).
|
||
|
||
====== END OF LEGISLATION DRAFT ======
|
||
|
||
[Note: The preceeding is the end-result of the draft-text. Some of the
|
||
document had apparently-old wording with strike-thru lines; some of it was
|
||
underlined, apparently indicating newly-added wording. Since there is no
|
||
universally-accepted protocol for representing such "exotic" text-forms in
|
||
the Barren ASCII Wasteland, the preceeding text does not reflect strike-thrus
|
||
not underlines in the original text. Also, the preceeding reflects
|
||
the paragraph-indenting and paranthesized section-labeling, as
|
||
received. It is left as "an exercise for the reader" to figure out
|
||
its rationale.
|
||
--jim ]
|
||
|
||
The vast majority of us would readily state that we, personally,
|
||
"store and maintain data." To the extent that we do so on a shared
|
||
host, it seems like it could be applied to us, *as individuals*.
|
||
Unless, perhaps, we stored it in encrypted form or made other
|
||
provable efforts to protect it while it's stored on a shared system.
|
||
|
||
Please note that this scenario equally applies to folks working on
|
||
LAN systems at a company.
|
||
|
||
Is this, perhaps, "overly-broad legislation"?
|
||
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 22 Jan 1992 13:59:44 CST
|
||
From: douglas%atc.boeing.com@UMCVMB.MISSOURI.EDU
|
||
Subject: File 6--DIAC-92 Workshop Call for Paraticipation and Workshop Guidelines
|
||
Directions and Implications of Advanced Computing
|
||
|
||
DIAC-92
|
||
|
||
Berkeley, California May 3, 1992
|
||
|
||
Call for Workshop Proposals and
|
||
|
||
Workshop Proposal Guidelines
|
||
|
||
[Due Date Extended]
|
||
|
||
|
||
DIAC-92 is a two-day symposium in which the the social implications of
|
||
computing are explored. The first day (May 2, 1992) will consist of
|
||
presentations. The second day will consist of a wide variety of
|
||
workshops. These guidelines describe the intent for the workshops and the
|
||
manner in which they are proposed. They are meant to augment and
|
||
supercede the information found in the Call for Papers and Participation.
|
||
The workshops are meant to be more informal than the presented papers of
|
||
the previous day. For this reason the format for the proposals is
|
||
expected to vary. Nevertheless there are some guidelines that we can
|
||
offer that will help ensure a succesful workshop.
|
||
|
||
The proposal should include the title, author's name, affiliation, and
|
||
electronic mail address at the beginning. All workshop proposals will be
|
||
included in the proceedings. The workshop proposal should be 1 - 8 pages
|
||
in length. The desired range of attendees (smallest number - largest
|
||
number) should be included. All workshops will be two hours in length with
|
||
a short break 1/2 way through. It is possible to schedule two related
|
||
workshops back to back, say "Introduction to Something" and "Advanced
|
||
Something". If this is the case please submit two separate proposals but
|
||
state that they are related.
|
||
|
||
There are four major concerns for the workshops which should be
|
||
addressed in the proposal.
|
||
|
||
1. Intellectual Content
|
||
The intellectual content of the workshop should be made clear.
|
||
What is the focus on the workshop? What are the relevant social
|
||
issues? What relevant research exists already on the topic? Who
|
||
is the intended audience? The topic should have a qualitative
|
||
computing element in it.
|
||
|
||
2. Structure
|
||
There should be some structure to the workshop. It can be quite
|
||
loose and flexible but it shouldn't be completely open. The
|
||
amount of structure will vary according to the topic at hand, the
|
||
intended goals, the personalities of the audience and the organizers,
|
||
etc. The proposal should describe the structure of the
|
||
workshop.
|
||
|
||
3. Interactivity
|
||
The workshop should be interactive. The workshop should be
|
||
designed in such a way to promote meaningful interaction between
|
||
the organizer or organizers and the attendees. Because there is
|
||
group interaction it is hoped that more points will be raised,
|
||
more issues considered, and deeper analysis performed. The
|
||
methods of interaction should be described in the proposal.
|
||
|
||
4. Product or action oriented
|
||
Ideally the workshop should result in some product or plan for
|
||
action. Although this aspect is not critical, the program
|
||
committee feels that this is quite important and we hope that
|
||
workshop organizers will think in these terms and strive to
|
||
promote an appropriate outcome. Possible "deliverables" are
|
||
described below.
|
||
|
||
|
||
Possible Output From a DIAC-92 Workshop
|
||
|
||
+ Statements or press releases
|
||
+ Bibliography on subject matter
|
||
+ Electronic distribution list on the subject
|
||
+ Ideas for a follow up meeting, workshop, or conference
|
||
+ List of possible projects on the subject
|
||
+ Writeup of meeting for electronic or print dissemination
|
||
+ A project proposal
|
||
+ A panel discussion proposal
|
||
+ A grant proposal
|
||
+ An experiment
|
||
+ A working agreement -- e.g. to connect two networks, to share
|
||
data, to begin a study, to write an article, to build software
|
||
jointly, etc.
|
||
+ A videotape of some or all of a workshop
|
||
+ A brainstormed list of viewpoints, a "semantic network" of the
|
||
issues
|
||
+ A list of hypotheses
|
||
+ Any plan to continue discussion on the topic
|
||
|
||
Please send proposal (four copies) to Doug Schuler, 2202 N. 41st St,
|
||
Seattle, WA, 98103. Proposals are due by March 1, 1992. Proposals
|
||
will be reviewed by the program committee. Acceptance or rejection
|
||
notices will be mailed by April 1, 1992. We plan to incorporate
|
||
workshop proposals into the proceedings. Please contact us if you
|
||
have any questions or comments.
|
||
|
||
Doug Schuler, 206-865-3832 (work), 206-632-1659 (home),
|
||
dschuler@june.cs.washington.edu
|
||
|
||
The program committee includes David Bellin (consultant), Eric Gutstein (U.
|
||
WI), Batya Friedman (Mills College), Jonathan Jacky (U. WA), Deborah
|
||
Johnson (Rensselaer Polytechnic Inst.), Richard Ladner (U. WA), Dianne
|
||
Martin (George Washington U.), Judith Perrolle (Northeastern U.) Marc
|
||
Rotenberg (CPSR), Douglas Schuler (Boeing Computer Services), Barbara
|
||
Simons (IBM), Lucy Suchman (Xerox), Karen Wieckert (U. CA. Irvine), and
|
||
Terry Winograd, (Stanford).
|
||
|
||
|
||
Sponsored by Computer Professionals for Social Responsibility
|
||
P.O. Box 717
|
||
Palo Alto, CA 94301
|
||
|
||
DIAC-92 is co-sponsored by the American Association for Artificial
|
||
Intelligence, and the Boston Computer Society Social Impact Group, in
|
||
cooperation with ACM SIGCHI and ACM SIGCAS.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.06
|
||
************************************
|
||
|
||
|
||
|