Computer underground Digest Thu, Jan 8, 1992 Volume 4 : Issue 01 Moderators: Jim Thomas an

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer underground Digest Thu, Jan 8, 1992 Volume 4 : Issue 01 Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #4.01 ( Jan 8, 1992) File 1--Moderators' Corner File 2--How The Government Broke The Law And Went Unpunished File 3--Federal Seizure of "Hacker" Equipment" (Newsbytes Reprint) File 4--Re: FBI vs. Kiddie Porn (CuD 3.44) File 5--Re: Whole Earth Review Questions Technology File 6--Law Enforcement, the Government & You Issues of CuD can be found in the Usenet alt.society.cu-digest news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132), chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail with the subject "help" (without the quotes) to archive-server@chsun1.spc.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Thu, 7 Jan 92 10:44:31 CST From: Moderators Subject: File 1--Moderators' Corner Issue 4.01 launches the new year. For those asking why there was no CuD for the past three weeks (#3.44 was the final issue of '91), holidays are less than ideal for sending out mail. Systems, people, and mysterious cosmic forces go walk-about, and too much mail bounces back. That, coupled with Gordon's two-week jaunt to Utah and Jim's trek to Michigan, caused the delay. Apologies to those who sent articles that were delayed. We will catch up in the next few weeks. We encourage longer posts and especially encourage readers to send media articles and stories from their local area that might not make the national press. Contributors should be sure that, for longer articles, no copyright is violated. If there is any question, then excerpts should be sent. Shorter new stories of 25-30 lines or less are, we are told, generally "fair use." ------------------------------ Date: Thu, 19 Dec 1991 13:04:39 -0500 From: Craig Neidorf Subject: File 2--How The Government Broke The Law And Went Unpunished JUSTICE DENIED How The Government Broke The Law And Went Unpunished by Craig Neidorf kl@stormking.com BACKGROUND: On January 18, 1990, Craig Neidorf, a 20-year-old college junior and editor of an electronic newsletter, was visited by Agents Tim Foley and Barbara Golden of the United States Secret Service (acting on behalf of William Cook, an assistant U.S. Attorney in the Northern District of Illinois, Eastern Division), and Reed Newlin, an agent of Southwestern Bell security of Missouri, acting under color of law in conjunction with the U.S. Secret Service. Neidorf was questioned as a criminal suspect and eventually charged in a multi-count indictment with violations of the Computer Fraud & Abuse Act, the Interstate Transportation of Stolen Property Act, and the Wire Fraud Act, all because of his involvement as editor of a newsletter that disseminated to the general public from his bedroom at the Zeta Beta Tau fraternity house in Columbia, Missouri. All such charges were subsequently dismissed by the U.S. Attorney's Office after a week of trial. On January 19, 1990, the above named agents returned to Craig Neidorf's fraternity house accompanied by a uniformed officer of the University of Missouri Police Department. They produced and executed a search warrant that empowered them to seize all materials relating to Neidorf's newsletter, specifically computer hardware, work product of the newsletter, and documentary materials of the newsletter. These actions by the various law enforcement authorities constitute an actionable offense in violation of the Privacy Protection Act of 1980. __________ TO THE READER: During the summer of 1990, I wrote the following review of how the Privacy Protection Act of 1980 could have been applied to the above described incident. After several months of trying to find a way to file a claim, I have finally come to realize that the goal I seek is unreachable because I do not possess the financial resources to hire legal counsel and no law firm or organization capable of handling the case will agree to take it on a contingency basis. Furthermore, as I read the law, the statute of limitations on this type of action is two years and January 19, 1992 is rapidly approaching. Because of reality superceding idealism, I have decided instead to present my case to you, the public, in the hopes that perhaps something good results from people learning the truth, despite that those truly guilty will not be punished. I will attempt to lay out and describe the details, ramifications, and importance of these events as they relate to the Privacy Protection Act of 1980 and as a convenience, I will be referring to myself in the third person and narrating from an advocate's point of view. I will be citing without quotation directly from the Legislative History of the Act and the Act itself as found in P.L. 96-440, pages 3950-3976 and Title 42, Chapter 21A, Sections 2000aa-2000aa-7. __________ *** What Does The Privacy Protection Act of 1980 Do? Part A of S. 1790 provides broad protections against searches for documentary materials which are in the possession of those engaged in First Amendment activities. When the materials sought consist of work product, a general no search rule applies. When the materials sought constitute documentary materials other than work product, a subpoena-first rule is generally applicable. The title applies to state, local, and federal law enforcement officers. Because disseminating information regularly affects interstate commerce, congressional authority to regulate state and local enforcement in this statute is based on the commerce clause United States Constitution, Article I, Section 8. *** What Are The Unlawful Acts? Unlawful acts under section 101 involve searches and seizures performed only by governmental officials, not private citizens, and conducted "in connection with the investigation or prosecution of a criminal offense." It could be argued that Southwestern Bell is also guilty of violating the Act because of Reed Newlin, a security person from Southwestern Bell, who acted under color of law alongside the law enforcement agents in performing the physical search of Neidorf's room. Newlin himself did enter Neidorf's room and physically handle his computer equipment (ex. going through Neidorf's dresser drawers and pulling out an Apple 1200 baud modem). *** What Does the Privacy Protection Act Protect? The phrase "in connection with a purpose to disseminate to the public ... a form of public communication" reaches not only to materials which are to be disseminated to the public or which contain information that is to be incorporated in a form of public communication, but also materials which are gathered in the course of preparing such a publication. For example, a reporter may prepare an article which his editor decides should not be published; nonetheless, the reporter's interview notes and draft of the article would remain protected by the statute. Similarly, all of an author's research notes would be protected, although only part of the research was ultimately included in the publishing product. In order to qualify for the statute's protections, the materials must be possessed in connection with a purpose of disseminating some form of public communication. The term "form of public communication" is designed to have a broad meaning. The fact that a local newspaper, for example, has a small circulation does not preclude application of the statute to searches of the files on the newspaper. *** What Is Work Product? In section 107(b), Work Product is defined as to encompass the materials whose very creation arises out of a purpose to convey information to the public. They may be created by the person in possession of the materials, or by another person in anticipation of public communication. An example of what this means would show that financial records of a business which are held by a member of the press are not work product inasmuch as they are not created in connection with plans to "to communicate to the public." But, a report prepared by a member of the press based on those financial records would constitute work product, as would such a report prepared by a whistle-blower who intended that the contents of the report be made public. *** How Can A Law Enforcement Agent Determine What Is Work Product? In the interests of allowing for some objective measure for judgment by the Office, the Committee (Congress) has provided that the work-product must be possessed by someone "reasonably believed" to have a purpose to communicate to the public. *** Exceptions That Allow Law Enforcement Officers To Use A Search Warrant To Seize Work Product Instead Of A Subpoena There are two exceptions, but neither exception applies in this situation. (1). The Suspect Exception allows a search warrant to be used on a person who is not an innocent third party, but rather an actual suspect. Neidorf was indeed a suspect of a criminal investigation, but there is an exception to this exception. The suspect exception may not be invoked if the only offense of which the possessor is suspected is the receipt, possession, communication, or withholding of the materials or the information contained therein. The purpose of this provision is to prevent possible abuse by law enforcement authorities. For example, without this provision, if a reporter had knowingly received a stolen corporate report, the suspect exception could be invoked because the reporter might be said to be guilty of a crime of receipt of stolen property. To permit a search under such circumstances might unduly broaden the suspect exception. In other words, law enforcement agents could simply charge the journalist with possession or receipt of stolen goods, general very broad offenses, and proceed to seize the desired materials because he was a suspect in that basically contrived crime. The Department of Justice has felt that this is not good law enforcement policy. Please Note: The above description very closely resembles the scenario that occurred in the Neidorf case if you insert "911 document" in place of "stolen corporate report." The suspect exception is retained in cases where the receipt, possession, or communications of materials constitutes an offense under the existing language of espionage laws or related statutes concerning restricted data. Because the suspect exception may not be invoked if the only offense of which the possessor is suspected is the receipt, possession, communication, or withholding of the materials or the information contained therein, this exception is not applicable. (2) The second exception allows a lawful search warrant if there is reason to believe that the immediate seizure of the materials are necessary to prevent death of serious bodily injury. This is clearly not applicable to this case. *** What Are Documentary Materials? Section 107(a) defines documentary materials as to encompass the variety of materials upon which information is recorded. Included within the definition are not only written and printed materials such as reports, records, and interviews, but also films, photographs, tape recordings, and videotapes. Not included in this definition are contraband or the direct fruits of a crime, or the things or property designed or intended for use in the offense, or have been used as a means of committing the offense. Examples listed include; money, guns, weapons, and narcotics. *** Exceptions That Allow Law Enforcement Officers To Use A Search Warrant To Seize Work Product Instead Of A Subpoena There are four exceptions. The first two are the same as those seen above in reference to seizure of work product. Since they have already been addressed, I will now focus on the two remaining exceptions. (3) An otherwise lawful search for non-work product documentary materials if there is reason to believe that the notice provided by a subpoena duces tecum would result in the destruction, alteration, or concealment of the materials. Agent Tim Foley's own testimony at the July 1990 criminal trial of Craig Neidorf describes the interview and the actions taken by Neidorf prior to obtaining the warrant. This same testimony will clearly show that there would be no reason to believe that any evidence would have been tampered with or destroyed. Indeed, Neidorf cooperated fully from the beginning of the investigation, turning over several documents and providing information to the agents prior to the search. This exception is therefore not applicable. (4) If after a proceeding resulting in a court order directing compliance with a subpoena duces tecum, the possessor of the materials still refuses to produce the materials sought, a search warrant may be obtained. This exception is clearly not applicable because a subpoena was never sought in the first place. __________ I believe that a careful inspection of the affidavit used to obtain the search warrant, the items specified for seizure in the actual warrant, and the testimony of Agent Tim Foley of the U.S. Secret Service in the criminal trial "United States v. Craig Neidorf" will clearly demonstrate that the Secret Service, the U.S. Attorney's Office, and potentially others (i.e. University of Missouri Police Department and Southwestern Bell) are guilty of violating the Privacy Protection Act of 1980 as described above. __________ *** What Are The Remedies? Section 106(a) provides a civil cause of action for damages for violations of the Act. Such an action may be brought by any person aggrieved by a violation of the statute. When a government until is liable under this Act for a violation of this statute committed by one of its officers of employees, it may not assert as a defense to the action brought against it the immunity of the officer committing the offense or the good faith belief of the officer in the lawfulness of his conduct. The traditional doctrine of judicial immunity is preserved and available to the government entity. In the past, the good faith defense has often precluded the recovery for unlawful searches and seizures. Prohibiting the use of this defense when the government unit is the defendant in a suit brought under this statute is not only a fair means of assuring compensation for damages resulting from unlawful governmental searches, it will also enhance the deterrent effect of the statute. The good faith defense can be applied only in situations where the offender had reason to believe that the immediate seizure of materials was necessary to prevent the death of, or serious bodily injury to, a human being. This is not applicable. *** What Types Of Damages Could Be Collected In A Lawsuit? Section 106(e) describes that a plaintiff bringing an action under this section on the statute may recover actual damages resulting from a violation of the provision of the Act, but that in any event he is entitled to recover liquidated damages of not less than $1,000. The provision for a minimum amount of liquidated damages is essential because it often will be difficult for a plaintiff to show more than nominal or actual damages. Punitive damages may also be awarded if warranted, as well as attorney's fees and litigation costs. It is appropriate that the governmental unit be liable for punitive damages. OTHER REMARKS TO THE READER: In this type of case, the main goal is probably punitive damages. A message needs to be sent that violations of privacy and the law must be prevented and no one is above the law (least of all those charged with the duty of enforcing it). My reseach indicates that although there are probably many cases, there are only two cases on the books where the Privacy Protection Act of 1980 has been used in a civil lawsuit. Neither case is on point. The current litigation by the Electronic Frontier Foundation in the Steve Jackson Games case also addresses the Act, but its facts are different in that the SJG case refers to hardcopy publishing using computers whereas a Neidorf case would have addressed electronic publications specifically. The Neidorf case is supported by strong evidence and the legislative history of the Act shows this case to be exactly the type of which the Act was designed to combat. A message needs to be sent that the law is meant to be obeyed, not just law about computers, but law in general. Clearly, establishing rights for an electronic publication is another step closer to a guaranteed right of free electronic speech. In this day and age, WE DARE NOT GIVE UP THAT RIGHT! ------------------------------ Date: From: mcmullen@well.sf.ca.us Subject: File 3--Federal Seizure of "Hacker" Equipment" (Newsbytes Reprint) FEDERAL SEIZURE OF "HACKER" EQUIPMENT 12/16/91 NEW YORK, NEW YORK, U.S.A., 1991 DEC 16 (NB) -- Newsbytes has learned that a joint Unites States Secret Service / Federal Bureau of Investigation (FBI) team has executed search warrants at the homes of so-called "hackers" at various locations across the country and seized computer equipment. It is Newsbytes information that warrants were executed on Friday, February 6th in various places including New York City, Pennsylvania and the state of Washington. According to informed sources, the warrants were executed pursuant to investigations of violations of Title 18 of the federal statutes, sections 1029 & 1030 (Computer Fraud and Abuse Act, 1343 (Wire Fraud) and 2511 (Wiretapping). Law enforcement officials contacted by Newsbytes, while acknowledging the warrant execution, refused to comment on what was called "an on-going investigation." One source told Newsbytes that the affidavits underlying the search warrants have been sealed due to the on-going nature of the investigation." He added "There was obviously enough in the affidavits to convince judges that there was probable cause that evidence of a crime would be found if the search warrants were issued." The source also said that he would expect a statement to be issued by the Secret Service/FBI team "somewhere after the first of the year." (Barbara E. McMullen & John F. McMullen/19911216) ------------------------------ Date: Wed, 18 Dec 91 11:47:09 CST From: knute!canary!chris@UUNET.UU.NET(Chris Johnson) Subject: File 4--Re: FBI vs. Kiddie Porn (CuD 3.44) Brief comments on: "FBI Investigates Computerized Child Pornography" In the referenced article, the following statement was made: "The FBI said computer bulletin boards are often used by child porno-graphers, but for communication purposes only, not for the actual transmission of the illegal material." My feeling is that child pornography is probably one of the biggest straw men in this day and age. It's bigger than communists in the closet, so to speak. Why do I say this? We all probably read enough media to see references to child pornography at least several times a month. There's certainly a lot of hysteria and what sounds like a lot of law enforcement activity in the area. Yet I've never seen any, nor do I know anyone who has seen any. Not that I'm a collector of pornography by any means. I guess I sort of always believed that it must be a Real Big Problem or I wouldn't be hearing about it so much. Then I report an investigative article. The writers actually looked into the reality. Guess what? They couldn't find any either. In fact, the only so-called purveyors they could find were law enforcement sting operations! The upshot was this: more child pornography is advertised and distributed by law enforcement people trying to catch other pornographers and child molesters than by anyone else, by several orders of magnitude it appears. A lot of this seems to be a left over from the Meese commission and it seems the real idea is to censor through intimidation and out-right harassment of anything outside Meese's and others puritanical, up-tight, right wing beliefs. The spectre of "child pornographers" by the thousands is a plenty good smoke screen to hide censorship activities, and* garner lots of public support form concerned parents at the same time. And even your politicians can jump on the platform of "doing something good for the American family" by supporting it. On the whole, I can't prove there isn't child pornographers using BBS's, but I rather doubt it's a pressing problem. I'd rather the FBI find a real problem to pursue, like, bribery among government officials. ------------------------------ Date: Thu, 19 Dec 91 16:28:58 pst From: well!tomwhite@APPLE.COM(Tom White) Subject: File 5--Re: Whole Earth Review Questions Technology For Immediate Release: December 16,1991 CONTACT: Tom White (415) 332-1716: E-mail:tomwhite@well.sf.ca.us WHOLE EARTH REVIEW to Readers: Question Technology (while we still have the chance) Sausalito, CA -- The Winter 1991 issue of WHOLE EARTH REVIEW, the "Access to Tools" quarterly supplement to the WHOLE EARTH CATALOG, questions the political, economic, social and physical effects technology has on our lives. WHOLE EARTH REVIEW also questions its fundamental assumption that providing access to tools is a good and noble enterprise. Is technological innovation invariably beneficial? Do we control new technologies or do they control us? Will books and libraries become obsolete? These are some of the questions that authors in this special issue attempt to answer. Editor-in-Chief Howard Rheingold writes in the introduction: "Perhaps our readers will be inspired to create new tools for thinking about tools." Among the authors showcased are Jerry Mander, whose book "In the Absence of the Sacred" is excerpted at length in the lead article; Howard Levine, former director of the National Science Foundation's Public Understanding of Science Program; Langdon Winner, a political theorist and author; Patricia Glass Schuman, president of the American Library Association and of Neal-Schuman Publishers; Linda Garcia, a project director and senior analyst at the Office of Technology Assessment; Gary T. Marx; Ivan Illich; Amory and Hunter Lovins of the Rocky Mountain Institute. For the past two decades WHOLE EARTH REVIEW has provided its readers "access to tools" -- practical information about technologies ranging from manual post-hole diggers to virtual-computer systems. Subscription price is $27 for four issues, add $6 foreign. No advertising accepted. On newsstands and bookstore magazine shelves now. Copyright 1991, POINT. Permission granted to redistribute freely. Whole Earth Review, PO Box 38, Sausalito, CA 94966 ------------------------------ Date: Tue, 7 Jan 92 23:44:19 -0800 From: Jon Pugh Subject: File 6--Law Enforcement, the Government & You I would like to point out one thing in defense of the "zealous" people involved in law enforcement efforts that have been discussed recently. These are people who have accepted the job of tracking down criminals, and that's what they do. Just as we live computers, or whatever, they live law enforcement. It is important for them to remember that not everyone is guilty, just as it is important for us to remember that they are simply _looking_ for criminals, so they tend to focus on that goal. If you were assigned to track down computer criminals and you didn't know a bit from a scuzzy disk controller, where would you start looking? On bulletin boards and at computer club meetings, of course. The citizenry needs to remind the authorities that not everyone is a criminal and that we _are_ in America (where the Constitution can be construed by some to say that it is better to let a guilty man go than to punish an innocent one). On a different subject, I firmly believe in accountability of the government. If these allegations connecting the October Surprise to the Inslaw software case are even remotely true then the truth definitely MUST be known, regardless of whether we have to wake Ron up or take the President down. Arguments of the type "We must protect the image of the Presidency" are bogus. The President is a man, like us. Prone to the same failings as us, only more so because of his power. We have already seen how the pressure and power affected Richard Nixon. Personally, I do not believe that the president was to blame in Ron's case, unless it was simply through negligence. There are many career officials assisting the president and others, and it may be time for a purge. These people seem to have formed their own underground organization, which ostensibly seems to be intended to protect and promote a Republican president. Oliver North was willing to take the fall for the presidency, but has now recanted. What does this say about the way these people treat each other? There is really only one thing I can do though, and I encourage others to do the same thing. Ask questions and talk about this. Make sure that everyone you talk to knows about the Inslaw case and the the October Surprise. Tell them that nothing is proved, but much is implied. Tell them to ask questions and tell _their_ friends. All we can do is pay attention and make sure that _they_ can't slip one past us. Of course I would be very willing to help anyone who _can_ do something directly, but I don't really want to end up slashed to death in a bathtub. That's what the allegations are in the Inslaw case, and if only for that reason we must all obey the song which still rings true: Stop, hey, what's that sound? Everybody look what's going down. ------------------------------ ------------------------------ End of Computer Underground Digest #4.01 ************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank