Computer Underground Digest Volume 3, Issue #3.06 (February 23, 1991)

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 3, Issue #3.06 (February 23, 1991) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto ROUTER AWAITER: Brendan Kehoe USENET readers can currently receive CuD as alt.society.cu-digest. Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig), PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (temporarily down); (2) cudarch@chsun1.uchicago.edu E-mail server: archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS THIS ISSUE: Subject: Moderators' Corner Subject: From the Mailbag Subject: message for help about archive server Subject: Felony Charges Dropped against Phiber Optik Subject: The FBI Comes Rapping, Rapping at Your BBS Subject: Some Thoughts on Government Actions ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #3.06, File 1 of 6: Moderator's corner *** ******************************************************************** From: Moderators Subject: Moderators' Corner Date: February 23, 1991 A few comments in list format: 1) The Len Rose case is still pending. It is currently on a day-by-day status as discussions occur. More on this later. 2) The concern about privacy and First Amendment issues in cyberspace continues. We are re-printing Brock Meeks' original "FBI" article (see file 5 below) because it has aroused renewed interest. Brock also wrote a recent story on the FBI running "sting"-type operations which we encourage all to read. The concern impels us to do a special issue on it all within the next few weeks. 3) For the next month or so, CuD will be coming out about bi-weekly because of time constraints. Gordon has been transferred to Pennsylvania, but will be commuting between the east and west coasts every two weeks as part of his employment. Jim's publishers have lost all sense of humor and are demanding the two promised books, long past deadline. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators Subject: From the Mailbag Date: 23 February, 1991 ******************************************************************** *** CuD #3.06: File 2 of 6: From the Mailbag *** ******************************************************************** From: louisg Subject: posttocomp.org.eff.talk Date: Thu, 21 Feb 91 1:48:12 CST Has anyone seen the announcement for the Ides of March computer conference? The reason it caught my attention is that one of the speakers is Gail Thackery. My question is: why? Why is Gail speaking at a computer conference? What does she know about computers? She probably does know a lot about prosecution, I don't doubt her ability as a lawyer, but what does she know about computer crime specifically? Ok. We all know what she was involved in, but that just proves my point further. Those aren't exactly what you would call "clean" busts. And with Sundevil, there weren't even that many (any?) busts made. It doesn't say much for her ability to prosecute computer crime. What exactly is she going to speak about? I can't figure that out. Maybe she's going to explain what KERMIT is or something. Though, she should explain that to law enforcement officials. See, that's where I have this problem. Here we have an individual speaking at an industry conference, and this individual is not in the industry. She does not affect the industry except in destructive ways (if you want a list on how it's been destructive, E-mail me. It's too long for here). And with her being on the Well and all, and now there's a rumor of her getting some type of "honor" with Barlow at the Comps, Sec, and Priv conference, I'm beginning to wonder how one becomes an authority on computers. Why not honor some beat cops who find some stolen PC's? They have about as much to do with computer crime and how it relates to the industry as Gail. This is ridiculous. Does anyone else see politics or something coming into play here or is it just me? If what law enforcement says is true, that most computer crime goes unreported since companies don't want to publicly admit that they have security problems, then aren't the companies bigger authorities on computer crime than lawyers and cops and feds and what have you? What can Gail tell an employee of AT&T or IBM or DEC or Maxis or Sierra or whoever that they don't already know, and probably know better? She can't tell them how systems are broken into. She can't tell them about a "ring" of hackers/phreaks since there is no such animal. She probably can't even tell them what a macro is. Just what we need. The few decent people in the industry jumping in bed with fascists. Ha! I'm conservative and a capitalist and all that, but I still wouldn't throw what few morals I have out the door for an extra buck or my name in lights or anything. See, I agree with companies when they say that they don't want some punks breaking into their computers. I can even agree with arresting people who do. What I can't agree with is persecuting people (ala Len Rose) or widespread terror tactics (ala Sundevil). If I were a hacker I'd rather have AT&T's internal security knocking at my door rather than Gail & Co. seeing what they've done to people. The only reason I can see for Gail to be there is to bury the hatchet. Well, when you bury the hatchet with people who are experts at wielding one, you can bet it'll end up in your back in the end. Flames gratefully accepted. Louis Giliberto louisg@vpnet.chi.il.us ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ From: pmccurdy@CUP.PORTAL.COM Subject: CompuSec in the news Date: Fri, 15 Feb 91 16:29:52 PST Here in Northern California we have a free computer magazine called Microtimes. It is in a 10 1/2 x 13" format computer mag that has picked up quite a bit of popularity over the last couple of years. It used to be just a place to read advertisements, but these days it has occasional interesting articles, too. The latest issue has a cover suite on computer security. From the table of contents: *Computer Crime: Beyond The Headlines An Interview With Dorothy Denning* by John Perry Barlow Computer security expert Denning and self-proclaimed cognitive dissident Barlow discuss system break-ins, hacker culture, recent court cases, and long-term issues. *Why Defend Hackers?* by Mitch Kapor Lotus founder and Electronic Frontier Foundation chairman Kapor explains what the fledgling EFF organization is up to, and why. *Realizable Fantasies* by Jim Warren Computers, freedom, and privacy - new technology poses new problems and questions. *Cliff Stoll's Practical Security Tips* by Mary Eisenhart *Security In the Single-PC Office* by Paul Hoffman *Risk Assessment For Your Computer System* by Mikael Blaisdell How to determine your security needs and solve them in a cost-effective manner. *Bulletin Boards and the Virus Plague* by Jack Rickard *Computer Security: Information Without Hysteria* by B. McMullen and John McMullen [A review of two new books; *Computers Under Attack*, Peter J. Denning (ACM), and *Computers At Risk*, National Academy Press. Both sound worth reading.] ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ From: decwrl!fernwood!well!jwarren@LLL-WINKEN.LLNL.GOV(Jim Warren) Subject: CompFreePriv Conf Reg Scholarships Date: Thu, 21 Feb 91 21:39:22 pst TEN FULL REGISTRATION SCHOLARSHIPS FOR COMPUTERS, FREEDOM & PRIVACY CONF John Gilmore of Cygnus Support has offered (and prepaid) ten full Registration Scholarships for college and university students wishing to attend the four-day First Conference on Computers, Freedom & Privacy, March 25-28, 1991, at the SFO Marriott near the San Francisco International Airport in Burlingame, California. Students wishing to apply for one of these full-paid registrations should send a *one*-page-only request, to arrive no later than March 10th. They should concisely provide the following information in that one page: 1. Personal information (name, address, phones, possible fax#, etc.) 2. Current college or university, major, areas of special interest, grad/undergrad status and expected graduation date. We are especially seeking students majoring in law, law enforcement, political science, journalism, business, information science and related disciplines. 3. A specific statement that they are certain they can arrange all needed travel and accomodations for the four-day event. 4. A specific statement that they will attend the full four days of the event from Monday, 9am, to Thursday, 5:30pm, including the Tuesday and Wednesday dinner sessions (also prepaid). 5. A paragraph stating why they are interested in attending the event. 6. A paragraph stating what they might, or hope to, do with information and insights gleaned from this Conference. The one-page letter or fax should arrive no later than March 10th, sent to: John Gilmore Liberty Scholarships (fax is fine) CFP Conference, 345 Swett Road, Woodside CA 94062; fax/415-851-2814 The ten recipients will be notified no later than March 15th, but may be notified much earlier. (Due to the very tight time constraints, we reserve the right to grant awards to especially deserving applicants before the March 10th deadline.) P.S. -- MAKE HOTEL RESERVATIONS *SOON*! If you are planning on attending the CFP Conference, but have not yet made your reservations at the Marriott (800-228-9290 #3), you should do so ASAP, if you wish to be assured the special $99 Conference discount rate. As we approach the March 25th Conference opening, the Marriott is permitted to release unbooked rooms -- which means they either won't be available, or may require much higher rates (rack rates are $140). Use it or loose it! :-) --Jim Warren, CFP Conference Chair ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ From: The Friendly Folk at NIA (Network Information Access) Subject: What is NIA? From: samp@NUCHAT.SCCSI.COM(Sam Parikh) Date: Fri, 1 Date: Feb 91 15:48 CST Network Information Access is a text magazine, that relates to the underground telecom industry. Articles range from Unix, Vax, and such systems. Covering everything from computer crime down to the latest computer bug that is floating around. If you have ever read Phrack, LOD, PHUN, and magazines of that type of nature, we are somewhat like that. But more/less reframed then those. Currently we have 69 issues out, around the middle/end of each month we will mail off the next current issue. All BACK ISSUES can be found at the CUD (Computer Underground Digest) archive site, please refer to CUD for more information or subscribe to their echo at comp.alt.society.cu-digest. There is no actual "deadline" for articles, reports or papers to be submitted, so if you HAVE anything, or are WORKING on something, please think of us first. If you have anything to send to NIA, send the completed work, as YOU WANT it to appear in our newsletter and after reviewing your article, checking to see if we can include it in our NEXT mailing it will go out when our next issue is released. All articles are to be sent to elisem@nuchat.sccsi.com. All addresses sent to NIA to be added to our mailing list is kept in the stricket confidence, we do NOT give out our list, So YOUR ADDRESS is kept confidential and private, and so as not to have your address flooded w/ hundreds of "Please subscribe to MY newsletter" type mailings. If an address bounces back as "UNKNOWN" or to such, we will delete that address off of our list, so if you change your address, make sure you notify us of the change or you will loose the next issue. If your mailer can NOT handle files in range of 200k send a note of that to us, so that we can make the appropriate changes and get you the latest copy. I hope that this explains to you what NIA is and hopefully you'll continue to read us, pass us around, and heck, recommend us to a friend. Creators: Judge Dredd and Guardian Of Time elisem@nuchat.sccsi.com ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: kusumoto@CHSUN1.UCHICAGO.EDU(Bob Kusumoto) Subject: message for help about archive server Date: Wed, 20 Feb 91 19:12:07 CST ******************************************************************** *** CuD #3.06: File 3 of 6: CuD Archive Server *** ******************************************************************** Some people seem to be having problems using the email archive server based here. Here are some helpful hints: a) place all commands to the archive server in the BODY of the message. The server will ignore commands on the subject line. b) do not use any slashes ('/') in any command. The server does not know how to handle commands with slashes in the command. c) use the "path" command. Although we do have a fairly smart mailer, it's not foolproof. This is especially true for sites that are not directly on the Internet. UUCP sites should locate a node on the Internet (like uunet) and use it as a base. Bitnet sites should add the suffix .bitnet to the end of their hostname. For example: path uunet.uu.net!nexthost!myhost!me path me@bithost.bitnet This should eliminate problems getting to you. d) If you're asking for many files, it helps to break up the send command into multiple files. This is especially true for large files. For example: send cud cud1.01 send cud cud1.02 send cud cud1.03 is better than send cud cud1.01 cud1.02 cud1.03 e) Some helpful commands that the server knows: index index cud send cud cud-arch send cud chsun1.email.files Also, try and keep the files you request per send command to under 45000 bytes. Anything much larger than that will not be sent. If you want very large files, send a special request to archive-management@chsun1.uchicago.edu and special arrangements will be made. f) This is not the address for requesting futures issues of CuD to be mailed to you. You should send those requests to: TK0JUT2@NIU.bitnet and place the address for being placed on the mailing list. Thanks, Bob Kusumoto chsun1 archive management ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: NEWSBYTES (reprint) by John F. McMullen Subject: Felony Charges Dropped against Phiber Optik Date: February 20, 1991 ******************************************************************** *** CuD #3.06: File 4 of 6: No Felony Charges against Phiber O. *** ******************************************************************** FELONY CHARGES DROPPED AGAINST "HACKER" 2/20/91 NEW YORK, NEW YORK, U.S.A., 1991 FEB 20(NB) -- The felony charges of computer tampering and computer trespass have been dropped against Mark Abene, known throughout the "hacker world" as "Phiber Optic". Abene pleaded guilty to a misdemeanor charge of unauthorized use of a computer and will be sentenced on April 4th on that count. The arrest of Abene by New York State Police on February 5th followed over a year of uncertainty for Abene who had computer equipment and notes seized during the execution of a search warrant on January 24th, 1990. At the time of the arrest, it was alleged that Abene had electronically invaded a New York Telephone Company computer and activated an unused telephone number. He then supposedly arranged call forwarding to a "900" number to provide free access to an otherwise chargeable service. These allegations led to Abene being charged with the two felonies and a misdemeanor for theft of services. The dropping of the felony charges on February 19th in New York state court was accompanied by a changing of the theft of services charge to one alleging unauthorized use of a computer and it was the new charge to which Abene pleaded guilty. Abene's attorney, Carol Grumbach of the firm of Levinson & Kaplan told Newsbytes that she expects the April 4th sentencing to result in Abene being granted youthful offender status and court records sealed as a result. She also expects the remaining charge to be conditionally discharged based on Abene's performance of community service activities. Abene, commenting on the resolution of the case, told Newsbytes "I'm very glad that this is over. At least now, I know where I stand and that's much better than it's been for the last year." Abene also said that the computer equipment seized is still in the custody of the authorities and that it is, as yet, unclear when it is to be returned. On the same day in 1990 that the Abene's equipment was seized, search warrants were also executed by New York State Police and United States Secret Service agents on three other New York residents known by the hacker names "Acid Phreak", "Scorpion" and "Flash". Newsbytes was told by informed sources that Acid Phreak and Scorpion have been notified by the United States Attorney for the Eastern District of New York that they are to be charged under federal statutes for computer-related crimes. Newsbytes was also told at the time of the Abene arrest that it was decided to charge him under state law because his age at the time of the alleged incident would have resulted in his classification as a minor under federal law. He was charged as an adult under New York law. Flash was arrested on February 13th by New York State Police and U.S. Secret Service agents. was identified as Albert Kong, 23 and charged with felony counts of computer trespass and 2nd degree grand larceny. At the time of the arrest, New York State Police Senior Investigator Donald Delaney told Newsbytes that there was no apparent connection between the Kong case and the other cases. (Barbara E. McMullen & John F. McMullen ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Brock Meeks (Reprinted with permission) Subject: The FBI Comes Rapping, Rapping at Your BBS Date: February 21, 1991 ******************************************************************** *** CuD #3.06: File 5 of 6: The FBI Comes Rapping..... *** ******************************************************************** COPYRIGHT (C) 1991 BROCK N. MEEKS INDIVIDUALS MAY COPY THIS ARTICLE TO DISK FOR PERSONAL USE. TRANSMISSION OF ANY KIND IS PROHIBITED WITHOUT CONSENT OF AUTHOR The FBI Comes Rapping, Rapping At Your BBS by Brock N. Meeks (first published in MICROTIMES #44, June 1988) If that new user on your local bulletin board system (BBS) seems to be asking a few too many personal questions, you might want to reconsider answering, unless of course, you don't mind your answers being stored in a database maintained by the Federal Bureau of Investigation (FBI). That new user just might be a member of a special FBI task force scouring the nation's electronic landscape. Or so contends Glen L. Roberts, director of _The FBI Project_ which publishes _The FBI and Your BBS_ and a privacy/surveillance newsletter called _Full Disclosure_. "Now wait a minute," you say, "That smacks of radical LaRouche-type paranoid rhetoric!" OK, so I was a bit leery, too. After all the FBI is such an easy target. Then I started rummaging through an old, coffee cup-ringed file labeled only "FBI/Computer Squad." In there I found several old clippings and other documentation that started to back up Roberts' statements. If You Dig, You Hit Dirt ========================= In 1984 a short series of discreet advertisements. placed by the FBI, appeared in a few computer trade publications and in _The Wall Street Journal_. The message was simple, and went something like: "We're looking for computer literate persons to join the Bureau." There was no mention of any special task force; however, it was clear that the Bureau wanted to upgrade their high-tech prowess. Although the FBI won't confirm the existance of a computerized "hit squad," a public relations officer from the Bureau did confirm that they "have made an extraordinary effort to recruit more technically oriented personnel" since 1984. If you dig hard enough, you'll find substantial evidence that the FBI is most definitely working overtime in its efforts to monitor the electronic community. "They are desperately wary of the way information flows so freely in this medium," says Roberts. There was a number scrawled on the inside flap of that dog-earred folder. It was annotated "Former agent; possible source." I called the number; I got a story. "I was recruited in 1983 by the FBI for my computer skills," the former agent told me. Because he stills does some consulting for the Bureau, he asked not to be identified, but he laid out a very specific plan by the FBI to increase their knowledge of the electronic communications world. He confided, "If the Bureau is monitoring BBSs, it's a small group." Much more likely, he offered, the FBI is drawing on the expertise of a small band of high-tech freelance snoops to augment their staff, until their skills are honed. One member of this freelance team is the well-known John Maxfield. He's appeared in everything from the _Washington Post_ to the Today Show to _MicroTimes_, bragging about his undercover infiltration of "criminal BBSs" on behalf of the FBI. (When I asked a 17-year-old hacker from Texas why no one's taken out Maxfield, via computer, the kid told me: "He's too visible; he's guarded pretty well as far as his computer records go; we've tried.") Tradition ========= Certainly the FBI has a tradition of "investigating" groups of people it deems "unsavory" or threatening. Recent published reports told of how the FBI has gathered files on several pro- Sandanista groups here in the U.S. This type of information gathering process seems to be standard operating procedure for them. The _New York Times_ broke a story last year on its front page that detailed how FBI agents were visiting New York city libraries and asking the librarians to monitor certain people and keep a record of the books they checked out; the list would be given to the agent at a later date. NYC librarians flatly declined the FBI offer. Perhaps the most startling aspect of the story was the "it doesn't hurt to ask" attitude that flowed from the FBI when they were confronted and asked for an explanation. In Roberts' _The FBI and Your BBS_, the a brief history of the FBI's willingness to gather all known information on a target group is outlined. Pulling from the Final Report of the Select (Senate) Committee to Study Governmental Operations with respect to Intelligence Activities, Book IV, Supplemenatry Reports on Intelligence Activities, Roberts includes this excerpt: "Detectives were sent to local radical publishing houses to take their books. In addition, they were to find every private collection or library in the possession of any radical, and to make the arrangements for obtaining them in their entirety. Thus, when the GID (General Intelligence Division) discovered an obscure Italian born philosopher who had a unique collection of books on the theory of anarchism, his lodgings were raided by the Bureau and his valuable collection become one more involuntary contribution to the huge and ever-growing library of the GID. [pages 87-88]." Change "any radical" to "any BBS" and "book" to "disk" and quite suddenly the electronic landscape turns into a winter still-life. Data Collection ================ Roberts, quoting from his report, says, "Unlike other communications media, information on a BBS does not get read by anyone before its instantaneous publication. Therefore, the FBI has much less of a possibility of intimidateing the owner of a BBS into _not_ publishing certain information. The FBI also acts as if BBSs have a monopoly on the distribution of so-called 'illegal information.' The FBI often uses this 'danger' as justification to monitor the activities on these systems. In reality, however, BBSs transfer much less 'illegal information' than the phone system." Roberts statements are worth noting in light of the government's increased interest in the marriage of criminal activity and electronic communications. A 455-page report issued by the President's Commission on Organized Crime, dealing with drug abuse and traffiking cites that fact that crime has moved into the high-tech arena. The report states "To the extent that law enforcement agencies' capabilities and equipment are inferior to those of drug traffickers, immediate steps should be taken to rectify the situation." The report then recommends that _data-gathering_ efforts of several agencies (including the FBI) should be tied together in one "all-source intelligence and operations center." The spirit of that document is being embraced by the long-distance phone companies. Tired of the multi-million dollar losses due to stolen or illegally acquired access codes, these companies are circling the wagons in a spirit of high-tech cooperative surveillance never before experienced in the commercial world. Quoting from a _Washington Post_ article, here's what Robert Fox, US Sprint's director of security, says: "To shut down theft, the companies use each other's security services and the help of local law enforcement officials, the Secret Service and the Federal Bureau of Investigation. Your major toll carriers may be competitors, but in this one instance we share information and resourses. We do everything from technical to on-street surveillance." Evidence that the FBI is actively monitoring BBSs also came to light in the case of a Denver talk show host that was assassinated by a neo-Nazi group, white supremacy group. When it was discovered that Robert Miles, one of the defendants, was a "computer wizard" the FBI began tracking his communications with other neo-nazi groups; the FBI found out, and mapped, an intricate network of BBSs, by placing a bug in his home. Where was bug placed? Inside Miles' modem. Why there? Simple. Any calls he made with his modem would be to other online sources; in this way, the FBI reasoned, they could chart the (nationwide) network of neo-nazi BBSs, thus following their standing tradition of "keeping tabs" on organizations, much like they did in the '60s when they had agents infiltrate several radical organizations. Any Problem Here? ================= There are no laws prohibiting the FBI (or other agencies) from monitoring the public message traffic on a BBS; the Electronic Communications Privacy Act of 1986 protects private messages and privately stored files only. But what about an FBI agent monitoring a BBS solely for the purpose of gathering information on the board's users? Any problem here? The former FBI agent I spoke with raised the concern that such casual monitoring might be a violation of the 1968 Wiretap Act. "In order for a wire tap, you have to get a court order. Now if an FBI agent is monitoring a BBS to gather information, that becomes an interesting question, because there are very specific federal rules 'At what point does monitoring turn into a wiretap-like act?'" Good point. And the upshot is: there are no rules. Unless that agent is asking for private message traffic, he can, without impunity, monitor, store, and otherwise manipulate your public messages as he sees fit. Roberts points out that a BBS with public access is fair game for any kind of governmental snooping. But there is a way to make such casual snooping by a federal agent a crime. "If you want your BBS readily accessible to the public but want to protect against unwarranted monitoring, you have to provide a warning to prospective users," says Roberts. "It should read: 'This BBS is a private system. Only private citizens who are not involved in government or law enforcement activities are authorized to use it. The users are not authorized to divulge any information gained from this system to any government or law enforcement agency or employee.'" This does two things. It makes the board "private" in that the sysop decides who gets access and who does not. This isn't so unusual; most BBSs now have some sort of validation anyway. Second, it makes any kind of monitoring by the FBI (or other agencies, such as the Secret Service) a criminal offense, and forces them to use the established guidelines of gaining information via a court ordered search warrant. The warning also protects you in another way: it stops "freelancers" from doing the Bureau's work. Get Real ========= How real is the possibility of the FBI monitoring your BBS? _Slim_. Unless of course you happen to run a board dedicated to say, the Sanctity Movement, or one that supports the Sandanistas or . . . any topic perceived to be of a questionable nature by the FBI. The stories provided here bear out, if nothing else, an increased interest by the FBI in electronic messaging. How extensive is the FBI's actual fact gathering by monitoring BBSs? No one knows really knows. However, given the history of Bureau, and the hard facts that crime in the information age makes full use of all the technology it can get its hands on, it's a small leap to believe that at least specific monitoring, of certain target groups, is taking place. (Given the manpower shortage of the Bureau, and its overwhelming case load, I would find it hard to argue for large-scale indiscriminate monitoring.) Where does that leave you and me in all this? Back to square one, watching carefully what we say online. If you're a member of a "controversial" BBS, you might pass the concerns of Roberts on to your sysop. If you are a sysop, you might want to consider adding a bit of protection to the board . . . for the rest of us. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Brock Meeks is a San Diego-based columnist. His favorite radical BBS is . . . well . . . private. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: pmccurdy@CUP.PORTAL.COM Subject: Some Thoughts on Government Actions Date: Fri, 22 Feb 91 07:36:12 PST ******************************************************************** *** CuD #3.06: File 6 of 6: Some Thoughts on Gov't Actions *** ******************************************************************** In CuD 2.15, the moderators ask "What is the relationship between law enforcement and the media?" Later, they state "One of our goals is to expand their literacy." I have combined (and slightly modified) these two ideas and arrived at the central theme of this article. THE NATURE OF THE BEAST We of the CU tend to see our cyberworld as an extension of the real world. Even the terminology in use among computer folks supports this. By merely sitting at your system and striking keys or manipulating your rodent, you can "enter" another system, "take" or "move" files and programs. Beyond the way we picture these things and the terminology we use, the courts have enacted laws (at all levels of government) that give a legal basis to the idea that the whole of a computer file is more than merely the sum of its individual electronic bits. Let's look at this idea from another angle. No one will dispute that an author should be able to copyright a book or that an inventor should be able to patent a widget. But what is a program (or text file) other than a new means of representing the author's printed word or the work of a clever inventor? So, aside from a few subtle issues (thoughtfully discoursed by the likes of Dark Adept, Offer Inbar, David Daniels, et al), we all agree on the need for laws that protect electronic property and privacy just as we have laws that protect personal property and privacy. THE ABUSES OF LAW ENFORCEMENT AGENCIES (LEAs) As a self-styled libertarian, it makes me sick to read about the continued abuses perpetrated by overzealous LEAs upon the members of the computing community. I am an optimist at heart and I find it hard to believe that the people who work in these LEAs are as vindictive, or at least as ignorant, as they at first glance appear. As ever more reports of their abuses mount, however, I find it hard to maintain a positive attitude. No reader of this journal needs to be reminded of all the LEA abuses of the last few years. Two acts, however, stand out in my mind as worth recounting. The first involves the seizure of, among many other things of questionable use to an investigation, a laser printer at Steve Jackson Games. The reason given buy the US Secret Service (SS) for its confiscation was that it had RAM. One of two things must be true here. Either the agents serving the warrant were so ignorant of computer technology that they believed that printer RAM could be used in illegal activities (in which case they shouldn't have been working on this type of case), or the seizure of the printer was committed as a punitive act against the EMPLOYER of a SUSPECTED perpetrator of a criminal act. If the latter is the case, and I believe it is, then it is an utterly reprehensible (and possibly illegal) act. The second act that stands out in my mind is the use by the SS of a paid, volunteer informant in the E911 case. The details about the exact nature of how the SS used this informant are not yet clear. From what is currently known, however (see CuD 3.02), it appears that the SS's use of this miscreant borders very closely on entrapment. I won't even get myself started commenting on the kind of detestable SLIME that would *volunteer* to due this kind of work. AN EXAMINATION OF WHAT MOTIVATES LEA'S To say that LEAs have been overzealous in their investigations of computer crime is a gross understatement. It won't do us any good merely to point fingers at the first "bad guy" we see; identifying the culprit won't solve the problem. We need to look beyond the immediate problem; we need to look at the underlying causes of the problem if we are to discover what we can do to improve the situation. LEAs are run by Directors who sit in Washington fighting for funds with which to run their organizations. Inasmuch, they are heavily influenced by politicians on Capitol Hill who are, in turn, primarily influenced by public opinion. Now, on the subject of computer crime (among many others), the public is predominantly influenced by the media. Therein lies the problem. The media have seldom shied away from writing about a subject, even when the facts are slim or when their understanding of an issue is nil. This becomes painfully apparent when you read articles about computer crime, viruses, hackers, etc. Until last year, I worked in security, concentrating on computer security. I considered it a professional responsibility to read every article I could find on topics relating to computer security. With few exceptions, these articles merely rehashed material from previous articles, perpetuated misconceptions, and consistently fed the public hysteria that computer hackers were hell-bent on destroying Western Civilization. I am reminded of a line from the movie Ghostbusters. After informing the group that it would be "bad" to cross the beams on their nuclear accelerators, Egon is asked to define "bad." "Imagine every molecule in your body exploding at the speed of light" he explains, "and all life as we know it ceasing to exist." It is in just such a manner that the media portrays the issue of computer crime. So that is the scenario: A uninformed media has whipped an ignorant public into a frenzy. The public puts pressure on politicians (who are genetically incapable of accepting responsibility) who, in turn, pressure LEAs for results. LEAs, no more computer literate than the media or public, react by seeking immediate results. Civil rights are trodden upon. THE CRUX OF THE MATTER The underlying theme in the scenario that I have described is ignorance or a lack of even a minimal amount of computer literacy. The media, the public, and the LEAs are all ignorant of the technologies, as well as the associated social issues, relevant to this matter. These social issues in particular can only be truly appreciated and understood by those with a level of computer literacy that is plainly absent in most of the parties to this problem. I have now stretched the blame for this problem from the LEAs, to politicians, and on to the media and public. But the responsibility for the problem does not entirely end there. A good argument can be made that we in the computing community, too, must take a measure of responsibility. For too long we have been content to live in our own little piece of cyberspace, enjoying the blinding pace of advances in computing technologies, and ignoring the problems and issues that accompanied these technologies. We can no longer sit on the sidelines and watch. These issues are real, they affect us all, and we must all work to solve them. WHAT WE CAN DO So what can we, as individuals, do to help solve this problem? If you accept the premise that a lack of computer literacy (including the related social issues) is the underlying problem, then the answer is clear. It is incumbent upon us to educate the uneducated. In summing up his article in CUD 2.15, Dark Adept enjoined us to help out the EFF, fight for our rights using only legal means, not to hack security but to build public access systems, and to expose the truth every chance we get. I couldn't agree with him more. In his excellent book "The Cuckoo's Egg", Cliff Stoll makes the point that the mere *impression* of computer crime endangers the thin veil of trust upon which most networks are built. We cannot be content with merely maintaining current networks, we need to encourage creation of more and larger networks. We must lead exemplary electronic lives; we cannot tolerate criminal activity or any other activity that puts at risk our access to information networks. Beyond this, however, we must strive to educate all others involved with this issue: the media, the public, and the government. "But that's everyone!", you say? That's right. We have to do our best to raise everyone's level of computer literacy to the point where the average Joe (or Jane) on the street would experience the same level of disgust as the rest of us at acts such as the seizure of a laser printer. IN SUMMARY So there it is. We must continue to discuss these issues (hats off to CUD), keep our electronic delvings legal, and educate the world. The first two are easy. Educating the world will be the real challenge. To once again quote Dark Adept, "The only way to conclusively affect the existence of the underground is to affect society." ******************************************************************** ------------------------------ **END OF CuD #3.06** ********************************************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank