home *** CD-ROM | disk | FTP | other *** search
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.04 (September 23, 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. It is assumed that non-personal mail to the moderators may be
- reprinted, unless otherwise specified. Readers are encouraged to submit
- reasoned articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Re: Evidence (was Re: Musing on Constitutionality)
- File 3: Why the FBI should be concerned about the Secret Service
- File 4: California Computer Abuse Law revisited
- File 5: Candidate for state governor supports electronic freedom & privacy
- File 6: Review of Steven Levy's CLOAK AND DAGGER
- File 7: The CU in the News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #2.04, File 1 of 7: Moderator's corner ***
- ********************************************************************
-
- Date: September 23, 1990
- From: Moderators
- Subject: Moderators' Corner
-
- ++++++++++
- In this file:
- 1. CuD SURVEY
- 2. CuD FORMAT
- 3. LEN ROSE UPDATE
-
- ++++++++++++++++++
- CuD Survey About Ready
- ++++++++++++++++++
-
- Bob Krause has the survey of CuD readers about ready to send. The earlier
- announcement of the survey received positive responses, so he will send it
- out directly from his site. The purpose is to find out who the readership
- is. The subscribers are overwhelmingly professional (computer scientists,
- journalists, academics), with the rest divided up among students, law
- enforcement or computer security, and the generally curious. The results
- will remain in-house, although Bob intends to use some of the data for a
- conference paper.
-
- +++++++++++++++++++
- CuD Format
- +++++++++++++++++++
-
- We have tried to format CuD in response to the various suggestions that
- have come to us since we began. Since we moved to the current "standard"
- format, we have received few suggestions and no complaints. Sometimes a
- reality check is wise, so if you have suggestions, let us know. We
- currently format at 75 characters per line, but reader who print it out
- before reading may prefer 65 characters, our own preference. We are
- wondering if there is any strong feeling on the format, one way or the
- other.
-
- ++++++++++++++++++++++++
- LEN ROSE UPDATE
- ++++++++++++++++++++++++
-
- Len Rose's trial is still scheduled for February. His situation, however,
- continues to cause problems. Although even by the least charitable
- assessment his crimes are not serious, the publicity and that "taint" makes
- it difficult for him to find employment, and he has no steady source of
- income whatsoever. His problems are complicated by the seizure of his
- possessions. He lost his equipment, and even if ultimately exonerated as
- Craig Neidorf was, the financial burden makes it impossible to support his
- wife and children. Strong arguments have been made in the past for hiring
- people with competent computer skills, especially those who possess
- expertise in the realm of computer security. Len has demonstrated his
- competence in the past as a programmer and as a consultant, and his skills
- would be an asset to any employer. CuD is not an employment bulletin, but
- there are times when those seeking employment should have an alternative
- forum to engage in their search, and we are willing to provide space on
- occasion to put potential employers in contact with candidates.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- To: EFF-NEWS@NETSYS.COM
- Subject: Re: Evidence (was Re: Musing on Constitutionality)
- Date: 14 Sep 90 03:35:56 GMT
-
- ********************************************************************
- *** CuD #2.04: File 2 of 7: From the Mailbag ***
- ********************************************************************
-
-
- +++++++++++++++++++++++++++++
- We received the following from one of the more interesting newsnets
- around, and the author gave permission to reprint it.
- ++++++++++++++++++++++++++++++
-
- I have always been amused at reading how the goons confiscate printers when
- they move in. How silly! Yet it got me thinking...
-
- If I were a computer criminal, I might just create a very special printer with
- a bank of non-volatile storage in it. Or, for that matter, just buy one of
- the modern printers you can get these days with 4 megs ram, etc.
-
- I would use that storage, normally, to keep all the stolen access codes,
- calling card numbers, and other incriminating data. Pretty easy, with the
- high speed link I have to my printer, to fetch the codes from it.
-
- (I would also have the machine erase stuff if disconnected improperly, keeping
- backups somewhere far away.)
-
- Or I could hide this info in little hidden places in all kinds of semi-smart
- or smart peripherals -- including some off the shelf.
-
- So if we fight (correctly) to stop them from confiscating everything, this may
- drive the real criminals to such tricks, which may lead to grander
- confiscation. I point this out -- I don't know if there's an answer.
-
- (Author's name deleted by request)
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: 22 Sep 90 04:02:57 GMT
- From: Anonymous
- Subject: Why the FBI should be concerned about the Secret Service
-
- ********************************************************************
- *** CuD #2.04: File 3 of 7: The FBI and the Secret Service ***
- ********************************************************************
-
- Rumors have it that the FBI is not very happy with the way the secret
- service is conducting investigations. According to the rumors, the FBI
- thinks it's hampering their own investigations and making it more difficult
- to go prosecute big time criminals. Here's the gist of the arguments.
-
- PROFESSIONALISM: When the FBI was investigating the nuPrometheus
- League's alleged involvement in theft and distribution of Apple Software,
- the people they visited had very different experiences than those the
- secret service visited. The FBI was, so it's said, was polite, courteous,
- and generally professional. They didn't try to act like they knew more than
- they did, and they didn't try to intimidate those they questioned. In a
- case related to Sun Devil, an FBI agent stopped by to just chat and
- discussed some of the tactics used by the secret service and didn't seem at
- all happy about either their methods or their competence. If one agency
- isn't professional, it makes people less willing to cooperate with members
- of other agencies when they come around.
-
- JURISDICTION: The FBI and secret service have jurisdiction over computer
- crimes under the 1986 federal law outline computer crimes. The FBI
- generally investigates crimes involving break-ins at government offices or
- military installations, or in which the government is the target. The
- secret service is involved with investigating crimes involving access
- devices, which generally means crimes employing a modem to get into other
- computers or rip-off telecom companies. There may be a jurisdictional fight
- going on, and the secret service may be trying to expand the scope of its
- activities. If successful, it means more visibility, more appropriations,
- more staff, and more glory. This might explain why there was so much
- initial publicity over the hacker busts this year and why they are go after
- relatively easy targets.
-
- RIGHTS: The FBI probably has far more experience in the subtleties of
- questioning than the secret service, and they are more likely to know the
- limits of what they can and can't do. The secret service, by contrast, has
- relatively young agents doing the investigation, and some of those
- responsible for the Sun Devil investigation who were in the field doing the
- searches are said to have as little as two or three years total experience
- and little field experience. Lacking an experienced agent-in-charge, it's
- more likely that rights will be violated by young agents who simply don't
- know any better. Most people don't distinguish between FBI and secret
- service, so if rights are violated all government agencies are tainted. The
- FBI has been criticized in the past for violation the rights of political
- groups in the 1960s and the 1970s, and has been caught violating the rights
- of groups sympathetic to Latin American countries the Reagan administration
- opposed in the 1980s. They don't need the aggravation of another agency
- renewing the issues of constitutional rights and further limiting the scope
- of their power to investigate.
-
- BACKLASH: If a backlash occurs against the secret service, the FBI will
- also feel it. If restrictions are placed on what agencies are allowed to
- do as a response to abuses, the FBI would itself become a victim of the
- secret service because of new laws and policies that restrict their powers.
- A backlash could also result in negative publicity that would reduce the
- dangers of serious computer crime by creating a "cry wolf" scenario in
- which so many non-threats were publicized that real threats would go
- unheeded. A final consequence of backlash could be reduction in
- appropriations for combating technological crimes. How can any agency
- expect to present a convincing argument that there are dangerous computer
- crooks out there when the experience with the secret service has an image
- of focusing on juvenile delinquents who abuse credit cards or is involved
- in publicized trials where the defendant has the charges dropped during a
- prosecutor's arguments?
-
- It's one thing for the secret service to wind up with egg on its face, but
- when they splatter other enforcement agencies and tarnish them as well it
- doesn't help those agencies. There are many sincere government agents who
- respect the law and individuals' rights. Let's keep in mind that, although
- prohibited from speaking out publicly, those agents and their agencies,
- whether investigators or other federal prosecutors, should be seen as
- upholders of law and not violators of it.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: 19 September, 1990
- From: Moderators
- Subject: California Computer Abuse Law revisited
-
- ********************************************************************
- *** CuD #2.04: File 4 of 7: California Computer Abuse Law ***
- ********************************************************************
-
- In a previous issue of Computer underground Digest (1.17, File 5), the
- California revision of Title 13 Sections 502 and 502.7 was described as an
- example of the potential dangers in "cracking down" on computer hackers.
- Upper case indicates emphasis that we have added.
-
- Title 13 Sect. 502.7:
-
- "(a) A person who, knowingly, willfully, and with intent to
- defraud a person providing telephone or telegraph service,
- avoids or attempts to avoid, OR AIDS ABETS OR CAUSES ANOTHER
- TO AVOID the lawful charge, in whole or in part, for
- telephone or telegraph service by any of the following means
- is guilty of a misdemeanor or a felony, as provided in
- subdivision (f):"
-
- There follows a list of proscribed means, including charging to
- non-existence credit cards and tampering with telecom facilities, most of
- which seem reasonable. One, however, strikes us as potentially dangerous.
- 502.7 (b) states:
-
- "Any person who MAKES, POSSESSES, SELLS, GIVES, OR OTHERWISE
- TRANSFERS TO ANOTHER, OR OFFERS OR ADVERTISES ANY
- INSTRUMENT, APPARATUS, OR DEVICE WITH INTENT TO USE IT or
- with knowledge or reason to believe it is intended to be
- used to avoid any lawful telephone or telegraph toll charge
- or to conceal the existence or place of origin of
- destination of any telephone or telegraph message; or (2)
- sells, gives, or otherwise transfers to another, or
- advertises plans or instruments for making or assemblying an
- instrument, apparatus, or device described in paragraph (1)
- of this subdivision with knowledge or reason to believe that
- they MAY BE %emphasis added% used to make or assemble the
- instrument, apparatus, or device is guilty of a
- misdemeanor or a felony, as provided in subdivision (f)."
-
- The broad wording of this laws would make it illegal to possess information
- on "boxing" or to possess an autodialer. The problematic language here is
- "with knowledge or reason to believe it is intended to avoid. . .". We have
- seen from Operation Sun Devil that, contrary to normal Constitutional
- procedures, the burden of proof of innocence lies on the "suspect." A BBS
- operator who puts boxing files in a text section, knowing that some users
- might try to apply the knowledge illegally, could, under the current
- philosophy of the Secret Service and others, be indicted. This may seen a
- remote possibility, but we have seen from recent activity that we simply
- cannot rely on good faith interpretations of the law by some prosecutors,
- especially those willing to distort "evidence" to strengthen a case.
- Further, the term "may be" is unnecessarily vague. Generally, the term
- means "expressing ability, permission, freedom, possibility, contingency,
- chance, competence..." (Chambers 20th Century Dictionary, 1972: p. 811). An
- automobile dealer presumably knows that a customer "may" use a car in the
- commission of a crime, or "may" drive the car while intoxicated. Yet, it is
- absurd to consider holding the dealer criminally liable for the sale in the
- event the customer "may" be able to do so. Our point is that the language
- of this Bill seems unnecessarily restrictive and open to potential abuses
- by law enforcement agents, especially those willing to seek "test cases" to
- test the laws. Californians should write their legislators with their
- concerns in hopes that the language would be revised in a way that allows
- legitimate targeting of "real" computer criminals, but reduces the
- potential for using the law to persecute those for whom less stringent and
- more productive responses are appropriate.
-
- Just as chilling is subdivision (g) of this passage. The language
- in (g) specifies:
-
- Any instrument, apparatus, device, plans, instructions, or
- written publication described in subdivision (b) or (c) may
- be seized under warrant or incident to a lawful arrest, and,
- upon the conviction of a person for a violation of
- subdivision (a), (b), or (c), the instrument, apparatus,
- device, plans, instructions, or written publication may be
- destroyed as contraband by the sheriff of the county in
- which the person was convicted or turned over to the person
- providing telephone or telegraph service in the territory in
- which it was seized.
-
- This section seems reasonable to the extent that it specifies confiscation of
- an illegal "instrument" upon conviction. The problem, however, is the
- apparent tendency in some states to seize equipment even when indictments are
- not forthcoming. The wording would seem to offer incentives to agents to
- secure an arrest as a means to confiscate equipment, even if charges were
- subsequently dropped. Again, this may seem far-fetched, but the undeveloped
- state of computer law and the actions of prosecutors in early 1990 leave
- little room for confidence in good faith interpretation of the wording. Take
- an example: If a person were to be indicted for posession of an auto-dialer
- (which generally has but one purpose) pursuant to a search warrant for
- unrelated reasons, computer equipment could be confiscated. We have seen from
- the actions of agents that the definition of "equipment" is quite broad, and
- can include printers, modems, answering machines, or even books and pictures.
- If the person is convicted of possession, then the equipment could be lost.
- Again, "common sense," that sixth sense that tells us the world is flat, would
- tell us that such a possibility seems absurd. However, the zealousness of Sun
- Devil agents reduces the absurdity to the level of a "could be," and it is
- because of their actions that we are concerned with this wording.
-
- Title 13, Sect 502 (h) provides that:
-
- Any computer, computer system, computer network, or any
- software or data, owned by the defendant, which is used
- during the commission of any public offense described in
- this section any computer, owned by the defendant, which is
- used as a repository for the storage of software or data
- illegally obtained in violation of this section shall
- be subject to forfeiture.
-
- The chilling aspect of this passage is that is says nothing about
- conviction. Does "subject to forfeiture" mean that, even if found innocent,
- one could lose their equipment? A good faith reading suggests that the
- intent of the language at least implies that a conviction must occur. But,
- in reading the indictments of Craig Neidorf and Len Rose (neither from
- California), we should be cautious before assuming that prosecutors will
- not resort to creative interpretations to file an indictment. We should
- also be aware that at least one California prosecutor has published
- statements advocating an aggressive enforcement policy against "hackers"
- and has advocated responses that he acknowledges are probably
- unconstitutional.
-
- Given the broad interpretation of the law, and considering how companies
- such as BellSouth have grossly inflated the value of products (such as in
- the Neidorf case, in which information available for $13 was valued,
- according to the first indictment, at $79,449, and in the second indictment
- reduced to $23,900). Given their public statements in the media and the
- hyperbole of indictments, we cannot assume "good faith" prosecution by law
- enforcement, and the language of the California Act seems wide open for
- abuse.
-
- Our purpose is not simply to criticize this law, but to use it as an icon
- for other state and federal law. Some states are revising their laws, and
- it is crucial that computerists be aware of, and offer input into, their
- wording to assure that legitimate enforcement needs are met and potential
- for abuse or misuse removed. There must be a balance, and without public
- input such a balance is unlikely. We find Jim Warren's article (File 5,
- following) significant. It suggests that computerists introduce this as an
- issue in political campaigns as a means of educating both the public and
- the politicians.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: Wed, 19 Sep 90 15:23:16 pdt
- From: well!jwarren@APPLE.COM(Jim Warren)
- Subject: Candidate for state governor supports electronic freedom & privacy
-
- ********************************************************************
- *** CuD #2.04: File 5 of 7: Legal Changes / Electoral Processes ***
- ********************************************************************
-
-
- [Please post & circulate]
- +++++++++++++++++++++++++++++++++++++
-
- GUBERNATORIAL CANDIDATE SUPPORTS ELECTRONIC FREEDOM & PRIVACY
-
- Folks, we have a good chance of having a **State Governor** who
- (a) understands and favors technology, and -- more important --
- (b) has signed and released the following statement (I just received a
- signed, dated copy by fax; I will fax it to anyone who requests it).
-
- -- Jim Warren, 9/16/90 [jwarren@well.sf.ca.us, or 415-851-7075/voice]
-
- +++++++++++++++++++++++++++++++++++++++++++
-
- STATEMENT BY JIM GALLAWAY, CANDIDATE FOR GOVERNOR OF NEVADA
-
- I am the Republican candidate for Governor of the State of Nevada. I have
- been in the private telecomm industry for most of 20 years, and have been a
- principal in several telecomm and computer start-ups. I understand,
- support, and have practiced technological innovation.
-
- My wife and I have known Jim Warren for well over a decade. He has
- outlined some of the current issues about which owners and users of systems
- for e-mail, BBS, teleconferencing, electronic publishing and personal
- computing are deeply concerned.
-
- These are my positions, relative to some of the recent law enforcement
- practices by some government agents:
-
- 1. Government responses to alleged misdemeanors and crimes must be no more
- than comparable to the seriousness of the wrong-doings.
- 2. Simple electronic trespass without harm must be treated as any other
- simple trespass. It does not justify armed raids on teenagers, forced
- entry of private homes, nor seizure of telephone handsets, answering
- machines, computer printers, published documentation, audio tapes and the
- like.
- 3. The notion that equipment can be "arrested" and held inaccessible to
- its owner, without promptly charging the owner with a crime, is absolutely
- unacceptable. The practice of holding seized equipment and data for months
- or years is a serious penalty that must be imposed only by a court of law
- and only after a fair and public hearing and judicial finding of guilt.
- 4. Teleconferencing and BBS systems must have the same protections against
- suppression, prior restraint, search or seizure as do newspapers, printing
- presses and public meeting places.
- 5. The contents of electronic-mail and of confidential or closed
- teleconferencing exchanges must have the same protections against
- surveillance or seizure as does First Class Mail in a U.S. Post Office, and
- private discussions among a group in a home or boardroom.
-
- As Governor of the State of Nevada I will vigorously support all of these
- positions -- both statewide and nationally.
-
- /s/ Jim Gallaway, candidate for the Governor of Nevada [dated] 9/16/90
-
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: 22 September, 1990
- From: Gordon Meyer
- Subject: Review of Steven Levy's CLOAK AND DAGGER
-
- ********************************************************************
- *** CuD #2.04: File 6 of 7: Review of Levy's Cloak and Dagger ***
- ********************************************************************
-
- CuD Synopsis
- "Code and Dagger"
- by Steven Levy
- The Iconoclast, MacWorld 9/90 p69-80
-
- Summary by Gordon Meyer
-
- ------------------------
-
- In the spring of 1988 a group using the name "The nuPrometheus League
- (Software Artists for Information Dissemination)" mailed unmarked
- computer disks to several prominent computer industry journalists and
- authors. These disks contained Apple Computer source code to the Color
- Quick Draw routines used in the Macintosh operating system.
-
- One year later the author, Steven Levy, reports that he recently received
- a series of phone calls from an FBI agent investigating the case. Levy's
- column ("The Iconoclast") in the September 1990 issue of MacWorld paints
- an interesting story about the investigation, much of it mirroring the
- issues raised by the Secret Service's "Operation Sun devil" and other
- computer crime investigations.
-
- In his article Levy tells of the Agent repeatedly questioning him about
- nuPrometheus, despite Levy's denials of have any real knowledge of the
- matter. The agent appeared to be reading the questions of a list,
- without any real understanding of the answers he was receiving. Two
- weeks later Levy received a call from a different agent and when this
- agent was queried how he came to be questioning the author the reply was
- "Somehow your name came up". When asked why the FBI was pursuing the
- case one year later, despite the fact that no other nuPrometheus activity
- had occurred since the original incident, the answer was that this was a
- significant case of Interstate Transportation of Stolen Property and could
- be equated with the theft of a national secret. For, the agent
- explained, if a spy were to come by this code he could use to break into
- the Macintosh computer and steal the secrets within!
-
- Levy reports that others have been interviewed in conjunction with the
- case as well. One, Mitch Kapor, described his interview as being almost
- surrealistic and profoundly disturbing. Levy quotes Kapor as saying:
-
- "It seemed obvious to me they didn't have a clear sense of the
- technology - there was such a lack of understanding that the effort
- to investigate wouldn't bear fruit. They were lost in cyberspace."
-
- Others who were interviewed report similar experiences. John Perry
- Barlow was told that the annual Hacker's Conference (a yearly meeting of
- highly-skilled computer programmers) was actually a gathering of computer
- outlaws. Grady Ward, a former Apple programmer, was told that the stolen
- source codes was filtering back to Communist enemies (via Toshiba
- electronics).
-
- Levy, attempting to tip the scales of discourse back towards more
- rational thought, writes:
-
- "That (the claim that this is a case of interstate theft) may be the
- legal charge, but the theft of source code involved in nuPrometheus
- is quite a different matter from hijacking a truck or robbing a
- bank. Software is a much trickier object than swag or money - it
- can move in elusive ways, and therefore access to protected software
- is a technically complicated matter. And the problem of the
- criminal's motive requires an even deeper understanding. In order
- to understand and ultimately apprehend the perpetrator, one must
- realize that this particular crime seems motivated not by greed or
- maliciousness, but by a peculiar attitude toward technology in
- general and the role of Apply Computer in particular." ... "One has
- to feel some sympathy for the agents here - it's a terrible burden to
- have to solve this rather bizarre ideological crime without being
- steeped in the lore of Silicon Valley." (p.74)
-
- CuD readers will immediately recognize the similarities between this
- investigation and those associated with Operation sun devil. In both
- instances the investigators have constructed a list of suspects based
- on associations with "suspected hackers" and have defined cultural and
- socially normative activities as "conspiratorial" or "criminal" without
- regard for other, less accusatory, interpretations that could apply.
-
- The nuPrometheus investigation has resulted, thus far, in at least three
- people being directly accused of the crime, but (like in the sun devil
- cases) no formal charges have been filed. One suspect, Grady Ward, was
- told by an agent "we know you did it" and is evidently considered a
- suspect because he's one of five likeliest Apple employees that had
- requested access to the source code shortly before it fell into the hands
- of nuPrometheus. The feds consider him a suspect because "He had since
- left Apple, he had attended a liberal arts college, and had once formed
- an intellectual society called Cincinnatus, thus betraying the same
- fondness for antiquity shown by the name nuPrometheus." (p.76) Ward
- admits having had the source code at one time, but it was part of his job
- to have it, and besides, he says, it was distributed to hundreds of
- people in the project group via Internet.
-
- In his article Levy poses several questions concerning this
- investigation. One of which, he says, is why the FBI is spending it's
- resources to follow this case rather than chasing the white-collar
- thieves who sacked the country for a trillion dollars in the
- Savings-and-Loan fiasco. After all, he notes, Apple has managed to stay
- in business despite the theft of the code, and nuPrometheus has not
- followed up on their promise to release other inside information. Levy
- goes on to suggest that some in Silicon Valley believe that Apple,
- perhaps via it's security firm (Kroll Associates, believed to have a
- number of former federal agents on staff), has pressured the FBI into
- pursuing the case. Again, this sounds quite similar to the "Phrack -
- E911" case where it has been conjectured that Bell South persuaded the
- Government to pursue a case that could not be won.
-
- Levy concludes by suggesting that we may not have heard the least of the
- nuPrometheus investigation. Stephen Satchell, a computer writer in Reno,
- told Levy that the FBI agent who interviewed him had a list of potential
- interviewees that numbered around 60 people, in 39 states. Levy leaves
- us with one final question. "... when does an investigation become a
- witch-hunt?" It's a question that CU followers have heard before.
-
- ---------
- GRM
- Internet: 72307.1502@Compuserve.com
- Moderators Note: CuD-ites are encouraged to see Levy's full article in
- MacWorld. Like his work _Hackers_, Mr. Levy consistently produces
- entertaining and thought-provoking articles.
-
-
-
-
-
- END
-
-
-
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: 23 September, 1990
- From: Various Contributors
- Subject: The CU in the News
-
- ********************************************************************
- *** CuD #2.04: File 7 of 7: The CU in the News ***
- ********************************************************************
-
-
- "Justice Department Computer Security Questioned"
-
- The General Accounting Office (GAO) has issued a report criticizing the
- Justice Department (DOJ) for failing to have a management system in place
- to secure its highly sensitive computer systems and has concluded that
- classified files were at risk. The report concludes that immediate action
- is required to correct security weaknesses at the main Justice Department
- data center and in computer systems used by DOJ litigating organizations.
-
- The report found several security weaknesses at DOJ's new data center in
- Rockville, MD, a site leased by DOJ from Control Data Corp. for 17 years.
- According to GAO, there are "numerous uncontrolled entrances...through
- which individuals could easily remove sensitive data." In addition, the
- report is critical of DOJ's lack of contingency plans for emergencies at
- the center and has not conducted a complete risk assessment that takes into
- account possible adverse actions by disgruntled employees.
-
- Copies of the report, entitled "Justice Automation: Tighter Computer
- Security Needed" may be obtainable from the GAO (202/225-6241). The report
- is GAO/IMTEC-90-69 and is dated July 30, 1990.
-
- ------------------------------
-
- TRENTON, N.J. (UPI) -- Assembly Speaker Joseph Doria said Monday he was
- concerned by news that an alleged Republican break-in of Democratic
- computer files took place with the knowledge of the GOP's highest-ranking
- staff member.
-
- Doria, D-Hudson, said he had instructed all Assembly members and staff with
- knowledge of the %%hacking'' incident to turn their information over to
- Attorney General Robert Del Tufo, who is investigating the repeated
- break-ins.
-
- John Kohler, executive director of the GOP Assembly staff, resigned Friday
- admitting he had been aware of the activities of Jeffrey Land, a low-level
- staffer who reportedly broke into Democrats' files in the legislative
- computer system and discovered that Democrats had used the state-owned
- computer for political work.
-
- State law bars use of state equipment for political work or doing political
- work on state time.
-
- Previous to Kohler's resignation, however, top lawmakers had dismissed the
- break-ins as a computer hacker's prank.
-
- ------------------------------
-
- "Think that Computer Message you just sent was Secret? Think Again"
-
- By Bart Ziegler
- Associated Press
- +++++++++++++++++
-
- NEW YORK -- Next time you push that button on your computer to send a
- co-worker a racy electronic mail message about the boss, think twice.
- Someone may be reading your mail. Every day, millions of computer users
- send electronic messages to fellow employees, supervisors, clients and
- friends. Many assume these computer-to-computer electronic mail systems --
- the postal system of the Information Age -- are confidential. But a recent
- lawsuit challenges that notion. The class action contends a California
- company spied on employees for months by monitoring thousands of their
- electronic messages. The lawsuit, filed last month by several employees
- again Epson America Inc. of Torrance, Calif., claims the company's
- computer operations manager made printed copies of electronic mail sent and
- received by 700 Epson workers. The suit claims such snooping violates a
- state wiretap law. Epson, a Japanese-owned company that sells personal
- computers, calls the lawsuit unfounded. "It is clearly not the policy of
- Epson to indiscriminately read electronic mail," said spokesman Scot
- Edwards. He declined to comment on the suit's specific allegations. The
- lawsuit is an example of a growing privacy debate surrounding "E-mail,"
- which has mushroomed in popularity during the past decade with the growth
- in personal computers. Among other cases:
-
- o The mayor of Colorado Springs, Colo., caused a stir this year when
- it was discovered he had been reading printouts of electronic messages that
- City Council members had sent each other in confidence.
-
- o The Iran-Contra affair unraveled partly because investigators
- discovered electronic messages sent by L. Col. Oliver North and supporters.
- The North team didn't realize that every message was stored on computer
- tape.
-
- Computer experts say some E-mail systems automatically destroy electronic
- messages once they are read. Others keep a copy. But even systems that
- erase old messages aren't safe from snoops. In most systems, computer room
- operators can rea messages that haven't yet been opened by recipients, said
- Mike Zisman, president of SoftSwitch Inc., a Wayne, Pa., company that helps
- corporations link E-mail systems. "When you send a message, most people
- think it's as private as sending it through the U.S. Postal System. But in
- some companies it can be as private as writing it on the bathroom wall,"
- said David Atlas, an E-Mail analyst at International Data Corp., a research
- firm. Atlas said he knows of another suit similar to the Epson class
- action, as well as employees at two other companies who are considering
- their own lawsuits, but he declined to identify them. Few employers have
- explicit policies on the use and privacy of E-Mail, said Walter Ulrich, an
- office automation specialist at the consulting firm Arthur D. Little Inc.
- "That's an area where companies should give guidance to employees," said
- Ulrich, who estimates that there are 10 million E-Mail users in North
- America. Ulrich recommended companies state they will not snoop in E-Mail
- systems unless they believe users are using them illegally or abusively.
- But he doesn't think companies should be barred outright from reading
- E-Mail, since the companies own the systems.
-
- The American Civil Liberties Union takes a stronger stance. It believes
- federal privacy safeguards are needed to prevent employers from
- eavesdropping on employees' personal affairs that happen to be contained in
- computer files.
-
- "There's virtually no law that would stop any employer from systematically
- reading al of the computerized information of any of their employees," said
- Lewis Maltby, coordinator of the ACLU's National Task Force on Civil
- Liberties in the World Place.
-
- Federal laws that bar wiretapping don't apply to computer systems, Maltby
- said.
-
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.04**
- ********************************************************************
-