home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: austin.eff
- Path: sparky!uunet!europa.asd.contel.com!darwin.sura.net!sgiblab!swrinde!news.dell.com!natinst.com!cs.utexas.edu!tic.com!riddle
- From: lenny@icus.ICUS.COM (Lenny Tropiano)
- Subject: Re: Secret Service Bust in Lubbock
- Message-ID: <1992Dec22.150353.7959@tic.com>
- Originator: riddle@aahsa.tic.com
- Sender: news@tic.com
- Nntp-Posting-Host: aahsa.tic.com
- X-Submissions: eff-austin@tic.com
- Organization: ICUS Software Systems, Austin, Texas
- References: <1992Dec21.134414.20765@tic.com>
- Date: Tue, 22 Dec 1992 00:06:19 GMT
- Approved: riddle@tic.com (Moderator, Prentiss Riddle)
- Lines: 100
-
- In article <1992Dec21.134414.20765@tic.com> polekat@tic.com (Ed Cavazos) writes:
- >According to an AP article in the 12/17/92 Austin American Statesman, Secret
- >Service Agents "targeted three suspects they say tapped into Texas Tech's
- [...]
- >If anyone has any more information on this, please pass it along,
- >as the article was sorely lacking in important facts.
- >
-
- This was in the CUD (Computer Underground Digest)
-
- |Subject: Cu Digest, #4.67 (Final issue for '92)
- |Subject: File 2--Secret Service Raids Dorm
-
- Federal Agents Raid Dorm, Seize Computer Equipment
- By JOE ABERNATHY Copyright 1992, Houston Chronicle
-
- The Secret Service has raided a dorm room at Texas Tech University,
- seizing the computers of two Houston-area students who allegedly used
- an international computer network to steal computer software.
-
- Agents refused to release the names of the two area men and a third
- from Austin, who were not arrested in the late-morning raid Monday at
- the university in Lubbock. Their cases will be presented to a grand
- jury in January.
-
- They are expected to be charged with computer crime, interstate
- transport of stolen property and copyright infringement.
-
- "The university detected it," said Resident Agent R. David Freriks of
- the Secret Service office in Dallas, which handled the case. He said
- that Texas Tech computer system operators contacted the Secret Service
- when personal credit information was found mixed with the software
- mysteriously filling up their fixed-disk data storage devices.
-
- The raid is the first to fall under a much broader felony definition
- of computer software piracy that could affect many Americans. This
- October revision to the copyright law was hotly debated by computer
- experts, who contended that it sets the felony threshold far too low.
-
- Agents allege that the three used a chat system hosted on the Internet
- computer network, which connects up to 15 million people in more than
- 40 nations, to make contacts with whom they could trade pirated
- software. The software was transferred over the network, into Texas
- Tech's computers, and eventually into their personal computers. The
- Secret Service seized those three personal computers and associated
- peripherals which an agent valued at roughly $5,000.
-
- The software Publishers Association, a software industry group
- chartered to fight piracy, contends that the industry lost $1.2
- billion in sales in 1991 to pirates.
-
- Although these figures are widely questioned for their accuracy,
- piracy is widespread among Houston's 450-plus computer bulletin
- boards, and even more so on the global Internet.
-
- "There are a lot of underground sites on the Internet run by
- university system administrators, and they have tons of pirated
- software available to download -- gigabytes of software," said Scott
- Chasin, a former computer hacker who is now a computer security
- consultant. "There's no way that one agency or authority can go
- through and try to sweep all the bad software off the Internet,
- because the Internet's too big."
-
- The mission of the Secret Service does not normally include the
- pursuit of software piracy, but rather the use of "electronic access
- devices" such as passwords in the commission of a crime. This gives
- the service purview over many computer and telecommunications crimes,
- which often go hand-in-hand, with occasional bleedover into other
- areas.
-
- Freriks said that the investigation falls under a revision of the
- copyright laws that allows felony charges to be brought against anyone
- who trades more than 10 pieces of copyrighted software -- a threshold
- that would cover many millions of Americans who may trade copies of
- computer programs with their friends.
-
- "The ink is barely dry on the amendment, and you've already got law
- enforcement in there, guns blazing, because somebody's got a dozen
- copies of stolen software," said Marc Rotenberg, director of Computer
- Professionals for Social Responsibility, in Washington, D.C. "That was
- a bad provision when it was passed, and was considered bad for
- precisely this reason, giving a justification for over-reaching by law
- enforcement."
-
- Freriks noted that the raid also involved one of the first uses of an
- expanded right to use forfeiture against computer crime, although he
- was unable to state from where this authority evolved after a civil
- rights lawyer questioned his assertion that it was contained in the
- copyright law revision.
-
- "One of our complaints has always been that you catch 'em, slap 'em on
- the wrist, and then hand back the smoking gun," he said. "Now all that
- equipment belongs to the government."
-
- --
- | Lenny Tropiano ICUS Software Systems lenny@icus.ICUS.COM |
- | ...!{cs.utexas.edu,ames,pacbell}!icus!lenny |
- +-------------- 6905-B Argonne Forest Cove, Austin, TX 78759 ---------------+
-
-
-