home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 3, Issue #3.06 (February 23, 1991) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
- ROUTER AWAITER: Brendan Kehoe
-
- USENET readers can currently receive CuD as alt.society.cu-digest. Back
- issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
- PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
- Anonymous ftp sites: (1) ftp.cs.widener.edu (temporarily down); (2)
- cudarch@chsun1.uchicago.edu E-mail server: archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles relating to
- the Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS THIS ISSUE:
- Subject: Moderators' Corner
- Subject: From the Mailbag
- Subject: message for help about archive server
- Subject: Felony Charges Dropped against Phiber Optik
- Subject: The FBI Comes Rapping, Rapping at Your BBS
- Subject: Some Thoughts on Government Actions
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #3.06, File 1 of 6: Moderator's corner ***
- ********************************************************************
-
- From: Moderators
- Subject: Moderators' Corner
- Date: February 23, 1991
-
- A few comments in list format:
-
- 1) The Len Rose case is still pending. It is currently on a day-by-day
- status as discussions occur. More on this later.
-
- 2) The concern about privacy and First Amendment issues in cyberspace
- continues. We are re-printing Brock Meeks' original "FBI" article (see file
- 5 below) because it has aroused renewed interest. Brock also wrote a recent
- story on the FBI running "sting"-type operations which we encourage all to
- read. The concern impels us to do a special issue on it all within the next
- few weeks.
-
- 3) For the next month or so, CuD will be coming out about bi-weekly because
- of time constraints. Gordon has been transferred to Pennsylvania, but will
- be commuting between the east and west coasts every two weeks as part of
- his employment. Jim's publishers have lost all sense of humor and are
- demanding the two promised books, long past deadline.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators
- Subject: From the Mailbag
- Date: 23 February, 1991
-
- ********************************************************************
- *** CuD #3.06: File 2 of 6: From the Mailbag ***
- ********************************************************************
-
- From: louisg <louisg@VPNET.CHI.IL.US>
- Subject: posttocomp.org.eff.talk
- Date: Thu, 21 Feb 91 1:48:12 CST
-
- Has anyone seen the announcement for the Ides of March computer conference?
-
- The reason it caught my attention is that one of the speakers is Gail
- Thackery.
-
- My question is: why?
-
- Why is Gail speaking at a computer conference? What does she know about
- computers?
-
- She probably does know a lot about prosecution, I don't doubt her ability
- as a lawyer, but what does she know about computer crime specifically?
-
- Ok. We all know what she was involved in, but that just proves my point
- further. Those aren't exactly what you would call "clean" busts. And with
- Sundevil, there weren't even that many (any?) busts made.
-
- It doesn't say much for her ability to prosecute computer crime.
-
- What exactly is she going to speak about? I can't figure that out. Maybe
- she's going to explain what KERMIT is or something. Though, she should
- explain that to law enforcement officials.
-
- See, that's where I have this problem. Here we have an individual speaking
- at an industry conference, and this individual is not in the industry. She
- does not affect the industry except in destructive ways (if you want a list
- on how it's been destructive, E-mail me. It's too long for here).
-
- And with her being on the Well and all, and now there's a rumor of her
- getting some type of "honor" with Barlow at the Comps, Sec, and Priv
- conference, I'm beginning to wonder how one becomes an authority on
- computers.
-
- Why not honor some beat cops who find some stolen PC's? They have about as
- much to do with computer crime and how it relates to the industry as Gail.
-
- This is ridiculous. Does anyone else see politics or something coming into
- play here or is it just me?
-
- If what law enforcement says is true, that most computer crime goes
- unreported since companies don't want to publicly admit that they have
- security problems, then aren't the companies bigger authorities on computer
- crime than lawyers and cops and feds and what have you?
-
- What can Gail tell an employee of AT&T or IBM or DEC or Maxis or Sierra or
- whoever that they don't already know, and probably know better? She can't
- tell them how systems are broken into. She can't tell them about a "ring"
- of hackers/phreaks since there is no such animal. She probably can't even
- tell them what a macro is.
-
- Just what we need. The few decent people in the industry jumping in bed
- with fascists. Ha! I'm conservative and a capitalist and all that, but I
- still wouldn't throw what few morals I have out the door for an extra buck
- or my name in lights or anything.
-
- See, I agree with companies when they say that they don't want some punks
- breaking into their computers. I can even agree with arresting people who
- do. What I can't agree with is persecuting people (ala Len Rose) or
- widespread terror tactics (ala Sundevil). If I were a hacker I'd rather
- have AT&T's internal security knocking at my door rather than Gail & Co.
- seeing what they've done to people.
-
- The only reason I can see for Gail to be there is to bury the hatchet.
- Well, when you bury the hatchet with people who are experts at wielding
- one, you can bet it'll end up in your back in the end.
-
- Flames gratefully accepted.
-
- Louis Giliberto
- louisg@vpnet.chi.il.us
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: pmccurdy@CUP.PORTAL.COM
- Subject: CompuSec in the news
- Date: Fri, 15 Feb 91 16:29:52 PST
-
- Here in Northern California we have a free computer magazine called
- Microtimes. It is in a 10 1/2 x 13" format computer mag that has picked up
- quite a bit of popularity over the last couple of years. It used to be
- just a place to read advertisements, but these days it has occasional
- interesting articles, too.
-
- The latest issue has a cover suite on computer security. From the table of
- contents:
-
- *Computer Crime: Beyond The Headlines
- An Interview With Dorothy Denning*
- by John Perry Barlow
- Computer security expert Denning and self-proclaimed
- cognitive dissident Barlow discuss system break-ins,
- hacker culture, recent court cases, and long-term
- issues.
-
- *Why Defend Hackers?*
- by Mitch Kapor
- Lotus founder and Electronic Frontier Foundation
- chairman Kapor explains what the fledgling EFF
- organization is up to, and why.
-
- *Realizable Fantasies*
- by Jim Warren
- Computers, freedom, and privacy - new technology poses
- new problems and questions.
-
- *Cliff Stoll's Practical Security Tips*
- by Mary Eisenhart
-
- *Security In the Single-PC Office*
- by Paul Hoffman
-
- *Risk Assessment For Your Computer System*
- by Mikael Blaisdell
- How to determine your security needs and solve them in a
- cost-effective manner.
-
- *Bulletin Boards and the Virus Plague*
- by Jack Rickard
-
- *Computer Security: Information Without Hysteria*
- by B. McMullen and John McMullen
- [A review of two new books; *Computers Under Attack*, Peter
- J. Denning (ACM), and *Computers At Risk*, National Academy
- Press. Both sound worth reading.]
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: decwrl!fernwood!well!jwarren@LLL-WINKEN.LLNL.GOV(Jim Warren)
- Subject: CompFreePriv Conf Reg Scholarships
- Date: Thu, 21 Feb 91 21:39:22 pst
-
- TEN FULL REGISTRATION SCHOLARSHIPS FOR COMPUTERS, FREEDOM & PRIVACY CONF
- John Gilmore of Cygnus Support has offered (and prepaid) ten full
- Registration Scholarships for college and university students wishing to
- attend the four-day First Conference on Computers, Freedom & Privacy, March
- 25-28, 1991, at the SFO Marriott near the San Francisco International
- Airport in Burlingame, California.
-
- Students wishing to apply for one of these full-paid registrations
- should send a *one*-page-only request, to arrive no later than March 10th.
- They should concisely provide the following information in that one page:
-
- 1. Personal information (name, address, phones, possible fax#, etc.)
- 2. Current college or university, major, areas of special interest,
- grad/undergrad status and expected graduation date. We are especially
- seeking students majoring in law, law enforcement, political science,
- journalism, business, information science and related disciplines.
- 3. A specific statement that they are certain they can arrange all needed
- travel and accomodations for the four-day event.
- 4. A specific statement that they will attend the full four days of the
- event from Monday, 9am, to Thursday, 5:30pm, including the Tuesday and
- Wednesday dinner sessions (also prepaid).
- 5. A paragraph stating why they are interested in attending the event.
- 6. A paragraph stating what they might, or hope to, do with information
- and insights gleaned from this Conference.
-
- The one-page letter or fax should arrive no later than March 10th, sent to:
- John Gilmore Liberty Scholarships (fax is fine)
-
- CFP Conference, 345 Swett Road, Woodside CA 94062; fax/415-851-2814 The ten
- recipients will be notified no later than March 15th, but may be notified
- much earlier. (Due to the very tight time constraints, we reserve the
- right to grant awards to especially deserving applicants before the March
- 10th deadline.)
-
- P.S. -- MAKE HOTEL RESERVATIONS *SOON*!
- If you are planning on attending the CFP Conference, but have not yet made
- your reservations at the Marriott (800-228-9290 #3), you should do so ASAP,
- if you wish to be assured the special $99 Conference discount rate. As we
- approach the March 25th Conference opening, the Marriott is permitted to
- release unbooked rooms -- which means they either won't be available, or
- may require much higher rates (rack rates are $140).
-
- Use it or loose it! :-)
-
- --Jim Warren, CFP Conference Chair
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: The Friendly Folk at NIA (Network Information Access)
- Subject: What is NIA? From: samp@NUCHAT.SCCSI.COM(Sam Parikh) Date: Fri, 1
- Date: Feb 91 15:48 CST
-
- Network Information Access is a text magazine, that relates to the
- underground telecom industry. Articles range from Unix, Vax, and such
- systems. Covering everything from computer crime down to the latest
- computer bug that is floating around.
-
- If you have ever read Phrack, LOD, PHUN, and magazines of that type of
- nature, we are somewhat like that. But more/less reframed then those.
-
- Currently we have 69 issues out, around the middle/end of each month we
- will mail off the next current issue. All BACK ISSUES can be found at the
- CUD (Computer Underground Digest) archive site, please refer to CUD for
- more information or subscribe to their echo at comp.alt.society.cu-digest.
-
- There is no actual "deadline" for articles, reports or papers to be
- submitted, so if you HAVE anything, or are WORKING on something, please
- think of us first. If you have anything to send to NIA, send the completed
- work, as YOU WANT it to appear in our newsletter and after reviewing your
- article, checking to see if we can include it in our NEXT mailing it will
- go out when our next issue is released. All articles are to be sent to
- elisem@nuchat.sccsi.com.
-
- All addresses sent to NIA to be added to our mailing list is kept in the
- stricket confidence, we do NOT give out our list, So YOUR ADDRESS is kept
- confidential and private, and so as not to have your address flooded w/
- hundreds of "Please subscribe to MY newsletter" type mailings.
-
- If an address bounces back as "UNKNOWN" or to such, we will delete that
- address off of our list, so if you change your address, make sure you
- notify us of the change or you will loose the next issue.
-
- If your mailer can NOT handle files in range of 200k send a note of that to
- us, so that we can make the appropriate changes and get you the latest
- copy.
-
- I hope that this explains to you what NIA is and hopefully you'll continue
- to read us, pass us around, and heck, recommend us to a friend.
-
- Creators: Judge Dredd and Guardian Of Time
- elisem@nuchat.sccsi.com
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: kusumoto@CHSUN1.UCHICAGO.EDU(Bob Kusumoto)
- Subject: message for help about archive server
- Date: Wed, 20 Feb 91 19:12:07 CST
-
- ********************************************************************
- *** CuD #3.06: File 3 of 6: CuD Archive Server ***
- ********************************************************************
-
- Some people seem to be having problems using the email archive server based
- here. Here are some helpful hints:
-
- a) place all commands to the archive server in the BODY of the message. The
- server will ignore commands on the subject line.
-
- b) do not use any slashes ('/') in any command. The server does not know
- how to handle commands with slashes in the command.
-
- c) use the "path" command. Although we do have a fairly smart mailer, it's
- not foolproof. This is especially true for sites that are not directly
- on the Internet. UUCP sites should locate a node on the Internet (like
- uunet) and use it as a base. Bitnet sites should add the suffix .bitnet
- to the end of their hostname. For example:
-
- path uunet.uu.net!nexthost!myhost!me
- path me@bithost.bitnet
-
- This should eliminate problems getting to you.
-
- d) If you're asking for many files, it helps to break up the send command
- into multiple files. This is especially true for large files. For example:
-
- send cud cud1.01
- send cud cud1.02
- send cud cud1.03
- is better than
- send cud cud1.01 cud1.02 cud1.03
-
- e) Some helpful commands that the server knows:
-
- index
- index cud
- send cud cud-arch
- send cud chsun1.email.files
-
- Also, try and keep the files you request per send command to under 45000
- bytes. Anything much larger than that will not be sent. If you want
- very large files, send a special request to
- archive-management@chsun1.uchicago.edu and special arrangements will be
- made.
-
- f) This is not the address for requesting futures issues of CuD to be mailed
- to you. You should send those requests to: TK0JUT2@NIU.bitnet
- and place the address for being placed on the mailing list.
-
- Thanks,
- Bob Kusumoto
- chsun1 archive management
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: NEWSBYTES (reprint) by John F. McMullen
- Subject: Felony Charges Dropped against Phiber Optik
- Date: February 20, 1991
-
- ********************************************************************
- *** CuD #3.06: File 4 of 6: No Felony Charges against Phiber O. ***
- ********************************************************************
-
- FELONY CHARGES DROPPED AGAINST "HACKER" 2/20/91
-
- NEW YORK, NEW YORK, U.S.A., 1991 FEB 20(NB) -- The felony charges of
- computer tampering and computer trespass have been dropped against Mark
- Abene, known throughout the "hacker world" as "Phiber Optic". Abene pleaded
- guilty to a misdemeanor charge of unauthorized use of a computer and will
- be sentenced on April 4th on that count.
-
- The arrest of Abene by New York State Police on February 5th followed over
- a year of uncertainty for Abene who had computer equipment and notes seized
- during the execution of a search warrant on January 24th, 1990. At the time
- of the arrest, it was alleged that Abene had electronically invaded a New
- York Telephone Company computer and activated an unused telephone number.
- He then supposedly arranged call forwarding to a "900" number to provide
- free access to an otherwise chargeable service. These allegations led to
- Abene being charged with the two felonies and a misdemeanor for theft of
- services.
-
- The dropping of the felony charges on February 19th in New York state court
- was accompanied by a changing of the theft of services charge to one
- alleging unauthorized use of a computer and it was the new charge to which
- Abene pleaded guilty. Abene's attorney, Carol Grumbach of the firm of
- Levinson & Kaplan told Newsbytes that she expects the April 4th sentencing
- to result in Abene being granted youthful offender status and court records
- sealed as a result. She also expects the remaining charge to be
- conditionally discharged based on Abene's performance of community service
- activities.
-
- Abene, commenting on the resolution of the case, told Newsbytes "I'm very
- glad that this is over. At least now, I know where I stand and that's much
- better than it's been for the last year." Abene also said that the computer
- equipment seized is still in the custody of the authorities and that it is,
- as yet, unclear when it is to be returned.
-
- On the same day in 1990 that the Abene's equipment was seized, search
- warrants were also executed by New York State Police and United States
- Secret Service agents on three other New York residents known by the hacker
- names "Acid Phreak", "Scorpion" and "Flash". Newsbytes was told by informed
- sources that Acid Phreak and Scorpion have been notified by the United
- States Attorney for the Eastern District of New York that they are to be
- charged under federal statutes for computer-related crimes. Newsbytes was
- also told at the time of the Abene arrest that it was decided to charge him
- under state law because his age at the time of the alleged incident would
- have resulted in his classification as a minor under federal law. He was
- charged as an adult under New York law.
-
- Flash was arrested on February 13th by New York State Police and U.S.
- Secret Service agents. was identified as Albert Kong, 23 and charged with
- felony counts of computer trespass and 2nd degree grand larceny. At the
- time of the arrest, New York State Police Senior Investigator Donald
- Delaney told Newsbytes that there was no apparent connection between the
- Kong case and the other cases.
-
- (Barbara E. McMullen & John F. McMullen
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Brock Meeks (Reprinted with permission)
- Subject: The FBI Comes Rapping, Rapping at Your BBS
- Date: February 21, 1991
-
- ********************************************************************
- *** CuD #3.06: File 5 of 6: The FBI Comes Rapping..... ***
- ********************************************************************
-
- COPYRIGHT (C) 1991 BROCK N. MEEKS
-
- INDIVIDUALS MAY COPY THIS ARTICLE TO DISK FOR PERSONAL USE.
- TRANSMISSION OF ANY KIND IS PROHIBITED WITHOUT CONSENT OF AUTHOR
-
- The FBI Comes Rapping, Rapping At Your BBS
- by Brock N. Meeks
-
- (first published in MICROTIMES #44, June 1988)
-
- If that new user on your local bulletin board system (BBS) seems to be
- asking a few too many personal questions, you might want to reconsider
- answering, unless of course, you don't mind your answers being stored in a
- database maintained by the Federal Bureau of Investigation (FBI).
-
- That new user just might be a member of a special FBI task force scouring
- the nation's electronic landscape. Or so contends Glen L. Roberts,
- director of _The FBI Project_ which publishes _The FBI and Your BBS_ and a
- privacy/surveillance newsletter called _Full Disclosure_.
-
- "Now wait a minute," you say, "That smacks of radical LaRouche-type
- paranoid rhetoric!" OK, so I was a bit leery, too. After all the FBI is
- such an easy target. Then I started rummaging through an old, coffee
- cup-ringed file labeled only "FBI/Computer Squad." In there I found
- several old clippings and other documentation that started to back up
- Roberts' statements.
-
- If You Dig, You Hit Dirt =========================
-
- In 1984 a short series of discreet advertisements. placed by the FBI,
- appeared in a few computer trade publications and in _The Wall Street
- Journal_. The message was simple, and went something like: "We're looking
- for computer literate persons to join the Bureau." There was no mention of
- any special task force; however, it was clear that the Bureau wanted to
- upgrade their high-tech prowess.
-
- Although the FBI won't confirm the existance of a computerized "hit squad,"
- a public relations officer from the Bureau did confirm that they "have made
- an extraordinary effort to recruit more technically oriented personnel"
- since 1984.
-
- If you dig hard enough, you'll find substantial evidence that the FBI is
- most definitely working overtime in its efforts to monitor the electronic
- community. "They are desperately wary of the way information flows so
- freely in this medium," says Roberts.
-
- There was a number scrawled on the inside flap of that dog-earred folder.
- It was annotated "Former agent; possible source." I called the number; I
- got a story.
-
- "I was recruited in 1983 by the FBI for my computer skills," the former
- agent told me. Because he stills does some consulting for the Bureau, he
- asked not to be identified, but he laid out a very specific plan by the FBI
- to increase their knowledge of the electronic communications world. He
- confided, "If the Bureau is monitoring BBSs, it's a small group." Much
- more likely, he offered, the FBI is drawing on the expertise of a small
- band of high-tech freelance snoops to augment their staff, until their
- skills are honed.
-
- One member of this freelance team is the well-known John Maxfield. He's
- appeared in everything from the _Washington Post_ to the Today Show to
- _MicroTimes_, bragging about his undercover infiltration of "criminal BBSs"
- on behalf of the FBI. (When I asked a 17-year-old hacker from Texas why no
- one's taken out Maxfield, via computer, the kid told me: "He's too visible;
- he's guarded pretty well as far as his computer records go; we've tried.")
-
- Tradition =========
-
- Certainly the FBI has a tradition of "investigating" groups of people it
- deems "unsavory" or threatening. Recent published reports told of how the
- FBI has gathered files on several pro- Sandanista groups here in the U.S.
- This type of information gathering process seems to be standard operating
- procedure for them.
-
- The _New York Times_ broke a story last year on its front page that
- detailed how FBI agents were visiting New York city libraries and asking
- the librarians to monitor certain people and keep a record of the books
- they checked out; the list would be given to the agent at a later date.
- NYC librarians flatly declined the FBI offer. Perhaps the most startling
- aspect of the story was the "it doesn't hurt to ask" attitude that flowed
- from the FBI when they were confronted and asked for an explanation.
-
- In Roberts' _The FBI and Your BBS_, the a brief history of the FBI's
- willingness to gather all known information on a target group is outlined.
-
- Pulling from the Final Report of the Select (Senate) Committee to Study
- Governmental Operations with respect to Intelligence Activities, Book IV,
- Supplemenatry Reports on Intelligence Activities, Roberts includes this
- excerpt:
-
- "Detectives were sent to local radical publishing houses to take their
- books. In addition, they were to find every private collection or library
- in the possession of any radical, and to make the arrangements for
- obtaining them in their entirety. Thus, when the GID (General Intelligence
- Division) discovered an obscure Italian born philosopher who had a unique
- collection of books on the theory of anarchism, his lodgings were raided by
- the Bureau and his valuable collection become one more involuntary
- contribution to the huge and ever-growing library of the GID. [pages
- 87-88]."
-
- Change "any radical" to "any BBS" and "book" to "disk" and quite suddenly
- the electronic landscape turns into a winter still-life.
-
- Data Collection ================
-
- Roberts, quoting from his report, says, "Unlike other communications media,
- information on a BBS does not get read by anyone before its instantaneous
- publication. Therefore, the FBI has much less of a possibility of
- intimidateing the owner of a BBS into _not_ publishing certain information.
- The FBI also acts as if BBSs have a monopoly on the distribution of
- so-called 'illegal information.' The FBI often uses this 'danger' as
- justification to monitor the activities on these systems. In reality,
- however, BBSs transfer much less 'illegal information' than the phone
- system."
-
- Roberts statements are worth noting in light of the government's increased
- interest in the marriage of criminal activity and electronic
- communications.
-
- A 455-page report issued by the President's Commission on Organized Crime,
- dealing with drug abuse and traffiking cites that fact that crime has moved
- into the high-tech arena. The report states "To the extent that law
- enforcement agencies' capabilities and equipment are inferior to those of
- drug traffickers, immediate steps should be taken to rectify the
- situation." The report then recommends that _data-gathering_ efforts of
- several agencies (including the FBI) should be tied together in one
- "all-source intelligence and operations center."
-
- The spirit of that document is being embraced by the long-distance phone
- companies. Tired of the multi-million dollar losses due to stolen or
- illegally acquired access codes, these companies are circling the wagons in
- a spirit of high-tech cooperative surveillance never before experienced in
- the commercial world.
-
- Quoting from a _Washington Post_ article, here's what Robert Fox, US
- Sprint's director of security, says: "To shut down theft, the companies use
- each other's security services and the help of local law enforcement
- officials, the Secret Service and the Federal Bureau of Investigation.
- Your major toll carriers may be competitors, but in this one instance we
- share information and resourses. We do everything from technical to
- on-street surveillance."
-
- Evidence that the FBI is actively monitoring BBSs also came to light in the
- case of a Denver talk show host that was assassinated by a neo-Nazi group,
- white supremacy group.
-
- When it was discovered that Robert Miles, one of the defendants, was a
- "computer wizard" the FBI began tracking his communications with other
- neo-nazi groups; the FBI found out, and mapped, an intricate network of
- BBSs, by placing a bug in his home. Where was bug placed? Inside Miles'
- modem. Why there? Simple. Any calls he made with his modem would be to
- other online sources; in this way, the FBI reasoned, they could chart the
- (nationwide) network of neo-nazi BBSs, thus following their standing
- tradition of "keeping tabs" on organizations, much like they did in the
- '60s when they had agents infiltrate several radical organizations.
-
- Any Problem Here? =================
-
- There are no laws prohibiting the FBI (or other agencies) from monitoring
- the public message traffic on a BBS; the Electronic Communications Privacy
- Act of 1986 protects private messages and privately stored files only. But
- what about an FBI agent monitoring a BBS solely for the purpose of
- gathering information on the board's users? Any problem here?
-
- The former FBI agent I spoke with raised the concern that such casual
- monitoring might be a violation of the 1968 Wiretap Act. "In order for a
- wire tap, you have to get a court order. Now if an FBI agent is monitoring
- a BBS to gather information, that becomes an interesting question, because
- there are very specific federal rules 'At what point does monitoring turn
- into a wiretap-like act?'"
-
- Good point. And the upshot is: there are no rules.
-
- Unless that agent is asking for private message traffic, he can, without
- impunity, monitor, store, and otherwise manipulate your public messages as
- he sees fit.
-
- Roberts points out that a BBS with public access is fair game for any kind
- of governmental snooping. But there is a way to make such casual snooping
- by a federal agent a crime.
-
- "If you want your BBS readily accessible to the public but want to protect
- against unwarranted monitoring, you have to provide a warning to
- prospective users," says Roberts. "It should read: 'This BBS is a private
- system. Only private citizens who are not involved in government or law
- enforcement activities are authorized to use it. The users are not
- authorized to divulge any information gained from this system to any
- government or law enforcement agency or employee.'"
-
- This does two things. It makes the board "private" in that the sysop
- decides who gets access and who does not. This isn't so unusual; most BBSs
- now have some sort of validation anyway. Second, it makes any kind of
- monitoring by the FBI (or other agencies, such as the Secret Service) a
- criminal offense, and forces them to use the established guidelines of
- gaining information via a court ordered search warrant. The warning also
- protects you in another way: it stops "freelancers" from doing the Bureau's
- work.
-
- Get Real =========
-
- How real is the possibility of the FBI monitoring your BBS? _Slim_.
- Unless of course you happen to run a board dedicated to say, the Sanctity
- Movement, or one that supports the Sandanistas or . . . any topic perceived
- to be of a questionable nature by the FBI.
-
- The stories provided here bear out, if nothing else, an increased interest
- by the FBI in electronic messaging. How extensive is the FBI's actual fact
- gathering by monitoring BBSs? No one knows really knows. However, given
- the history of Bureau, and the hard facts that crime in the information age
- makes full use of all the technology it can get its hands on, it's a small
- leap to believe that at least specific monitoring, of certain target
- groups, is taking place. (Given the manpower shortage of the Bureau, and
- its overwhelming case load, I would find it hard to argue for large-scale
- indiscriminate monitoring.)
-
- Where does that leave you and me in all this? Back to square one, watching
- carefully what we say online. If you're a member of a "controversial" BBS,
- you might pass the concerns of Roberts on to your sysop. If you are a
- sysop, you might want to consider adding a bit of protection to the board .
- . . for the rest of us.
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Brock
- Meeks is a San Diego-based columnist. His favorite radical BBS is . . .
- well . . . private.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: pmccurdy@CUP.PORTAL.COM
- Subject: Some Thoughts on Government Actions
- Date: Fri, 22 Feb 91 07:36:12 PST
-
- ********************************************************************
- *** CuD #3.06: File 6 of 6: Some Thoughts on Gov't Actions ***
- ********************************************************************
-
- In CuD 2.15, the moderators ask "What is the relationship between law
- enforcement and the media?" Later, they state "One of our goals is to
- expand their literacy." I have combined (and slightly modified) these two
- ideas and arrived at the central theme of this article.
-
- THE NATURE OF THE BEAST
-
- We of the CU tend to see our cyberworld as an extension of the real world.
- Even the terminology in use among computer folks supports this. By merely
- sitting at your system and striking keys or manipulating your rodent, you
- can "enter" another system, "take" or "move" files and programs.
-
- Beyond the way we picture these things and the terminology we use, the
- courts have enacted laws (at all levels of government) that give a legal
- basis to the idea that the whole of a computer file is more than merely the
- sum of its individual electronic bits.
-
- Let's look at this idea from another angle. No one will dispute that an
- author should be able to copyright a book or that an inventor should be
- able to patent a widget. But what is a program (or text file) other than a
- new means of representing the author's printed word or the work of a clever
- inventor? So, aside from a few subtle issues (thoughtfully discoursed by
- the likes of Dark Adept, Offer Inbar, David Daniels, et al), we all agree
- on the need for laws that protect electronic property and privacy just as
- we have laws that protect personal property and privacy.
-
- THE ABUSES OF LAW ENFORCEMENT AGENCIES (LEAs)
-
- As a self-styled libertarian, it makes me sick to read about the continued
- abuses perpetrated by overzealous LEAs upon the members of the computing
- community. I am an optimist at heart and I find it hard to believe that
- the people who work in these LEAs are as vindictive, or at least as
- ignorant, as they at first glance appear. As ever more reports of their
- abuses mount, however, I find it hard to maintain a positive attitude. No
- reader of this journal needs to be reminded of all the LEA abuses of the
- last few years. Two acts, however, stand out in my mind as worth
- recounting.
-
- The first involves the seizure of, among many other things of questionable
- use to an investigation, a laser printer at Steve Jackson Games. The
- reason given buy the US Secret Service (SS) for its confiscation was that
- it had RAM. One of two things must be true here. Either the agents
- serving the warrant were so ignorant of computer technology that they
- believed that printer RAM could be used in illegal activities (in which
- case they shouldn't have been working on this type of case), or the seizure
- of the printer was committed as a punitive act against the EMPLOYER of a
- SUSPECTED perpetrator of a criminal act. If the latter is the case, and I
- believe it is, then it is an utterly reprehensible (and possibly illegal)
- act.
-
- The second act that stands out in my mind is the use by the SS of a paid,
- volunteer informant in the E911 case. The details about the exact nature
- of how the SS used this informant are not yet clear. From what is
- currently known, however (see CuD 3.02), it appears that the SS's use of
- this miscreant borders very closely on entrapment. I won't even get myself
- started commenting on the kind of detestable SLIME that would *volunteer*
- to due this kind of work.
-
- AN EXAMINATION OF WHAT MOTIVATES LEA'S
-
- To say that LEAs have been overzealous in their investigations of computer
- crime is a gross understatement. It won't do us any good merely to point
- fingers at the first "bad guy" we see; identifying the culprit won't solve
- the problem. We need to look beyond the immediate problem; we need to look
- at the underlying causes of the problem if we are to discover what we can
- do to improve the situation.
-
- LEAs are run by Directors who sit in Washington fighting for funds with
- which to run their organizations. Inasmuch, they are heavily influenced by
- politicians on Capitol Hill who are, in turn, primarily influenced by
- public opinion. Now, on the subject of computer crime (among many others),
- the public is predominantly influenced by the media. Therein lies the
- problem.
-
- The media have seldom shied away from writing about a subject, even when
- the facts are slim or when their understanding of an issue is nil. This
- becomes painfully apparent when you read articles about computer crime,
- viruses, hackers, etc.
-
- Until last year, I worked in security, concentrating on computer security.
- I considered it a professional responsibility to read every article I could
- find on topics relating to computer security. With few exceptions, these
- articles merely rehashed material from previous articles, perpetuated
- misconceptions, and consistently fed the public hysteria that computer
- hackers were hell-bent on destroying Western Civilization.
-
- I am reminded of a line from the movie Ghostbusters. After informing the
- group that it would be "bad" to cross the beams on their nuclear
- accelerators, Egon is asked to define "bad." "Imagine every molecule in
- your body exploding at the speed of light" he explains, "and all life as we
- know it ceasing to exist." It is in just such a manner that the media
- portrays the issue of computer crime.
-
- So that is the scenario: A uninformed media has whipped an ignorant public
- into a frenzy. The public puts pressure on politicians (who are
- genetically incapable of accepting responsibility) who, in turn, pressure
- LEAs for results. LEAs, no more computer literate than the media or
- public, react by seeking immediate results. Civil rights are trodden upon.
-
- THE CRUX OF THE MATTER
-
- The underlying theme in the scenario that I have described is ignorance or
- a lack of even a minimal amount of computer literacy. The media, the
- public, and the LEAs are all ignorant of the technologies, as well as the
- associated social issues, relevant to this matter. These social issues in
- particular can only be truly appreciated and understood by those with a
- level of computer literacy that is plainly absent in most of the parties to
- this problem.
-
- I have now stretched the blame for this problem from the LEAs, to
- politicians, and on to the media and public. But the responsibility for
- the problem does not entirely end there. A good argument can be made that
- we in the computing community, too, must take a measure of responsibility.
- For too long we have been content to live in our own little piece of
- cyberspace, enjoying the blinding pace of advances in computing
- technologies, and ignoring the problems and issues that accompanied these
- technologies. We can no longer sit on the sidelines and watch. These
- issues are real, they affect us all, and we must all work to solve them.
-
- WHAT WE CAN DO
-
- So what can we, as individuals, do to help solve this problem? If you
- accept the premise that a lack of computer literacy (including the related
- social issues) is the underlying problem, then the answer is clear. It is
- incumbent upon us to educate the uneducated. In summing up his article in
- CUD 2.15, Dark Adept enjoined us to help out the EFF, fight for our rights
- using only legal means, not to hack security but to build public access
- systems, and to expose the truth every chance we get. I couldn't agree
- with him more.
-
- In his excellent book "The Cuckoo's Egg", Cliff Stoll makes the point that
- the mere *impression* of computer crime endangers the thin veil of trust
- upon which most networks are built. We cannot be content with merely
- maintaining current networks, we need to encourage creation of more and
- larger networks. We must lead exemplary electronic lives; we cannot
- tolerate criminal activity or any other activity that puts at risk our
- access to information networks.
-
- Beyond this, however, we must strive to educate all others involved with
- this issue: the media, the public, and the government. "But that's
- everyone!", you say? That's right. We have to do our best to raise
- everyone's level of computer literacy to the point where the average Joe
- (or Jane) on the street would experience the same level of disgust as the
- rest of us at acts such as the seizure of a laser printer.
-
- IN SUMMARY
-
- So there it is. We must continue to discuss these issues (hats off to
- CUD), keep our electronic delvings legal, and educate the world. The first
- two are easy. Educating the world will be the real challenge. To once
- again quote Dark Adept, "The only way to conclusively affect the existence
- of the underground is to affect society."
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.15**
- ********************************************************************
-
-
-