home *** CD-ROM | disk | FTP | other *** search
-
-
- Computer underground Digest Sun, Nov 30, 1991 Volume 3 : Issue 41
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-
- CONTENTS, #3.42 ( November 30, 1991)
- File 1-- Moderators' Corner
- File 2-- CPSR FOIAs Secret Service
- File 3-- Responses to CPSR's FOIA Requests
- File 4-- Why Covert Surveillance is Wrong
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
- chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 30 Nov 91 9:39:58 EST
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1-- Moderators' Corner
-
- We promised Sheldon Zenner's response to Bill Cook's opening statement
- in the Phrack/Knight Lightning trial, but a backlog of material will
- delay it for about two issues. This issue is devoted to the revelation
- of Secret Service covert surveillance of legal public activity
- announced by CPSR (see Craig Neidorf's file below). A lively
- discussion appeared in Telecom Digest (to subscribe via e-mail,
- contact moderator Pat Townson at: telecom@eecs.nwu.edu), which we
- reprint for the many readers who lack Usenet access.
-
- From information slowly emerging from FOIA requests by CPSR, Glen
- Roberts (publisher of _Full Disclosure_), and CuD, it appears that the
- Secret Service clearly overstepped its bounds. Gordon Meyer, co-editor
- of CuD, was investigated as a "hacker" on the basis of his association
- with "suspected hackers" when collecting information for his M.A.
- thesis. It is clear from released files that Secret Service
- investigators had little understanding of what the information they
- obtained, and this led to exaggerated interpretations and demonizing
- of activity that was otherwise legal.
-
- Because cyberspace is a new frontier in which the norms and laws
- governing it are still emerging, it is crucial that the limits
- establishing what law enforcement may or may not do in the new frontier
- be examined and debated. For those who feel that Constitutional
- protections should extent into computer-mediated communication, the
- Secret Service actions are of special concern.
-
- ------------------------------
-
- Date: Fri, 22 Nov 1991 16:51:43 -0500
- From: Craig Neidorf <knight@EFF.ORG>
- Subject: File 2-- CPSR FOIAs Secret Service
-
- *** *** *** *** *** *** *** *** *** *** *** *** ***
-
- Craig Neidorf - Washington Intern
- Electronic Frontier Foundation
- 666 Pennsylvania Avenue, SE
- Suite 303
- Washington, D.C. 20003
- (202)544-9237 Voice
- (202)547-5481 FAX
-
- *** Attribute no comment contained in this message to the ***
- *** Electronic Frontier Foundation unless explicited stated! ***
-
- The Secret Service's response to Computer Professionals for Social
- Responsibility's (CPSR) Freedom of Information Act (FOIA) request has
- raised new questions about the scope and conduct of the agency's
- "computer crime" investigations. The documents disclosed to CPSR
- reveal that the Secret Service monitored communications sent across
- the Internet. The materials released through the FOIA include copies
- of many electronic newsletters, digests, and Usenet groups including
- "comp.org.eff.talk," "comp.sys.att," "Computer Underground Digest"
- (alt.cud.cu-digest)," "Effector Online," "Legion of Doom Technical
- Journals," "Phrack Newsletter," and "Telecom Digest (comp.dcom.
- telecom)". Currently, there is no clear policy for the monitoring of
- network communications by law enforcement agents. A 1982 internal FBI
- memorandum indicated that the Bureau would consider monitoring on a
- case by case basis. That document was released as a result of a
- separate CPSR lawsuit against the FBI.
-
- Additionally, we have found papers that show Bell Labs in New Jersey
- passed copies of Telecom Digest to the Secret Service.
-
- The material (approximately 2500 pages) also suggests that the Secret
- Service's seizure of computer bulletin boards and other systems may
- have violated the Electronic Communications Privacy Act of 1986 and
- the Privacy Protection Act of 1980.
-
- Two sets of logs from a computer bulletin board in Virginia show that
- the Secret Service obtained messages in the Spring of 1989 by use of
- the system administrator's account. It is unclear how the Secret
- Service obtained system administrator access. It is possible that the
- Secret Service accessed this system without authorization. The more
- likely explanation is that the agency obtained the cooperation of the
- system administrator. Another possibility is that this may have been
- a bulletin board set up by the Secret Service for a sting operation.
- Such a bulletin board was established for an undercover investigation
- involving pedophiles.
-
- The documents we received also include references to the video taping
- of SummerCon, a computer hackers conference that took place in St.
- Louis in 1988. The Secret Service employed an informant to attend the
- conference and placed hidden cameras to tape the participants. The
- documents also show that the Secret Service established a computer
- database to keep track of suspected computer hackers. This database
- contains records of names, aliases, addresses, phone numbers, known
- associates, a list of activities, and various articles associated with
- each individual.
-
- CPSR is continuing its efforts to obtain government documentation
- concerning computer crime investigations conducted by the Secret
- Service. These efforts include the litigation of several FOIA
- lawsuits and attempts to locate individuals targeted by federal
- agencies in the course of such investigations.
-
- For additional information, contact:
-
- dsobel@washofc.cpsr.org (David Sobel)
-
- ------------------------------
-
- Date: Thu, 30 Nov 91 10:44: 41 CST
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 3--Responses to CPSR (Reprinted from Telecom Digest)
-
- ((Moderators' note: The following responses to the CPSR FOIA notice
- appeared in Telecom Digest. The posts raise crucial issues of
- monitoring public behavior in the grey area of legitimate
- investigation and unacceptable law enforcement behavior).
-
- Date: Sat, 23 Nov 1991 15:43:39 -0600
- From: TELECOM Moderator <telecom>
- Subject: Re: CPSR FOIAs U.S. Secret Service
-
- In TELECOM Digest V11 #953, Craig Neidorf <knight@eff.org> tells of
- efforts by the Computer Professionals For Social Responsibility to
- seek out evidence of U.S. Secret Service activity relating to
- investigations that agency has undertaken. TELECOM Digest was
- mentioned as one electronic journal apparently examined as part of one
- or more investigations. Perhaps Craig thought that seeing this journal
- in the agency's files would somehow excite (or incite?) me to action.
- Well, he is right. I was motivated to write this response.
-
- > The Secret Service's response to Computer Professionals for Social
- > Responsibility's (CPSR) Freedom of Information Act (FOIA) request has
- > raised new questions about the scope and conduct of the agency's
- > "computer crime" investigations. The documents disclosed to CPSR
- > reveal that the Secret Service monitored communications sent across the
- > Internet.
-
- Since the Internet is a government-owned and managed resource in
- cooperation with numerous publicly funded institutions and others, it
- is fair game for anyone who wishes to 'monitor' its traffic, provided
- that traffic is intended for public consumption and display, as are
- the various e-journals and newsgroups.
-
- Anyone is free -- even members of CPSR -- to interconnect with this
- network and read the newsgroups or subscribe to the various
- e-journals. Craig makes it sound, in his context, like the Secret
- Service did something wrong. In this instance, they did not.
-
- > The materials released through the FOIA include copies of
- > many electronic newsletters, digests, and Usenet groups including
- > "comp.org.eff.talk," "comp.sys.att," "Computer Underground Digest"
- > (alt.cud.cu-digest)," "Effector Online," "Legion of Doom Technical
- > Journals," "Phrack Newsletter," and "TELECOM Digest (comp.dcom.
- > telecom)".
-
- Well I don't know about those other guys mentioned here, but I have no
- problem with TELECOM Digest being in anyone's files.
-
- > Currently, there is no clear policy for the monitoring
- > of network communications by law enforcement agents. A 1982 internal
- > FBI memorandum indicated that the Bureau would consider monitoring on a
- > case by case basis.
-
- Well, why should there be a 'clear policy'? That which is available
- to the public is available to anyone, including employees of
- government agencies. If I can read it, take offense to it and (feeling
- it might be a criminal action) report it to authorities, then why
- can't an employee of the Secret Service read something here, feel the
- same way and report the matter? Or conversely, why can't any member
- of the public read something here, be disinterested in it or bored by
- it and forget the matter.
-
- > Additionally, we have found papers that show Bell Labs in New
- > Jersey passed copies of TELECOM Digest to the Secret Service.
-
- FYI, I have numerous names on the mailing matrix for TELECOM Digest of
- people associated with various government agencies, including the
- Secret Service, the IRS and many others. I ask for one thing from
- people who wish to subscribe: an interest in telecommunications policy
- and practice; and an enthusiasm for understanding telecommunications
- in an intellectually and ethically honest way. I specifically forbid
- and repudiate copyright of TELECOM Digest in the hopes people will
- share their understanding and ideas with others.
-
- If Craig's implication here is that there was something sneaky about
- the passing of the Digest to the Secret Service, then he is entitled
- to think that way; my answer is that had I known someone at Bell Labs
- was going to all that trouble (passing along issues of the Digest) I
- would have added the names of the interested parties to the matrix
- here, or started yet another expansion mailing list (there are
- currently over 100 such expansion mailing lists serviced from the main
- list here).
-
- > Another possibility is that this may have been a bulletin board set
- > up by the Secret Service for a sting operation. Such a bulletin board
- > was established for an undercover investigation involving pedophiles.
-
- I think that's an admirable goal ... investigating pedophiles.
-
- > The documents we received also include references to the video
- > taping of SummerCon, a computer hackers conference that took place in
- > St. Louis in 1988. The Secret Service employed an informant to attend
- > the conference and placed hidden cameras to tape the participants.
-
- Well again, a public event is a public event. It was advertised widely
- and people were invited to attend. That which can be seen with the
- eyes does not become forbidden to view later through the lens of a
- camera for strictly that reason alone.
-
- > The documents also show that the Secret Service established a computer
- > database to keep track of suspected computer hackers. This database
- > contains records of names, aliases, addresses, phone numbers, known
- > associates, a list of activities, and various articles associated with
- > each individual.
-
- Not that you would ever keep any computer database of people with
- interests like your own ....:)
-
- > CPSR is continuing its efforts to obtain government documentation
- > concerning computer crime investigations conducted by the Secret
- > Service. These efforts include the litigation of several FOIA lawsuits
- > and attempts to locate individuals targeted by federal agencies in the
- > course of such investigations.
-
- Fine ... you do your thing. But let me make it perfectly clear you do
- not speak for Patrick Townson and/or TELECOM Digest, although you may
- speak for various readers of the Digest who have asked you to
- represent them or speak for them. I have no problem whatsoever with
- the Secret Service or any other government agency reading what I
- publish here. They don't have to sneak around reading it.
-
- > For additional information, contact:
- > dsobel@washofc.cpsr.org (David Sobel)
-
- By all means, dear readers, contact CPSR if you want more information,
- but as for myself, I support government efforts to crack down on
- computer crime, and electronic invasion of computers by unauthorized
- users. I do not support organizations which would deny the government
- the right to participate in any public forum.
- Email is a whole different matter ... notice I have not mentioned it
- once today. I am talking about newsgroups and public mailing lists.
-
- Patrick Townson
-
- ++++++++++++++++++++++++++++++++++++++
-
- Date: Sat, 23 Nov 1991 21:09 EST
- From: Paul Coen <PCOEN@drew.drew.edu>
- Subject: Re: CPSR FOIAs U.S. Secret Service
-
- Sorry, Pat. While I often agree with what you say, I'm going to have
- to disagree on a few points here.
-
- > Since the Internet is a government-owned and managed resource in
- > cooperation with numerous publicly funded institutions and others, it
- > is fair game for anyone who wishes to 'monitor' its traffic, provided
- > that traffic is intended for public consumption and display, as are
- > the various e-journals and newsgroups.
-
- That's a matter of perception. My description is that the Internet
- started as a DARPA project, and quickly grew. Now, only a portion of
- it is under government control. The international sites certainly
- aren't. While I agree that the federal government has a vested
- interest in what's on the .mil and .gov sites, or what is going over
- lines that the federal government is paying for, that's not a whole
- lot of the net these days. I'd certainly stop short of saying that it
- is "government owned."
-
- > Anyone is free -- even members of CPSR -- to interconnect with this
- > network and read the newsgroups or subscribe to the various
- > e-journals. Craig makes it sound, in his context, like the Secret
- > Service did something wrong. In this instance, they did not.
-
- You're right -- anyone is free, including the Secret Service. More on
- this later, as this actually raises questions about the Secret
- Service's behavior.
-
- > Well I don't know about those other guys mentioned here, but I have no
- > problem with TELECOM Digest being in anyone's files.
-
- Yes, but did all of the people who made contributions realize that it
- could end up in a file pertaining to a Secret Service investigation?
-
- > Well, why should there be a 'clear policy'? That which is available
- > to the public is available to anyone, including employees of
- > government agencies. If I can read it, take offense to it and (feeling
- > it might be a criminal action) report it to authorities, then why
- > can't an employee of the Secret Service read something here, feel the
- > same way and report the matter? Or conversely, why can't any member
- > of the public read something here, be disinterested in it or bored by
- > it and forget the matter.
-
- This is a tough issue -- if the net is considered "public behavior,"
- and statements made here are not criminal in nature (none in TELECOM
- Digest have been to date -- ie, no credit card numbers :), then why
- should it end up in a Secret Service file? Doesn't it then become
- government monitoring legal public activities/statements by citizens?
- Sorry, that's a bit too much like a police state for my liking, in
- flavor if not degree.
-
- > FYI, I have numerous names on the mailing matrix for TELECOM Digest of
- > people associated with various government agencies, including the
- > Secret Service, the IRS and many others. I ask for one thing from
- > people who wish to subscribe: an interest in telecommunications policy
- > and practice; and an enthusiasm for understanding telecommunications
- > in an intellectually and ethically honest way. I specifically forbid
- > and repudiate copyright of TELECOM Digest in the hopes people will
- > share their understanding and ideas with others.
-
- Do you really think the people who placed those excerpts in the files
- were interested in telecom issues? Or in who was saying what? Not
- the people who passed them on, but the "investigators." (Using the
- term loosely -- Foley certainly wasn't much of an investigator IMO.)
-
- > Not that you would ever keep any computer database of people with
- > interests like your own ....:)
-
- Of course, who knows how many people are in that database that
- shouldn't be -- considering that the Secret Service seemed to think
- that the statement that Kermit is a file transfer protocol used on
- mainframes was so serious. I'm surprised that they haven't busted
- Digital Press and confiscated the MS-Kermit User's Guide :).
-
- > By all means, dear readers, contact CPSR if you want more information,
- > but as for myself, I support government efforts to crack down on
- > computer crime, and electronic invasion of computers by unauthorized
- > users. I do not support organizations which would deny the government
- > the right to participate in any public forum.
-
- The problem is that you are dealing with two different entities here.
- On the one hand, you have the individual government employee, who has
- a right to participate in a public forum, and on the other, you have a
- governmental investigation agency, represented by that individual.
-
- Unless it clearly relates to the commission of a crime, or it falls
- under the heading of "expert opinion," relating to an issue under
- investigation (and no copyrights are violated), the government should
- not be placing legal, public statements in the record of a criminal
- investigation is out of line. Sure, they can read it -- but to place
- it in that file implies that there is something wrong with the
- statement. Considering law-enforcement infiltration of legal lobbying
- groups who disagree with policy, and other abuses, you really have to
- wonder who is more paranoid -- extreme privacy advocates who would
- deny the government any role, or the agents of the government. These
- folks really seem to feel that anyone is a potential threat. And
- winding up, even by accident or chance, in one of their files is not a
- trivial matter. It can cost you security clearance, it can cost you a
- job, a promotion, or an appointment.
-
- It's very easy for a paper-pusher to get the idea that "it's all
- criminals on these here groups," based on the appearance of excerpts
- in files (why else would they be there -- remember Ed Meese's
- "innocent people aren't accused of crimes" comment?) -- so anyone who
- posts must not be trustworthy. The government understanding of the
- net is not yet mature enough to assume that they're not going to react
- that way. So far, they've been pretty predictable.
-
- Paul Coen, pcoen@drew.drew.edu, pcoen@drew.bitnet
-
- ++++++++++++++++++++++++++++++++++++++
-
- Date: Sun, 24 Nov 91 01:09 PST
- From: john@zygot.ati.com (John Higdon)
- Subject: Re: CPSR FOIAs U.S. Secret Service
-
- On Nov 23 at 16:46, TELECOM Moderator writes:
-
- > I have no problem whatsoever with
- > the Secret Service or any other government agency reading what I
- > publish here. They don't have to sneak around reading it.
-
- They why do they behave in this manner? The fact is they DO sneak
- around when indeed getting a subscription would be no problem at all.
- After dealing with FBI and telco security types for the past couple of
- years, I have come to believe that they would figure out a complex and
- covert way to glean some information even if it was painted in
- ten-foot high letters on Shasta Dam.
-
- The fact of the matter is that many of these gum shoes are in way over
- their heads on a lot of this computer stuff and it is a full time job
- to keep from looking like the horse's ass. And most of the time they
- are not successful. Secret Service and FBI types have no idea what is
- "sensitive" and what is garbage. I have seen agents pore over
- documents in a case that I would not even fish out of the trash. Most
- amusing was watching a telco security person fawn over a box of
- "evidence" that was filled with stuff supposedly "stolen" from
- Pac*Bell that I would pay you to remove from my garage. It was garbage
- that even Pac*Bell has not used in any way for over thirty years.
-
- Unlike Patrick, I have little or no faith and confidence in law
- enforcement when it comes to "hackers". Even the "experts" I have met
- on that side of the fence tend to drool a bit and would have not a
- clue concerning who and what was "dangerous" or not. For all the
- seizures and raids that have occurred we have seen precious little in
- terms of court action and that which actually has landed in court has
- proven my point.
-
- It is unfortunate that more enlightenment has not managed to find its
- way into government's enforcement arm in the form of knowledgeable
- personnel. But what can you expect when even the laws dealing with
- these "crimes" are confusing and inadequate. You have policemen
- enforcing laws they do not understand, serving warrants issued by
- judges who have not a clue, and occasionally, courts dispensing
- justice in the dark.
-
- Until you have personally witnessed the wheels of enforcement and
- justice grind away on the field of computers and telecommunications,
- you cannot grasp the pitiful nature of these processes, nor comprehend
- the damage that is being done to rights and protections that we all
- used to take for granted. I cannot believe that Patrick would be so
- gung-ho on this matter if he could see the reality of what he
- euphemistically refers to as "enforcement" and "justice". It could not
- be a bigger joke.
-
- > By all means, dear readers, contact CPSR if you want more information,
- > but as for myself, I support government efforts to crack down on
- > computer crime, and electronic invasion of computers by unauthorized
- > users.
-
- Surely you cannot be referring to any of the efforts to date. I have
- personally looked into many of these efforts, some in great detail,
- and am horrified at what misguided efforts these are. To be honest,
- these efforts are also as ineffective as they are unnecessarily harsh.
-
- > I do not support organizations which would deny the government
- > the right to participate in any public forum.
-
- Since when is sneaking around obtaining covert copies of a forum's
- output "participation"? I support organizations that strive to ensure
- that the government operate within the framework of laws and the
- constitution, regardless of how "important" and "urgent" the matters
- under investigation may be represented by that government.
-
- > Email is a whole different matter ... notice I have not mentioned it
- > once today. I am talking about newsgroups and public mailing lists.
-
- A thin line, to be sure. A line that most (if not all) enforcement
- agencies have no problem crossing.
-
- ++++++++++++++++++++++++++++++++++++++
-
- Date: Sun, 24 Nov 1991 10:22:27 -0500 (EST)
- From: NIEBUHR@BNLCL6.BNL.GOV (Dave Niebuhr, BNL CCD, 516-282-3093)
- Subject: Re: CPSR FOIAs U.S. Secret Service
-
- Pat's rebuttal to Craig Neidorf's article fits my perspective 100%
- when it comes to using a public access media such as Usenet. I feel
- that if I put something onto it, then I'm willing to have anyone read
- what I want to say.
-
- Conversely, if I don't want anyone to see it, then I don't post it.
-
- Good show, Pat.
-
- ++++++++++++++++++++++++++++++++++++++
-
- From: Mike Godwin <mnemonic@eff.org>
- Subject: Re: CPSR FOIAs U.S. Secret Service
- Date: Sun, 24 Nov 91 11:52:16 EST
-
- Pat writes:
-
- > By all means, dear readers, contact CPSR if you want more
- > information, but as for myself, I support government efforts to
- > crack down on computer crime, and electronic invasion of computers by
- > unauthorized users. I do not support organizations which would deny
- > the government the right to participate in any public forum.
-
- It should be noted that the Electronic Frontier Foundation has never
- argued that there is a principled rationale for denying the government
- access to public forums. Moreover, both EFF and CPSR have hosted
- public forums on computer crime, civil liberties, and privacy matters
- at which government representatives have been informative and
- enthusiastic participants.
-
- > But let me make it perfectly clear you do not speak for Patrick
- > Townson and/or TELECOM Digest, although you may speak for various
- > readers of the Digest who have asked you to represent them or speak
- > for them.
-
- This seems to me to be an odd comment. I don't know of anyone,
- including Craig Neidorf, who has claimed to "speak for" TELECOM Digest
- or Pat Townson.
-
- You seem to be expressing opposition to CPSR's efforts to find out the
- contours of the government's efforts to fight computer crime. This
- surprises me, since I'd have thought that anyone in a democratic
- society would be interested in knowing how the government is spending
- our tax money -- not to mention whether some of its efforts might affect
- the exercise of the Constitutional right to free speech in a public
- forum.
-
- [Telecom Moderator's Note: Readers who are interested in more information
- about the Electronic Frontier Foundation and/or membership should
- contact Mike Godwin <mnemonic@eff.org>. PAT]
-
- ++++++++++++++++++++++++++++++++++++++
-
- From: mcovingt@athena.cs.uga.edu (Michael A. Covington)
- Subject: Re: CPSR FOIAs U.S. Secret Service
- Date: Sun, 24 Nov 91 19:08:46 GMT
-
- In article <telecom11.953.4@eecs.nwu.edu> knight@eff.org (Craig
- Neidorf) writes:
-
- > The Secret Service's response to Computer Professionals for
- > Social Responsibility's (CPSR) Freedom of Information Act (FOIA)
- > request has raised new questions about the scope and conduct of the
- > agency's "computer crime" investigations. The documents disclosed to
- > CPSR reveal that the Secret Service monitored communications sent
- > across the Internet. The materials released through the FOIA include
- > copies of many electronic newsletters, digests, and Usenet groups
- > including "comp.org.eff.talk," "comp.sys.att," "Computer Underground
- > Digest" (alt.cud.cu-digest)," "Effector Online," "Legion of Doom
- > Technical Journals," "Phrack Newsletter," and "TELECOM Digest
- > (comp.dcom.telecom)". Currently, there is no clear policy for the
- > monitoring of network communications by law enforcement agents.
-
- Two of these are unfamiliar to me, but all the rest are forums which
- everyone is welcome to read. You might as well complain that the
- Secret Service reads your local newspaper.
-
- Seriously, I am concerned about possible violations of people's rights
- by over-zealous agents. But reading comp.dcom.telecom hardly counts
- as snooping!
-
- In article <telecom11.959.1@eecs.nwu.edu> PCOEN@drew.drew.edu (Paul
- Coen) writes:
-
- >> Anyone is free -- even members of CPSR -- to interconnect with this
- >> network and read the newsgroups or subscribe to the various
- >> e-journals. Craig makes it sound, in his context, like the Secret
- >> Service did something wrong. In this instance, they did not.
-
- >> Well I don't know about those other guys mentioned here, but I have no
- >> problem with TELECOM Digest being in anyone's files.
-
- > Yes, but did all of the people who made contributions realize that it
- > could end up in a file pertaining to a Secret Service investigation?
-
- This is something we have had a hard time hammering into the heads of
- the users here at the University of Georgia. A newsgroup is a public
- forum. Posting something in a newsgroup is like publishing it in a
- major newspaper. The person posting it should expect that it will be
- read by practically anybody anywhere.
-
- "I've just posted this for 100,000 people, but don't tell anybody!" is
- unfortunately a common attitude. People seem to think that the
- newsgroups are some kind of underground society where everyone is
- sworn to secrecy.
-
- ++++++++++++++++++++++++++++++++++++++
-
- From: fulk@cs.rochester.edu (Mark Fulk)
- Subject: Re: CPSR FOIAs U.S. Secret Service
- Date: Sun, 24 Nov 1991 21:27:49 GMT
-
- In article <telecom11.954.6@eecs.nwu.edu> telecom (TELECOM Moderator)
- writes:
-
- > In TELECOM Digest V11 #953, Craig Neidorf <knight@eff.org> tells of
-
- ...Long inclusion deleted, consult the previous articles...
-
- I think Pat is attacking a straw man here. Craig Neidorf's posting
- offered no evaluation of the purpose, danger, or legality of the
- included material; Pat only assumed that CPSR/CN/EFF object to the
- government keeping such files. A more appropriate response would be
- "why should this matter?", since no reason for caring was offered.
- I'll offer two reasons I care:
-
- 1) Further evidence that the government investigators are operating in
- the dark.
-
- 2) The use by demagogues of "presence in a file" as evidence for
- guilt. "Ah, yes, Mr. Townson, but we have seen your name in the FBI's
- computer crimes file. Now stop telling us you don't know any credit
- card thiefs." This tactic is the reason the John Birch society used
- to send out postcards accusing people of being communists. The
- postcards were sometimes used by HUAC as evidence of guilt. Among the
- people who were the subject of such postcards were John Kenneth
- Galbraith and Amitai Etzioni (they weren't investigated by HUAC).
-
- >> was established for an undercover investigation involving pedophiles.
-
- > I think that's an admirable goal ... investigating pedophiles.
-
- On the surface. I must admit that I know next to nothing about
- pedophilia. However, I'm fairly certain that it is a condition
- requiring treatment more than a crime requiring punishment. And it
- seems likely to me that the Secret Service's bulletin board would very
- likely be an entrapment; would very likely result in the arrest of
- people who never touch a child despite their condition; and almost
- certainly will do nothing whatsoever to contribute to the safety of
- children. On the other hand, an investigation of the Diocese of
- Chicago would, it seems, be of great value. For some reason, that
- investigation has not yet begun.
-
- >> The documents we received also include references to the video
- >> taping of SummerCon, a computer hackers conference that took place in
- >> St. Louis in 1988. The Secret Service employed an informant to attend
- >> the conference and placed hidden cameras to tape the participants.
-
- > Well again, a public event is a public event. It was advertised widely
- > and people were invited to attend. That which can be seen with the
- > eyes does not become forbidden to view later through the lens of a
- > camera for strictly that reason alone.
-
- Not all events at a conference are public. Most of the interesting
- work goes on in private meeting rooms and bedrooms. People have a
- right to privacy where they might reasonably expect it; if a meeting
- room is labelled private, taping there would violate privacy. Taping
- in anyone's hotel room would certainly be a violation of privacy,
- lacking the permission of the people present. It has been a long time
- since Summercon '88 was a current topic, but I recall that the taping
- occurred in someone's hotel room.
-
- >> The documents also show that the Secret Service established a computer
- >> database to keep track of suspected computer hackers. This database
- >> contains records of names, aliases, addresses, phone numbers, known
- >> associates, a list of activities, and various articles associated with
- >> each individual.
-
- > Not that you would ever keep any computer database of people with
- > interests like your own ....:)
-
- Again, no evaluation of the data was offered, Pat. You're barking at
- the mailman. The point was to give a clear idea of the amount of effort
- the Secret Service has expended. I would expect them to construct
- such a database. What concerns me is the quality of information in
- the database.
-
- I think CPSR's efforts are clearly worthwhile.
-
- >> CPSR is continuing its efforts to obtain government documentation
-
- > Fine ... you do your thing. But let me make it perfectly clear you do
- > not speak for Patrick Townson and/or TELECOM Digest, although you may
-
- > By all means, dear readers, contact CPSR if you want more information,
- > but as for myself, I support government efforts to crack down on
- > computer crime, and electronic invasion of computers by unauthorized
- > users. I do not support organizations which would deny the government
- >the right to participate in any public forum.
-
- The straw is flying now!
-
- Of course the government has a right to participate in c.d.t, and to
- record articles. Of course it should crack down on computer crime,
- provided that in so doing it respects the Constitution and the law,
- and provided (1) that the crackdown is directed at substantial crimes,
- not at teenage pranks that should be dealt with by parents and
- relevant local authorities, and (2) that the crackdown has some chance
- of success.
-
- The problem with Secret Service efforts is that they SEEM to be a
- bunch of Keystone Kops. Since they are apparently unable to approach
- the real problems, they are spending time collecting massive
- quantities of irrelevant material to pad their files. I suspect that
- they are also padding their suspect lists, which makes the matter of
- their database of suspected hackers AND ASSOCIATES a bit of a worry.
-
- One might ask, "How SHOULD the SS proceed?" My prescription: for
- decades there have been persistent rumors of computer thefts by
- insiders. The perpetrators, once caught by their employers, would be
- let go for minimal restitution and silence. The SS should track some
- of those rumors down, and if any turn up correct, prosecute. The
- effort, of course, would be substantial. The probability of success
- is not 100%. But, by all accounts known to me, this is the best way
- to get at the real bulk of computer crime.
-
- [Telecom Moderator's Note: One glaring inaccuracy in your response was your
- comment that 'an investigation of (pedophilia in) the Archdiocese of
- Chicago would be of great value and it has not begun.' The truth here
- is that following several detailed articles in the %Chicago Sun Times%,
- the %Chicago Reader%, a couple articles by myself in misc.legal which
- drew considerable attention, and several news reports on television,
- the 'pedophilia problem' in the Archdiocese of Chicago WAS investigated
- at the church level and IS being investigated by the Cook County State's
- Attorney now. During the past two weeks, six priests have been removed
- from their positions, and more are expected to be removed soon. PAT]
-
- ------------------------------
-
- Date: Mon, 25 Nov 91 01:20 CST
- From: TK0JUT1@NIU.BITNET
- Subject: File 4-- Why Covert Surveillance is Wrong
-
- Criticism of Craig Neidorf's report of CPSR's investigation into
- Secret Service covert surveillance of net-media, use of informants,
- and other intrusive observations justifies law enforcement actions on
- several grounds, including:
-
- 1) Anything public is fair game for covert surveillance.
- 2) People with nothing to hide shouldn't worry about what they say in
- public.
- 3) Computer crime isn't cool, and the government has both the right
- and the responsibility to target evil-doers. Therefore, law
- enforcement need not have clear policies circumscribing the limits
- of covert intrusion.
-
- First, it is categorically false that *anything* done in public is
- fair game for covert surveillance. As anybody from the Chicago area
- should know, Judge Getzendammer (US District Court, Northern District)
- made it quite clear in several rulings against the Chicago police in
- political surveillance cases that covert surveillance of lawful
- activity in public is not to be tolerated in a free society. Further,
- anybody with even a high school civics knowledge of covert
- surveillance in the US understands the distinction between legitimate
- participation in a public event and participating in that event for
- the purpose of collecting, analyzing, and storing information on
- law-abiding citizens.
-
- Scrounging through Usenet traffic to compile dossiers on people not
- under investigation for wrongdoing is as reprehensible as targeting
- license plate numbers from cars in a parking lot at an anti-nukes
- rally as a way of creating a list of possible "subversives." Frank
- Donner's _Protectors of Privilege_ lays out the the historical
- consequences of and responses to covert law enforcement surveillance.
- Blanket intrusion by agents into Constitutionally protected realms
- that include freedom of speech, privacy, and assembly, are not only a
- demonstrable threat to democracy -- they are not generally tolerated
- by the courts.
-
- Second, while law enforcement agents have every right to read whatever
- public document they wish, this misses the point. It is not that
- agents subscribe to and/or read documents. The point is what they do
- with what they read. A 1977 class action suit against the Michigan
- State Police learned, through FOIA requests, that state and federal
- agents would peruse letters to the editor of newspapers and collect
- clippings of those whose politics they did not like. These news
- clippings became the basis of files on those persons that found there
- way into the hands of other agencies and employers. The preliminary
- CPSR information suggests that the Secret Service is conducting their
- investigation in an analogous manner. This has a chilling effect on
- free speech that is arguably (judging from court cases) not only
- illegal, but dangerous. As somebody wrote in CuD recently:
-
- The basis of a democratic society rests on the ability of
- citizens to openly discuss competing ideas, challenge political
- power and assemble freely with others. These fundamental First
- Amendment rights are subverted when, through neglect, the state
- fails to protect them.
-
- Covert collection of information, whether from TELECOM Digest, CuD, or
- newspaper editorials, and the subsequent compilation of secret
- dossiers moves us from a democracy to a police state. The issue isn't
- whether any specific person has something to hide, but rather whether
- somebody might, because of secret information gathering, wish they had
- hidden what they had previously said. We shouldn't have to worry
- about whether what we say pleases law enforcement lest we become
- entries in some database of undesireables.
-
- Finally, few people disagree with the claim that computer crime is
- wrong. But, because a given behavior is wrong hardly justifies carte
- blanche to investigate that behavior. The government should have clear
- policies about the scope of surveillance because it protects *all*
- citizens from the dangers of intrusion by law enforcement into
- Constitutionally protected behavior. Like gravity, specific
- limitations on covert intrusion by law enforcement into our lives
- isn't just a good idea, it's the law.
-
- Computer-mediated communication is relatively new, and the law has not
- caught up with changing technology. CPSR should be commended for its
- efforts to track what appear to be clear violations of existing laws
- and policies in investigation of "computer crime." There is nothing
- noble in acquiescing to the erosion of Constitutionally protected
- activity as those who defend the Secret Service actions seem willing
- to do.
-
- ------------------------------
-
- End of Computer Underground Digest #3.42
- ************************************
-