home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Thu, Jan 8, 1992 Volume 4 : Issue 01
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-
- CONTENTS, #4.01 ( Jan 8, 1992)
- File 1--Moderators' Corner
- File 2--How The Government Broke The Law And Went Unpunished
- File 3--Federal Seizure of "Hacker" Equipment" (Newsbytes Reprint)
- File 4--Re: FBI vs. Kiddie Porn (CuD 3.44)
- File 5--Re: Whole Earth Review Questions Technology
- File 6--Law Enforcement, the Government & You
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
- chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 7 Jan 92 10:44:31 CST
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Moderators' Corner
-
- Issue 4.01 launches the new year. For those asking why there was no
- CuD for the past three weeks (#3.44 was the final issue of '91),
- holidays are less than ideal for sending out mail. Systems, people,
- and mysterious cosmic forces go walk-about, and too much mail bounces
- back. That, coupled with Gordon's two-week jaunt to Utah and Jim's
- trek to Michigan, caused the delay.
-
- Apologies to those who sent articles that were delayed. We will catch
- up in the next few weeks.
-
- We encourage longer posts and especially encourage readers to send
- media articles and stories from their local area that might not make
- the national press. Contributors should be sure that, for longer
- articles, no copyright is violated. If there is any question, then
- excerpts should be sent. Shorter new stories of 25-30 lines or less
- are, we are told, generally "fair use."
-
- ------------------------------
-
- Date: Thu, 19 Dec 1991 13:04:39 -0500
- From: Craig Neidorf <knight@EFF.ORG>
- Subject: File 2--How The Government Broke The Law And Went Unpunished
-
-
- JUSTICE DENIED
-
- How The Government Broke The Law And Went Unpunished
-
- by Craig Neidorf
- kl@stormking.com
-
- BACKGROUND:
-
- On January 18, 1990, Craig Neidorf, a 20-year-old college junior and
- editor of an electronic newsletter, was visited by Agents Tim Foley
- and Barbara Golden of the United States Secret Service (acting on
- behalf of William Cook, an assistant U.S. Attorney in the Northern
- District of Illinois, Eastern Division), and Reed Newlin, an agent of
- Southwestern Bell security of Missouri, acting under color of law in
- conjunction with the U.S. Secret Service. Neidorf was questioned as a
- criminal suspect and eventually charged in a multi-count indictment
- with violations of the Computer Fraud & Abuse Act, the Interstate
- Transportation of Stolen Property Act, and the Wire Fraud Act, all
- because of his involvement as editor of a newsletter that disseminated
- to the general public from his bedroom at the Zeta Beta Tau fraternity
- house in Columbia, Missouri. All such charges were subsequently
- dismissed by the U.S. Attorney's Office after a week of trial.
-
- On January 19, 1990, the above named agents returned to Craig
- Neidorf's fraternity house accompanied by a uniformed officer of the
- University of Missouri Police Department. They produced and executed
- a search warrant that empowered them to seize all materials relating
- to Neidorf's newsletter, specifically computer hardware, work product
- of the newsletter, and documentary materials of the newsletter.
-
- These actions by the various law enforcement authorities constitute an
- actionable offense in violation of the Privacy Protection Act of 1980.
-
- __________
-
- TO THE READER:
-
- During the summer of 1990, I wrote the following review of how the
- Privacy Protection Act of 1980 could have been applied to the above
- described incident. After several months of trying to find a way to
- file a claim, I have finally come to realize that the goal I seek is
- unreachable because I do not possess the financial resources to hire
- legal counsel and no law firm or organization capable of handling the
- case will agree to take it on a contingency basis. Furthermore, as I
- read the law, the statute of limitations on this type of action is two
- years and January 19, 1992 is rapidly approaching. Because of reality
- superceding idealism, I have decided instead to present my case to
- you, the public, in the hopes that perhaps something good results from
- people learning the truth, despite that those truly guilty will not be
- punished.
-
- I will attempt to lay out and describe the details, ramifications, and
- importance of these events as they relate to the Privacy Protection
- Act of 1980 and as a convenience, I will be referring to myself in the
- third person and narrating from an advocate's point of view.
-
- I will be citing without quotation directly from the Legislative
- History of the Act and the Act itself as found in P.L. 96-440, pages
- 3950-3976 and Title 42, Chapter 21A, Sections 2000aa-2000aa-7.
-
- __________
-
- *** What Does The Privacy Protection Act of 1980 Do?
-
- Part A of S. 1790 provides broad protections against searches for
- documentary materials which are in the possession of those engaged in
- First Amendment activities. When the materials sought consist of work
- product, a general no search rule applies. When the materials sought
- constitute documentary materials other than work product, a
- subpoena-first rule is generally applicable. The title applies to
- state, local, and federal law enforcement officers. Because
- disseminating information regularly affects interstate commerce,
- congressional authority to regulate state and local enforcement in
- this statute is based on the commerce clause <as found in> United
- States Constitution, Article I, Section 8.
-
-
- *** What Are The Unlawful Acts?
-
- Unlawful acts under section 101 involve searches and seizures
- performed only by governmental officials, not private citizens, and
- conducted "in connection with the investigation or prosecution of a
- criminal offense."
-
- It could be argued that Southwestern Bell is also guilty of violating
- the Act because of Reed Newlin, a security person from Southwestern
- Bell, who acted under color of law alongside the law enforcement
- agents in performing the physical search of Neidorf's room. Newlin
- himself did enter Neidorf's room and physically handle his computer
- equipment (ex. going through Neidorf's dresser drawers and pulling out
- an Apple 1200 baud modem).
-
-
- *** What Does the Privacy Protection Act Protect?
-
- The phrase "in connection with a purpose to disseminate to the public
- ... a form of public communication" reaches not only to materials
- which are to be disseminated to the public or which contain
- information that is to be incorporated in a form of public
- communication, but also materials which are gathered in the course of
- preparing such a publication. For example, a reporter may prepare an
- article which his editor decides should not be published; nonetheless,
- the reporter's interview notes and draft of the article would remain
- protected by the statute. Similarly, all of an author's research
- notes would be protected, although only part of the research was
- ultimately included in the publishing product.
-
- In order to qualify for the statute's protections, the materials must
- be possessed in connection with a purpose of disseminating some form
- of public communication. The term "form of public communication" is
- designed to have a broad meaning. The fact that a local newspaper,
- for example, has a small circulation does not preclude application of
- the statute to searches of the files on the newspaper.
-
-
- *** What Is Work Product?
-
- In section 107(b), Work Product is defined as to encompass the
- materials whose very creation arises out of a purpose to convey
- information to the public. They may be created by the person in
- possession of the materials, or by another person in anticipation of
- public communication.
-
- An example of what this means would show that financial records of a
- business which are held by a member of the press are not work product
- inasmuch as they are not created in connection with plans to "to
- communicate to the public." But, a report prepared by a member of the
- press based on those financial records would constitute work product,
- as would such a report prepared by a whistle-blower who intended that
- the contents of the report be made public.
-
-
- *** How Can A Law Enforcement Agent Determine What Is Work Product?
-
- In the interests of allowing for some objective measure for judgment
- by the Office, the Committee (Congress) has provided that the
- work-product must be possessed by someone "reasonably believed" to
- have a purpose to communicate to the public.
-
-
- *** Exceptions That Allow Law Enforcement Officers To Use A Search
- Warrant To Seize Work Product Instead Of A Subpoena
-
- There are two exceptions, but neither exception applies in this
- situation.
-
- (1). The Suspect Exception allows a search warrant to be used on a
- person who is not an innocent third party, but rather an actual
- suspect. Neidorf was indeed a suspect of a criminal investigation,
- but there is an exception to this exception.
-
- The suspect exception may not be invoked if the only offense of which
- the possessor is suspected is the receipt, possession, communication,
- or withholding of the materials or the information contained therein.
-
- The purpose of this provision is to prevent possible abuse by law
- enforcement authorities. For example, without this provision, if a
- reporter had knowingly received a stolen corporate report, the suspect
- exception could be invoked because the reporter might be said to be
- guilty of a crime of receipt of stolen property. To permit a search
- under such circumstances might unduly broaden the suspect exception.
- In other words, law enforcement agents could simply charge the
- journalist with possession or receipt of stolen goods, general very
- broad offenses, and proceed to seize the desired materials because he
- was a suspect in that basically contrived crime. The Department of
- Justice has felt that this is not good law enforcement policy.
-
- Please Note: The above description very closely resembles the
- scenario that occurred in the Neidorf case if you insert "911
- document" in place of "stolen corporate report."
-
- The suspect exception is retained in cases where the receipt,
- possession, or communications of materials constitutes an offense
- under the existing language of espionage laws or related statutes
- concerning restricted data.
-
- Because the suspect exception may not be invoked if the only offense
- of which the possessor is suspected is the receipt, possession,
- communication, or withholding of the materials or the information
- contained therein, this exception is not applicable.
-
- (2) The second exception allows a lawful search warrant if there is
- reason to believe that the immediate seizure of the materials are
- necessary to prevent death of serious bodily injury. This is clearly
- not applicable to this case.
-
-
- *** What Are Documentary Materials?
-
- Section 107(a) defines documentary materials as to encompass the
- variety of materials upon which information is recorded. Included
- within the definition are not only written and printed materials such
- as reports, records, and interviews, but also films, photographs, tape
- recordings, and videotapes.
-
- Not included in this definition are contraband or the direct fruits of
- a crime, or the things or property designed or intended for use in the
- offense, or have been used as a means of committing the offense.
- Examples listed include; money, guns, weapons, and narcotics.
-
-
- *** Exceptions That Allow Law Enforcement Officers To Use A Search
- Warrant To Seize Work Product Instead Of A Subpoena
-
- There are four exceptions. The first two are the same as those seen
- above in reference to seizure of work product. Since they have
- already been addressed, I will now focus on the two remaining
- exceptions.
-
- (3) An otherwise lawful search <is permitted> for non-work product
- documentary materials if there is reason to believe that the notice
- provided by a subpoena duces tecum would result in the destruction,
- alteration, or concealment of the materials.
-
- Agent Tim Foley's own testimony at the July 1990 criminal trial of
- Craig Neidorf describes the interview and the actions taken by Neidorf
- prior to obtaining the warrant. This same testimony will clearly show
- that there would be no reason to believe that any evidence would have
- been tampered with or destroyed. Indeed, Neidorf cooperated fully
- from the beginning of the investigation, turning over several
- documents and providing information to the agents prior to the search.
- This exception is therefore not applicable.
-
- (4) If after a proceeding resulting in a court order directing
- compliance with a subpoena duces tecum, the possessor of the materials
- still refuses to produce the materials sought, a search warrant may be
- obtained. This exception is clearly not applicable because a subpoena
- was never sought in the first place.
-
- __________
-
- I believe that a careful inspection of the affidavit used to obtain
- the search warrant, the items specified for seizure in the actual
- warrant, and the testimony of Agent Tim Foley of the U.S. Secret
- Service in the criminal trial "United States v. Craig Neidorf" will
- clearly demonstrate that the Secret Service, the U.S. Attorney's
- Office, and potentially others (i.e. University of Missouri Police
- Department and Southwestern Bell) are guilty of violating the Privacy
- Protection Act of 1980 as described above.
-
- __________
-
- *** What Are The Remedies?
-
- Section 106(a) provides a civil cause of action for damages for
- violations of the Act. Such an action may be brought by any person
- aggrieved by a violation of the statute.
-
- When a government until is liable under this Act for a violation of
- this statute committed by one of its officers of employees, it may not
- assert as a defense to the action brought against it the immunity of
- the officer committing the offense or the good faith belief of the
- officer in the lawfulness of his conduct. The traditional doctrine of
- judicial immunity is preserved and available to the government entity.
- In the past, the good faith defense has often precluded the recovery
- for unlawful searches and seizures. Prohibiting the use of this
- defense when the government unit is the defendant in a suit brought
- under this statute is not only a fair means of assuring compensation
- for damages resulting from unlawful governmental searches, it will
- also enhance the deterrent effect of the statute.
-
- The good faith defense can be applied only in situations where the
- offender had reason to believe that the immediate seizure of materials
- was necessary to prevent the death of, or serious bodily injury to, a
- human being. This is not applicable.
-
-
- *** What Types Of Damages Could Be Collected In A Lawsuit?
-
- Section 106(e) describes that a plaintiff bringing an action under
- this section on the statute may recover actual damages resulting from
- a violation of the provision of the Act, but that in any event he is
- entitled to recover liquidated damages of not less than $1,000. The
- provision for a minimum amount of liquidated damages is essential
- because it often will be difficult for a plaintiff to show more than
- nominal or actual damages.
-
- Punitive damages may also be awarded if warranted, as well as
- attorney's fees and litigation costs. It is appropriate that the
- governmental unit be liable for punitive damages.
-
-
- OTHER REMARKS TO THE READER:
-
- In this type of case, the main goal is probably punitive damages. A
- message needs to be sent that violations of privacy and the law must
- be prevented and no one is above the law (least of all those charged
- with the duty of enforcing it).
-
- My reseach indicates that although there are probably many cases,
- there are only two cases on the books where the Privacy Protection Act
- of 1980 has been used in a civil lawsuit. Neither case is on point.
- The current litigation by the Electronic Frontier Foundation in the
- Steve Jackson Games case also addresses the Act, but its facts are
- different in that the SJG case refers to hardcopy publishing using
- computers whereas a Neidorf case would have addressed electronic
- publications specifically.
-
- The Neidorf case is supported by strong evidence and the legislative
- history of the Act shows this case to be exactly the type of which the
- Act was designed to combat. A message needs to be sent that the law
- is meant to be obeyed, not just law about computers, but law in
- general.
-
- Clearly, establishing rights for an electronic publication is another
- step closer to a guaranteed right of free electronic speech. In this
- day and age, WE DARE NOT GIVE UP THAT RIGHT!
-
- ------------------------------
-
- Date:
- From: mcmullen@well.sf.ca.us
- Subject: File 3--Federal Seizure of "Hacker" Equipment" (Newsbytes Reprint)
-
- FEDERAL SEIZURE OF "HACKER" EQUIPMENT 12/16/91
- NEW YORK, NEW YORK, U.S.A., 1991 DEC 16 (NB) -- Newsbytes has learned
- that a joint Unites States Secret Service / Federal Bureau of
- Investigation (FBI) team has executed search warrants at the homes of
- so-called "hackers" at various locations across the country and seized
- computer equipment.
-
- It is Newsbytes information that warrants were executed on Friday,
- February 6th in various places including New York City, Pennsylvania
- and the state of Washington. According to informed sources, the
- warrants were executed pursuant to investigations of violations of
- Title 18 of the federal statutes, sections 1029 & 1030 (Computer Fraud
- and Abuse Act, 1343 (Wire Fraud) and 2511 (Wiretapping).
-
- Law enforcement officials contacted by Newsbytes, while acknowledging
- the warrant execution, refused to comment on what was called "an
- on-going investigation." One source told Newsbytes that the affidavits
- underlying the search warrants have been sealed due to the on-going
- nature of the investigation."
-
- He added "There was obviously enough in the affidavits to convince
- judges that there was probable cause that evidence of a crime would be
- found if the search warrants were issued."
-
- The source also said that he would expect a statement to be issued by
- the Secret Service/FBI team "somewhere after the first of the year."
-
- (Barbara E. McMullen & John F. McMullen/19911216)
-
- ------------------------------
-
- Date: Wed, 18 Dec 91 11:47:09 CST
- From: knute!canary!chris@UUNET.UU.NET(Chris Johnson)
- Subject: File 4--Re: FBI vs. Kiddie Porn (CuD 3.44)
-
- Brief comments on: "FBI Investigates Computerized Child Pornography"
-
- In the referenced article, the following statement was made:
-
- "The FBI said computer bulletin boards are often used by child
- porno-graphers, but for communication purposes only, not for the
- actual transmission of the illegal material."
-
- My feeling is that child pornography is probably one of the biggest
- straw men in this day and age. It's bigger than communists in the
- closet, so to speak. Why do I say this? We all probably read enough
- media to see references to child pornography at least several times a
- month. There's certainly a lot of hysteria and what sounds like a lot
- of law enforcement activity in the area.
-
- Yet I've never seen any, nor do I know anyone who has seen any. Not
- that I'm a collector of pornography by any means. I guess I sort of
- always believed that it must be a Real Big Problem or I wouldn't be
- hearing about it so much. Then I report an investigative article.
- The writers actually looked into the reality. Guess what? They
- couldn't find any either. In fact, the only so-called purveyors they
- could find were law enforcement sting operations!
-
- The upshot was this: more child pornography is advertised and
- distributed by law enforcement people trying to catch other
- pornographers and child molesters than by anyone else, by several
- orders of magnitude it appears.
-
- A lot of this seems to be a left over from the Meese commission and it
- seems the real idea is to censor through intimidation and out-right
- harassment of anything outside Meese's and others puritanical,
- up-tight, right wing beliefs. The spectre of "child pornographers" by
- the thousands is a plenty good smoke screen to hide censorship
- activities, and* garner lots of public support form concerned parents
- at the same time. And even your politicians can jump on the platform
- of "doing something good for the American family" by supporting it.
-
- On the whole, I can't prove there isn't child pornographers using
- BBS's, but I rather doubt it's a pressing problem. I'd rather the FBI
- find a real problem to pursue, like, bribery among government
- officials.
-
- ------------------------------
-
- Date: Thu, 19 Dec 91 16:28:58 pst
- From: well!tomwhite@APPLE.COM(Tom White)
- Subject: File 5--Re: Whole Earth Review Questions Technology
-
- For Immediate Release: December 16,1991
- CONTACT: Tom White (415) 332-1716: E-mail:tomwhite@well.sf.ca.us
-
- WHOLE EARTH REVIEW to Readers:
- Question Technology (while we still have the chance)
-
- Sausalito, CA -- The Winter 1991 issue of WHOLE EARTH REVIEW, the
- "Access to Tools" quarterly supplement to the WHOLE EARTH CATALOG,
- questions the political, economic, social and physical effects
- technology has on our lives. WHOLE EARTH REVIEW also questions its
- fundamental assumption that providing
- access to tools is a good and noble enterprise.
-
- Is technological innovation invariably beneficial? Do we control
- new technologies or do they control us? Will books and libraries
- become obsolete? These are some of the questions that authors in this
- special issue attempt to answer. Editor-in-Chief Howard Rheingold
- writes in the introduction: "Perhaps our readers will be inspired to
- create new tools for thinking about tools."
-
- Among the authors showcased are Jerry Mander, whose book "In
- the Absence of the Sacred" is excerpted at length in the lead article;
- Howard Levine, former director of the National Science Foundation's
- Public Understanding of Science Program; Langdon Winner, a political
- theorist and author; Patricia Glass Schuman, president of the American
- Library Association and of Neal-Schuman Publishers; Linda Garcia, a
- project director and senior analyst at the Office of Technology
- Assessment; Gary T. Marx; Ivan Illich; Amory and Hunter Lovins of the
- Rocky Mountain Institute.
-
- For the past two decades WHOLE EARTH REVIEW has provided its
- readers "access to tools" -- practical information about technologies
- ranging from manual post-hole diggers to virtual-computer systems.
- Subscription price is $27 for four issues, add $6 foreign. No advertising
- accepted. On newsstands and bookstore magazine shelves now.
-
- Copyright 1991, POINT. Permission granted to redistribute freely.
- Whole Earth Review, PO Box 38, Sausalito, CA 94966
-
- ------------------------------
-
- Date: Tue, 7 Jan 92 23:44:19 -0800
- From: Jon Pugh <jpugh@APPLE.COM>
- Subject: File 6--Law Enforcement, the Government & You
-
- I would like to point out one thing in defense of the "zealous" people
- involved in law enforcement efforts that have been discussed recently.
- These are people who have accepted the job of tracking down criminals,
- and that's what they do. Just as we live computers, or whatever, they
- live law enforcement. It is important for them to remember that not
- everyone is guilty, just as it is important for us to remember that
- they are simply _looking_ for criminals, so they tend to focus on that
- goal. If you were assigned to track down computer criminals and you
- didn't know a bit from a scuzzy disk controller, where would you start
- looking? On bulletin boards and at computer club meetings, of course.
- The citizenry needs to remind the authorities that not everyone is a
- criminal and that we _are_ in America (where the Constitution can be
- construed by some to say that it is better to let a guilty man go than
- to punish an innocent one).
-
- On a different subject, I firmly believe in accountability of the
- government. If these allegations connecting the October Surprise to
- the Inslaw software case are even remotely true then the truth
- definitely MUST be known, regardless of whether we have to wake Ron up
- or take the President down. Arguments of the type "We must protect
- the image of the Presidency" are bogus. The President is a man, like
- us. Prone to the same failings as us, only more so because of his
- power. We have already seen how the pressure and power affected
- Richard Nixon. Personally, I do not believe that the president was to
- blame in Ron's case, unless it was simply through negligence. There
- are many career officials assisting the president and others, and it
- may be time for a purge. These people seem to have formed their own
- underground organization, which ostensibly seems to be intended to
- protect and promote a Republican president. Oliver North was willing
- to take the fall for the presidency, but has now recanted. What does
- this say about the way these people treat each other?
-
- There is really only one thing I can do though, and I encourage others
- to do the same thing. Ask questions and talk about this. Make sure
- that everyone you talk to knows about the Inslaw case and the the
- October Surprise. Tell them that nothing is proved, but much is
- implied. Tell them to ask questions and tell _their_ friends. All we
- can do is pay attention and make sure that _they_ can't slip one past
- us. Of course I would be very willing to help anyone who _can_ do
- something directly, but I don't really want to end up slashed to death
- in a bathtub. That's what the allegations are in the Inslaw case, and
- if only for that reason we must all obey the song which still rings
- true:
-
- Stop, hey, what's that sound? Everybody look what's going down.
-
- ------------------------------
-
-
- ------------------------------
-
- End of Computer Underground Digest #4.01
- ************************************
-
-
-