home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Mon, Feb 10, 1992 Volume 4 : Issue 06
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Associate Moderator: Etaion Shrdlu
-
- CONTENTS, #4.06 ( Feb 10, 1992)
- File 1: Bust of "NotSoHumble Babe" / USA
- File 2: Keystone Stormtroopers
- File 3: Fine for "Logic Bomber"
- File 4: Re: Newsbytes on the Oregon BBS Rates Case
- File 5: Calif. "Privacy [& Computer Crime] Act of 1992"
- File 6: DIAC-92 Workshop Call for Paraticipation and Workshop Guidelines
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
- chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
- NOTE: THE WIDENER SITE IS TEMPORARILY RE-ORGANIZING AND IS CURRENTLY
- DIFFICULT TO ACCESS. FTP-ERS SHOULD USE THE ALTERNATE FTP SITES UNTIL
- FURTHER NOTICE.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 8 Feb 92 17:31: 39 CST
- From: Moderators (tk0jut2@mvs.niu.edu)
- Subject: File 1--Bust of "NotSoHumble Babe" / USA
-
- The recent busts of three persons in the Detroit and Los Angeles areas
- for alleged carding, theft, software copyright violations and fraud
- raise a number of issues of CU relevance. Because of misinformation
- circulating on the nature of the case, we summarize what we know of it
- below. "Amy" (handle: "NotSoHumble Babe") was busted on her birthday,
- and is not untypical of many CU types, so we focus on her.
-
- 1. "Amy" was busted on Jan 30, in Farmington Hills (Mi), by local,
- state, and federal agents. There were reportedly up to 20 agents.
- The large number was because there were several from each
- department, including the FBI, SecServ, Mi State police, and
- others. They reportedly showed no warrant, but knocked on the door
- and asked if they could come in. When "Amy" said "yes," they burst
- (rather than calmly entered) with weapons, including
- "semi-automatics." Her boyfriend was reportedly asleep, and the
- agents awakened him with a gun to his head. The agent in charge
- was Tony Alvarez of the Detroit SecServ.
-
- 2. There has been no indictment, but the agents indicated that charges
- would include theft, fraud, and copyright violations. (software
- piracy and carding). The initial figure given was a combined $20,00
- for the three ("Amy," "Tom," and Mike").
-
- 3. All equipment was confiscated, included "every scrap of paper in
- the house. She was informed that, whatever the outcome of the case,
- she would not receive the equipment back and that it would be kept
- for "internal use."
-
- The above account differs dramatically from one given by "anonymous"
- in "Phantasy #6," which was a diatribe against the three for
- "ratting." However, the above account seems fairly reliable, judging
- from a news account and a source close to the incident.
-
- "Amy" is 27, and reported to be the head of USA (United Software
- Alliance), which is considered by some to be the current top
- "cracking" group in the country. If memory serves, "ENTERPRISE BBS"
- was the USA homeboard. She was questioned for about 10 hours, and
- "cooperated." She has, as of Saturday (Feb 9) *not* yet talked to an
- attorney, although she was put in contact with one late Saturday. The
- prosecutor in Oakland County is the same one who is prosecuting Dr.
- Kavorkian (of "suicide machine" fame). He has a reputation as
- excessively harsh, and his demeanor in television interviews does not
- contradict this.
-
- The other two defendants, "Mike/The Grim Reaper," and "Tom/Genesis"
- are from the Detroit and Los Angeles areas.
-
- What are the issues relevant for us?
-
- My own radiclib concern is with over-criminalization created by
- imposing a label onto a variety of disparate behaviors and then
- invoking the full weight of the system against the label instead of
- the behaviors. It is fully possible to oppose the behaviors while
- recognizing that the current method of labelling, processing, and
- punishment may not be wise. Len Rose provides an example of how
- unacceptable but relatively benign behaviors lead to excessive
- punishment. This, however, is a broader social issue of which
- computer-related crimes is simply a symptom.
-
- Of more direct relevance:
-
- 1) It appears that the continued use of massive force and weaponry
- continues. We've discussed this before in alluding to cases in New
- York, Illinois, Texas, and California. The video tape of the bust
- of the "Hollywood Hacker" resembles a Miami Vice episode: A
- middle-aged guy is confronted with an army of yelling weapons with
- guns drawn charging through the door. Others on the board have
- reported incidences of being met with a shotgun while stepping out
- of the shower, a gun to the head while in bed, and (my favorite) a
- 15 year old kid busted while working on his computer and the
- agent-in-charge put her gun to his head and reportedly said, "touch
- that keyboard and die." The use of such force in this type of bust
- is simply unacceptable because of the potential danger (especially
- in multi-jurisdictional busts, which reduces the precision of
- coordination) of accidental violence.
-
- 2. Until indictments and supporting evidence are made public, we
- cannot be sure what the occured. But, it seems clear that, for
- "Amy" at least, we are not dealing with a major felon. Carding is
- obviously wrong, but I doubt that, in situations such as this,
- heavy-duty felony charges are required to "teach a lesson," "set
- an example," and re-channel behavior into more productive outlets.
-
- 3. We can continue to debate the legal and ethical implications of
- software piracy. There is a continuum from useful and fully
- justifiable "creative sharing" to heavy-duty predatory rip-off for
- profit. This case seems to be the former rather than the latter.
- There is no sound reason for treating extreme cases alike.
-
- 3. We should all be concerned about how LE frames and dramatizes such
- cases for public consumption. The Farmington newspaper gave it
- major coverage as a national crime of immense proportions. We
- should all be concerned about how piracy cases are handled, because
- even extreme cases have implications for minor ones. Does
- possession of an unauthorized copy of Aldus Pagemaker and Harvard
- Graphics, collective worth more than $1,000, really constitute a
- major "theft"? We have seen from the cases of Len and Craig how
- evaluation of a product is inflated to justify indictments that
- look serious but in fact are not.
-
- I'm not sure what purpose it serves to simply assert that people--even
- if guilty of carding or piracy--should "get what's coming to them"
- without reflecting on what it is they get and why. The issue isn't
- one of coddling or protecting "criminals," but to examine more
- carefully what kinds of computer-related crimes should be
- criminalized, which should be torts, and which should be accepted as
- minor nuisances and--if not ignored--at least not criminalized.
-
- To give the dead horse one last kick: I am not arguing that we condone
- behaviors. I am only suggesting that we reflect more carefully on how
- we respond to such behaviors. I do not know the circumstances of "Tom"
- and "Mike," but "Amy's" case raises many issues we can address without
- condoning the behavior.
-
- ------------------------------
-
- Date: Mon, 20 Jan 92 07:56 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: File 2--Keystone Stormtroopers
-
- GRID News. ISSN 1054-9315. vol 3 nu 3 January 19, 1992.
- World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- (74 lines) SPA: Jackboot Fascists or Keystone Kops?
- (C) 1992 by Michael E. Marotta
-
- Suddenly the doors burst open! US marshals take the Acme Inc.,
- employees by surprise!! "Nobody move! Keep your hands away from
- those keyboards!" yells the copper. "Oh my gosh! It's the SPA!!"
- "Quick stash the disks!!" This 50s cartoon is the cover story of
- the June 17, 1991 issue of Information Week, "The Software
- Police." Inside is the story of the Software Publishers Associa-
- tion. There is nothing laughable about the $90,000 paid to SPA by
- IPL, the $100,000 paid by Entrix, the $17,500 paid by Healthline,
- the $350,000 paid by Parametrix. At SnapOn Tools, three US
- Marshals and an SPAer spent two days going through every one of
- 280 PCs with their special audit package. Then the burden of proof
- shifted to SnapOn to produce purchase orders, manuals, invoices
- and asset tags.
-
- "GOVERN-MENTALITY" The SPA claims a staff of 18 to 23 and a
- budget of $3.8 million. I had to call three times to get the free
- audit program, SPAudit. They also offer to sell a video "It's
- Just Not Worth the Risk" for $10 but my three voicemail requests
- (Nov, Dec 91 & Jan 92) for this tape were not answered.
- + People with govern-mentality are below norm and the program
- SP+Audit underscores this fact.
- + First of all, the README file was created with WordPerfect 5.
- Using LIST or TYPE gets you ascii garbage and uneven formating
- am+id the text. If you want to view the README file, the
- instructions tell you:
- + A) To display on screen type TYPE A:README:MORE
- which is bad documentation and doesn't work. Hardcopy reveals the
- same problems and when you get to the bottom of the page, you find
- that the last few lines print over each other. Apparently, the
- typist used the cursor keys to position the text, because it lacks
- some necessary LFs (ascii 0A).
- + I created four dummy files 123.EXE, MSDOS.SYS, PROCOMM.EXE and
- SK+.COM which are found in the PIF.TXT file of over 600 software
- names. The files I created said:
- "The problem of copyright looks somewhat different the moment one
- accepts copying technology as uncontrollable." Michael Crichton.
- + Then I made more copies at lower directory levels. SPAudit
- was indeed able to search down eight directory sublevels to find
- copies. However, when I went to print these, the program produced
- ascii garbage. It failed on
- C:+\123\MIKE\ANOTHER\DEEPER\NEMO\PLUTO\CHIRON\DANTE\ORPHEUS being
- unable to print beyond \NEMO.
- + Overall, the SPA proves itself unable to manage PC technology.
- This lack of quality is not surprising. No matter how much you
- pay for software, you know that the seller "makes no claim of
- merchantability or fitness for a particular use..." and won't be
- liable for "direct, indirect, special, incidental or consequential
- damages arising out of the use or inability to use the software or
- documentation." That is the disclaimer which comes with SPAudit.
- +
- "CATCH-22" Following SPAudit guidelines means that you can't
- have more than one copy of a program on one computer. Also, all
- oF the CARMEN SANDIEGO games run from CARMEN.EXE. The audit
- thinks it is looking for EUROPE but will also trip on WORLD, and
- TI+ME, etc., meaning that you can get busted for buying more than
- one CARMEN, a catch-22.
- + Also, there should be some confusion over dBase, which is no
- longer an Ashton-Tate but a Borland product. More importantly, US
- District judge Terrence Hatter, Jr., ruled in late 1990 that the
- copyright on dBase was voided by their not revealing that it is a
- cl+one of a public domain program from JPL.
- + Again, consider the case of SnapOn Tools. The SPA used their
- defective software to disrupt a business for two days -- and they
- have the nerve to call other people pirates.
- +
- (GRID News is FREQable from 1:159/450, the Beam Rider BBS)
-
- ------------------------------
-
- Date: 27 Jan 92 18:48:35 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 3--Fine for "Logic Bomber"
-
- "Logic Bomb Programmer Fined"
- (Reprinted with permission from STReport 8.04 Jan 24, 1992)
-
- Michael John Lauffenburger, a 31-year-old programmer formerly with
- General Dynamics, pleaded guilty Nov. 4 to attempted computer
- tampering. He has been fined $5,000, handed three years' probation
- and was ordered to perform 200 hours of community service for
- attempting to sabotage computers with a "logic bomb" that prosecutors
- say could have erased national security data.
-
- According to reports, Lauffenburger set up the logic bomb, then
- resigned, intending to get hired on as high-priced consultant to help
- reconstruct the data lost from the billion-dollar Atlas Missile Space
- Program when the virus was unleashed. A co-worker accidentally
- discovered the rogue program in early May. It had been set to go off
- May 24. Investigators said at the time the bomb would have caused
- about $100,000 in damage to computer systems at the Kearny Mesa
- plant.
-
- ------------------------------
-
- Date: Fri, 07 Feb 92 06:10:49 PST
- From: walter@HALCYON.COM(Walter Scott)
- Subject: File 4--Re: Newsbytes on the Oregon BBS Rates Case
-
- On 2-5-92, reporter Dana Blankenhorn released a copyrighted exclusive
- story for Wendy Wood's Newsbytes covering the Oregon BBS rates case.
- What follows is an abstract of that story.
-
- Blankenhorn writes: "US West has launched a campaign before the Oregon
- Public Utility Commission which would force all bulletin board systems
- (BBSs) in that state to pay business rates on their phone lines." The
- Newsbytes exclusive also asserts that US West "wants the Oregon PUC to
- reinterpret its tariff so as to define any phone not answered by a
- human voice as a business line."
-
- Blankenhorn quotes extensively from an apparent interview with SysOp
- Stewart Anthony Wagner while summarizing the chronology of events in
- the case. Some folks here might find the chronology and alleged facts
- be a bit different from what has been reported in the past.
-
- According to Blankenhorn, Portland, Oregon SysOp Tony Wagner attempted
- to subscribe to extra phone lines so as to expand his BBS from 2 lines
- to 4, as well as make arrangements for a TDD. It was at this point
- Wagner was informed he would have to pay business rates on all lines
- by US West. According to Blankenhorn, US West relented on the voice
- and TDD lines while maintaining that the BBS lines would have to be
- classified as business lines. Wagner filed what Blankenhorn calls an
- "appeal" at the Oregon PUC "for the BBS".
-
- Wagner is reported to have closed his BBS almost immediately because
- he "can't afford it" at business rates, which blankenhorn states to be
- around $50 (presumably per month) on each line. Before closing his
- system, Wagner says he alerted regional SysOps via FidoNet to his
- plight. Wagner points out that some SysOps chipped in to pay for a
- lawyer. Blankenhorn quotes Wagner on a so-called "compromise proposal"
- that "they (US West) come up with a residential data line rate, as an
- alternate form of service." Wagner's proposal apparently included a
- guarantee of data quality at a rate that Wagner seems to assess at
- $5.00 above standard residential rates. Wagner asserts the proposal
- was rejected.
-
- Wagner's comments on the hearing display optimism as he offers the
- thought that "the hearing went quite well. The tariff says a
- residential line is for social or domestic purpose. They ignored the
- social, they talked only about domestic. The BBS is as social as you
- can get."
-
- In a series of quotes from Wagner on what he believes US West is
- doing, a grim picture is painted for more than BBS operators. For
- example: Wagner states "there is no question they want to apply this
- to all SysOps. Their position is that if it's not answered by a human
- voice, it's a business. A fax machine is a business, to them. So's an
- answering machine."
-
- Wagner spoke of what he might consider a silver lining in his cloudy
- future as a SysOp when he told Blankenhorn that publicity must be bad
- for US West. He reinforces this idea by noting "one thing that hurt
- them (US West) badly was that they picked on me. I'm very hard of
- hearing. Most of my users are disabled. A large percentage of our
- SysOps here are disabled. And Mr. Holmes (US West's attorney in the
- Wagner case) was unprepared for that."
-
- Blankenhorn talked with Judith Legg in the hearings section at the
- Oregon Public Utility Commission concerning the Wagner Case. He
- reports Legg told him "a hearing was held on the case in January, and
- US West has already submitted a 17-page brief supporting its
- position." Hearings Officer Simon Fitch was attributed as informing
- Newsbytes that Wagner "has until March 3 to file his own brief, after
- which reply briefs will be sought from both sides." Fitch is also
- reported to have said a decision in the case is due in late March or
- early April with final oversight from the Commissioners.
-
- Attempts, by Blankenhorn, to contact attorney Steven Holmes at US West
- were unsuccessful. Apparently, no one else in the company was
- available for comment. Thus, the Newsbytes article contained no
- synopsis of US West's side of the issues in the Wagner case.
- Blankenhorn left the door open to a future update by noting
- information requested from US West would be reported as soon as that
- information is made available to Newsbytes.
-
- So much for the abstract...
-
- A FEW OBSERVATIONS: It seems that Blankenhorn must not have been able
- to obtain a copy of US West's brief before going to press. Otherwise,
- Blankenhorn would realize, and could have noted, that US West's
- comments have no impact on FAX or answering machines. BBS operation in
- general, and Wagner's BBS in specific, are the myopic focus of the
- brief. Blankenhorn also could have asked about and cleared up what
- appears to be a discrepancy between Wagner's apparent indication that
- he was running his BBS on 2 phone lines at the time he requested new
- lines, and the repeated references in the US West brief to Wagner's
- "3" BBS phone lines. Finally, I called Judith Legg myself on 2-6-92
- and asked her about the actual timing of the hearing. She informed me
- that the hearing was indeed in December. In Blankenhorn's defense,
- Legg admits that she was under the mistaken impression that the
- hearing took place in January, and that this is probably what she told
- Blankenhorn. A check of the Oregon PUC's computerized schedules was
- necessary to clarify the actual hearing date.
-
- Walter Scott
-
- **
- The 23:00 News and Mail Service - +1 206 292 9048 - Seattle, WA USA
- PEP, V.32, V.42bis
- +++ A Waffle Iron, Model 1.64 +++
-
- ------------------------------
-
- Date: 22 Jan 92 19:12:22 CST
- From: Jim Warren (jwarren@well.sf.ca.us)
- Subject: File 5--Calif. "Privacy [& Computer Crime] Act of 1992"
-
- The Chair of the California State Senate, Bill Lockyer, is
- introducing what he calls "The Privacy Act of 1992." It addresses
- computer *crime* in a robust manner, but appears to be less concerned
- with some of the more major privacy issues (e.g. personal
- data/profiles built & used by government and private corporations)
- posed during public testimony in December. I scanned it in, OCRed
- it, proofed it, and believe this is an accurate copy of the original
- cover letter and content. The latter has already been sent to
- Legislative Counsel (on 1/8/92).
-
- Please upload it and circulate it to all others who might be
- interested. Note: Many consider that computer legislation at the
- state level in major, "bellweather" states may/can/will provide
- models for other states and for eventual federal legislation. Thus,
- this deserves *early* and widespread circulation, review and *public
- comment*.
-
- jim warren [chair, First Conference on Computers, Freedom & Privacy, 1991]
-
- **********************************************************************
-
- ====== TEXT OF COVER-LETTER, RECEIVED JAN. 17, 1992 =====
-
- California State Senate
- Bill Lockyer, Tenth [California] Senatorial District
- [Chairman, California State Senate Judiciary Committee]
- Southern Alameda County
-
- January 15, 1992
-
- TO: Interested Parties
-
- FROM: Ben Firschein, Senator Lockyer's Office
-
- RE: Privacy legislation emerging from the interim hearing
-
- We have drafted language reflecting some of the suggestions made at
- the privacy hearing on December 10 [1991] and have sent it to
- Legislative Counsel. It is likely that Senator Lockyer will
- introduce the language as a bill when it comes back from Legislative
- Counsel.
-
- We welcome and encourage your suggestions, comments and proposed
- amendments. This language should be viewed as an initial proposal,
- and it is likely that it will be amended as it proceeds through the
- legislature.
-
- The bill as submitted to Legislative Counsel does the following:
-
- 1. Information obtained from driver's licenses: prohibit businesses
- from selling or using for advertising purposes information obtained
- from driver's licenses without the written consent of the consumer.
-
- 2. Automatic vehicle identification [AVI]: Require Caltrans to
- provide an opportunity to pre-pay tolls and use the facility
- anonymously.
-
- 3. Violation of privacy of employees: language has been drafted
- based on the Connecticut statute that Justice Grodin discussed at the
- hearing. The proposed language goes further than the Connecticut
- statute in that it also extends to prospective employees.
-
- 4. Amend Penal Code Section 502 (computer crime statute) as
- follows:
-
- a) Extend existing law to allow recovery by any injured party,
- not just the owner or lessee of the computer.
-
- b) Allow recovery for any consequential or incidental damages,
- not just for expenditures necessary to verify that a computer system
- was or was not damaged.
-
- c) Create civil penalty of $ 10,000 per injured party up to a
- maximum of fifty thousand dollars for recklessly storing data in a
- manner which enables a person to commit acts leading to a felony
- conviction. Failure to report to law enforcement a previous
- violation under the statute would be deemed to be possible evidence
- of recklessness
-
- d) Require that owner or lessee of computer report to law
- enforcement any known violations of the statute involving his/her
- system. Such reports required within 60 days after they become
- known to owner or lessee.
-
- Warrants for electronically stored materials: We are interested in
- working with interested parties on some of the proposals made at the
- hearing, for possible inclusion in the bill as amendments.
- Please direct your comments to:
-
- Ben Firschein
- Administrative Assistant
- Office of Senator Lockyer
- Room 2032 State Capitol
- Sacramento, CA 95814
- (916) 445Q6671
-
- ========== END OF JAN.17 COVER LETTER ==========
-
- <<BEWARE! The entry following this one is about 5 print-pages long
- -- the full text of Sen. Lockyer's draft legislation that has already
- been sent to Legislative Counsel for review, apparently the final
- prerequisite to formal introduction.>>
-
- ====== TEXT OF LEGISLATION, RECEIVED JAN. 17, 1992 =====
-
- [hand-written] The people of the State of California do enact as follows:
-
- [hand-written] Section 1. This Act may be cited as the Privacy Act of 1992.
- [hand-written] Section 2. Section 1799.4 is added to the Civil Code to
- read:
-
- 1799.4. A business entity that obtains information from a consumer's
- driver's license or identification card for its business records or for
- other purposes shall not sell the information or use it to advertise goods
- or services, without the written consent of the consumer.
-
- [hand-written] Sent to Leg Counsel 1/8
-
- [hand-written] Section 3. Section 502 of the Penal Code is amended to read:
-
- 502. (a) It is the intent of the Legislature in enacting this section to
- expand the degree of protection afforded to individuals, businesses, and
- governmental agencies from tampering, interference, damage, and
- unauthorized access to lawfully created computer data and computer
- systems. The Legislature finds and declares that the proliferation of
- computer technology has resulted in a concomitant proliferation of computer
- crime and other forms of unauthorized access to computers, computer
- systems, and computer data.
-
- The Legislature further finds and declares that protection of the
- integrity of all types and forms of lawfully created computers, computer
- systems, and computer data is vital to the protection of the privacy of
- individuals as well as to the well-being of financial institutions,
- business concerns, governmental agencies, and others within this state
- that lawfully utilize those computers, computer systems, and data.
-
- (b) For the purposes of this section, the following terms have the
- following meanings:
-
- (l) "Access" means to gain entry to, instruct, or communicate with the
- logical, arithmetical, or memory function resources of a computer, computer
- system, or computer network.
-
- (2) "Computer network" means any system which provides communications
- between one or more computer systems and input/output devices including,
- but not limited to, display terminals and printers connected by
- telecommunication facilities.
-
- (3) "Computer program or software" means a set of instructions or
- statements, and related data, that when executed in actual or modified
- form, cause a computer, computer system, or computer network to perform
- specified functions.
- (4) "Computer services" includes, but is not limited to, computer time,
- data processing, or storage functions, or other uses of a computer,
- computer system, or computer network.
-
- (5) "Computer system" means a device or collection of devices, including
- support devices and excluding calculators which are not programmable and
- capable of being used in conjunction with external files, one or more of
- which contain computer programs, electronic instructions, input data, and
- output data, that performs functions including, but not limited to, logic,
- arithmetic, data storage and retrieval, communication, and control.
-
- (6) "Data" means a representation of information, knowledge, facts,
- concepts, computer software, computer programs or instructions. Data may
- be in any form, in storage media, or as stored in the memory of the
- computer or in transit or presented on a display device.
-
- (7) "Supporting documentation" includes, but is not limited to, all
- information, in any form, pertaining to the design, construction,
- classification, implementation, use, or modification of a computer,
- computer system, computer network, computer program, or computer software,
- which information is not generally available to the public and is
- necessary for the operation of a computer, computer system, computer
- network, computer program, or computer software.
-
- (8) "Injury" means any alteration, deletion, damage, or destruction of
- a computer system, computer network, computer program, or data caused by
- the access.
-
- (9) "Victim expenditure" means any expenditure reasonably and necessarily
- incurred by the owner or lessee to verify that a computer system, computer
- network, computer program, or data was or was not altered, deleted,
- damaged, or destroyed by the access.
-
- (10) "Computer contaminant" means any set of computer instructions that
- are designed to modify, damage, destroy, record, or transmit information
- within a computer, computer system, or computer network without the intent
- or permission of the owner of the information. They include, but are not
- limited to, a group of computer instructions commonly called viruses or
- worms, which are self-replicating or self-propagating and are designed to
- contaminate other computer programs or computer data, consume computer
- resources, modify, destroy, record, or transmit data, or in some other
- fashion usurp the normal operation of the computer, computer system, or
- computer network.
-
- (c) Except as provided in subdivision (h), any person who commits any of
- the following acts is guilty of a public offense:
-
- (1) Knowingly accesses and without permission alters, damages, deletes,
- destroys, or otherwise uses any data, computer, computer system, or
- computer network in order to either (A) devise or execute any scheme or
- artifice to defraud, deceive, or extort, or (B) wrongfully control or
- obtain money, property, or data.
-
- (2) Knowingly accesses and without permission takes, copies, or makes use
- of any data from a computer, computer system, or computer network, or takes
- or copies any supporting documentation, whether existing or residing
- internal or external to a computer, computer system, or computer network.
-
- (3) Knowingly and without permission uses or causes to be used computer
- services.
-
- (4) Knowingly accesses and without permission adds, alters, damages,
- deletes, or destroys any data, computer software, or computer programs
- which reside or exist internal or external to a computer, computer system,
- or computer network.
-
- (5) Knowingly and without permission disrupts or causes the disruption of
- computer services or denies or causes the denial of computer services to an
- authorized user of a computer, computer system, or computer network.
-
- (6) Knowingly and without permission provides or assists in providing a
- means of accessing a computer, computer system, or computer network in
- violation of this section.
-
- (7) Knowingly and without permission accesses or causes to be accessed
- any computer, computer system, or computer network.
-
- (8) Knowingly introduces any computer contaminant into any computer,
- computer system, or computer network.
-
- (d) (1) Any person who violates any of the provisions of paragraph (1),
- (2), (4), or (5) of subdivision (c) is punishable by a fine not exceeding
- ten thousand dollars ($10,000), or by imprisonment in the state prison for
- 16 months, or two or three years, or by both that fine and imprisonment, or
- by a fine not exceeding five thousand dollars ($5,000), or by imprisonment
- in the county jail not exceeding one year, or by both that fine and
- imprisonment.
-
- (2) Any person who violates paragraph (3) of subdivision (c) is
- punishable as follows:
-
- (A) For the first violation which does not result in injury, and where
- the value of the computer services used does not exceed four hundred
- dollars ($400), by a fine not exceeding five thousand dollars ($5,000), or
- by imprisonment in the county jail not exceeding one year, or by both that
- fine and imprisonment.
-
- (B) For any violation which results in a victim expenditure in an amount
- greater than five thousand dollars ($5,000) or in an injury, or if the
- value of the computer services used exceeds four hundred dollars ($400), or
- for any second or subsequent violation, by a fine not exceeding ten
- thousand dollars ($10,000), or by imprisonment in the state prison for 16
- months, or two or three years, or by both that fine and imprisonment, or by
- a fine not exceeding five thousand dollars ($5,000), or by imprisonment in
- the county jail not exceeding one year, or by both that fine and
- imprisonment.
-
- (3) Any person who violates paragraph (6), (7), or (8) of subdivision (c)
- is punishable as follows:
-
- (A) For a first violation which does not result in injury an infraction
- punishable by a fine not exceeding two hundred fifty dollars ($250).
-
- (B) For any violation which results in a victim expenditure in an amount
- not greater than five thousand dollars ($5,000), or for a second or
- subsequent violation, by a fine not exceeding five thousand dollars
- ($5,000), or by imprisonment in the county jail not exceeding one year, or
- by both that fine and imprisonment.
-
- (C) For any violation which results in a victim expenditure in an amount
- greater than five thousand dollars ($5,000), by a fine not exceeding ten
- thousand dollars ($10,000), or by imprisonment in the state prison for 16
- months, or two or three years, or by both that fine and imprisonment, or
- by a fine not exceeding five thousand dollars ($5,000), or by imprisonment
- in the county jail not exceeding one year, or by both that fine and
- imprisonment.
-
- (e) (1) In addition to any other civil remedy available, any injured
- party. including but not limited to the owner or lessee of the computer,
- computer system, computer network, computer program, or data, may bring a
- civil action against any person convicted under this section for
- compensatory damages, including any consequential or incidental damages. In
- the case of the owner or lessee of the computer, computer system, computer
- network, computer program, or data. such damages may include. but are not
- limited to. any expenditure reasonably.and necessarily incurred by the
- owner or lessee to verify that a computer system, computer network,
- computer program, or data was or was not altered, damaged, or deleted by
- the access.
-
- (2) Whoever recklessly stores or maintains data in a manner which enables
- a person to commit acts leading to a felony ["a felony" hand-written]
- conviction under this section shall be liable for a civil penalty of ten
- thousand dollars ($ 10,000) per injured party, up to a maximum of fifty
- thousand dollars ($ 50.000). Failure to report to law enforcement a
- previous violation under subsection (f) may constitute evidence of
- recklessness.
-
- (3) For the purposes of actions authorized by this subdivision, the
- conduct of an unemancipated minor shall be imputed to the parent or legal
- guardian having control or custody of the minor, pursuant to the provisions
- of Section 1714.1 of the Civil Code.
-
- (4) In any action brought pursuant to this subdivision the court may
- award reasonable attorney's fees to a prevailing party.
-
- (5) A community college, state university, or academic institution
- accredited in this state is required to include computer-related crimes as
- a specific violation of college or university student conduct policies and
- regulations that may subject a student to disciplinary sanctions up to and
- including dismissal from the academic institution. This paragraph shall
- not apply to the University of California unless the Board of Regents
- adopts a resolution to that effect.
-
- (f) The owner or lesee of any computer, computer system, computer network,
- computer program, or data shall report to law enforcement any known
- violations of this section involving the owner or lesee's computer,
- computer system, computer network, computer program, or data. Such reports
- shall be made within 60 days after they become known to the owner or lesee.
-
- (g) This section shall not be construed to preclude the applicability of
- any other provision of the criminal law of this state which applies or may
- apply to any transaction, nor shall it make illegal any employee labor
- relations activities that are within the scope and protection of state or
- federal labor laws.
-
- (h) Any computer, computer system, computer network, or any software or
- data, owned by the defendant, which is used during the commission of any
- public offense described in subdivision (c) or any computer, owned by the
- defendant, which is used as a repository for the storage of software or
- data illegally obtained in violation of subdivision (c) shall be subject
- to forfeiture, as specified in Section 502.01.
-
- (i) (1) Subdivision (c) does not apply to any person who accesses his or
- her employer's computer system, computer network, computer program, or
- data when acting within the scope of his or her lawful employment.
-
- (2) Paragraph (3) of subdivision (c) does not apply to any employee who
- accesses or uses his or her employer's computer system, computer network,
- computer program, or data when acting outside the scope of his or her
- lawful employment, so long as the employee's activities do not cause an
- injury, as defined in paragraph (8) of subdivision of (b), to the employer
- or another, or so long as the value of supplies and computer services, as
- defined in paragraph (4) of subdivision (b), which are used do not exceed
- an accumulated total of one hundred dollars ($100).
-
- (j) No activity exempted from prosecution under paragraph (2) of
- subdivision (h) which incidentally violates paragraph (2), (4), or (7) of
- subdivision (c) shall be prosecuted under those paragraphs.
-
- (k) For purposes of bringing a civil or a criminal action under this
- section, a person who causes, by any means, the access of a computer,
- computer system, or computer network in one jurisdiction from another
- jurisdiction is deemed to have personally accessed the computer, computer
- system, or computer network in each jurisdiction.
-
- (l) In determining the terms and conditions applicable to a person
- convicted of a violation of this section the court shall consider the
- following:
-
- (1) The court shall consider prohibitions on access to and use of
- computers.
-
- (2) Except as otherwise required by law, the court shall consider
- alternate sentencing, including community service, if the defendant shows
- remorse and recognition of the wrongdoing, and an inclination not to repeat
- the offense
-
- [hand-written] Section 4. Section 12940.3 is added to the Government Code
- to read:
-
- (a) Any employer, including the state and any instrumentality or political
- subdivision thereof, shall be liable to an employee or prospective
- employee for damages caused by either of the following:
-
- (1) subjecting the employee to discipline or discharge on account of the
- exercise by such employee of rights guaranteed by Section l of Article I
- of the California Constitution, provided such activity does not
- substantially interfere with the employee's bona fide job performance or
- working relationship with the employer.
-
- (2) Denying employment to a prospective employee on account of the
- prospective employee's exercise of rights guaranteed by Section 1 of
- Article I of the California Constitution.
-
-
- (b) The damages awarded under this Section may include punitive damages,
- and reasonable attorney's fees as part of the costs of any such action for
- damages. If the court decides that such action for damages was brought
- without substantial justification, the court may award costs and reasonable
- attorney's fees to the employer.
-
- [hand-written] Section 5. Section 27565 of the Streets and Highways Code
- is amended to read:
-
- 27565. Automatic vehicle identification systems for toll collection
- (a) The Department of Transportation in cooperation with the district and
- all known entities planning to implement a toll facility in this state
- shall develop and adopt functional specifications and standards for an
- automatic vehicle identification system, in compliance with the following
- objectives:
-
- (1) In order to be detected, the driver shall not be required to reduce
- speed below the applicable speed for the type of facility being used.
-
- (2) The vehicle owner shall not be required to purchase or install more
- than one device to use on all toll facilities, but may be required to have
- a separate account or financial arrangement for the use of these facilities.
-
- (3) The facility operators shall have the ability to select from different
- manufacturers and vendors. The specifications and standards shall encourage
- multiple bidders and shall not have the effect of limiting the facilIty
- operators to choosing a system which is able to be supplied by only one or
- vendor.
-
- (b) The vehicle owner shall have the choice of pre-paying tolls, or being
- billed after using the facility. If the vehicle owner pre-pays tolls:
-
- (1) The facility or the Department shall issue an account number to the
- vehicle owner. The account number shall not be derived from the vehicle
- owner's name, address, social security number, or driver's license number,
- or the vehicle's license number, vehicle identification number, or
- registration.
-
- (2) Once an account has been established and an account number has been
- given to the vehicle owner, neither the facility nor the Department shall
- keep any record of the vehicle owner's name, address, social security
- number or driver's license number, or the vehicle's license number.
- vehicle identification number, or registration.
-
- (3) The vehicle owner may make additional pre-payments by specifying the
- account number and furnishing payment.
-
- (c) Any automatic vehicle identification system purchased or installed
- after January 1, 1991, shall comply with the specifications and standards
- adopted pursuant to subdivision (a).
-
- (d) Any automatic vehicle identification system purchased or installed
- after January 1, 1993. shall comply with the specifications and standards
- adopted pursuant to subdivisions (a) and (b).
-
- ====== END OF LEGISLATION DRAFT ======
-
- [Note: The preceeding is the end-result of the draft-text. Some of the
- document had apparently-old wording with strike-thru lines; some of it was
- underlined, apparently indicating newly-added wording. Since there is no
- universally-accepted protocol for representing such "exotic" text-forms in
- the Barren ASCII Wasteland, the preceeding text does not reflect strike-thrus
- not underlines in the original text. Also, the preceeding reflects
- the paragraph-indenting and paranthesized section-labeling, as
- received. It is left as "an exercise for the reader" to figure out
- its rationale.
- --jim ]
-
- The vast majority of us would readily state that we, personally,
- "store and maintain data." To the extent that we do so on a shared
- host, it seems like it could be applied to us, *as individuals*.
- Unless, perhaps, we stored it in encrypted form or made other
- provable efforts to protect it while it's stored on a shared system.
-
- Please note that this scenario equally applies to folks working on
- LAN systems at a company.
-
- Is this, perhaps, "overly-broad legislation"?
-
-
- ------------------------------
-
- Date: Wed, 22 Jan 1992 13:59:44 CST
- From: douglas%atc.boeing.com@UMCVMB.MISSOURI.EDU
- Subject: File 6--DIAC-92 Workshop Call for Paraticipation and Workshop Guideline
- s
- Directions and Implications of Advanced Computing
-
- DIAC-92
-
- Berkeley, California May 3, 1992
-
- Call for Workshop Proposals and
-
- Workshop Proposal Guidelines
-
- [Due Date Extended]
-
-
- DIAC-92 is a two-day symposium in which the the social implications of
- computing are explored. The first day (May 2, 1992) will consist of
- presentations. The second day will consist of a wide variety of
- workshops. These guidelines describe the intent for the workshops and the
- manner in which they are proposed. They are meant to augment and
- supercede the information found in the Call for Papers and Participation.
- The workshops are meant to be more informal than the presented papers of
- the previous day. For this reason the format for the proposals is
- expected to vary. Nevertheless there are some guidelines that we can
- offer that will help ensure a succesful workshop.
-
- The proposal should include the title, author's name, affiliation, and
- electronic mail address at the beginning. All workshop proposals will be
- included in the proceedings. The workshop proposal should be 1 - 8 pages
- in length. The desired range of attendees (smallest number - largest
- number) should be included. All workshops will be two hours in length with
- a short break 1/2 way through. It is possible to schedule two related
- workshops back to back, say "Introduction to Something" and "Advanced
- Something". If this is the case please submit two separate proposals but
- state that they are related.
-
- There are four major concerns for the workshops which should be
- addressed in the proposal.
-
- 1. Intellectual Content
- The intellectual content of the workshop should be made clear.
- What is the focus on the workshop? What are the relevant social
- issues? What relevant research exists already on the topic? Who
- is the intended audience? The topic should have a qualitative
- computing element in it.
-
- 2. Structure
- There should be some structure to the workshop. It can be quite
- loose and flexible but it shouldn't be completely open. The
- amount of structure will vary according to the topic at hand, the
- intended goals, the personalities of the audience and the organizers,
- etc. The proposal should describe the structure of the
- workshop.
-
- 3. Interactivity
- The workshop should be interactive. The workshop should be
- designed in such a way to promote meaningful interaction between
- the organizer or organizers and the attendees. Because there is
- group interaction it is hoped that more points will be raised,
- more issues considered, and deeper analysis performed. The
- methods of interaction should be described in the proposal.
-
- 4. Product or action oriented
- Ideally the workshop should result in some product or plan for
- action. Although this aspect is not critical, the program
- committee feels that this is quite important and we hope that
- workshop organizers will think in these terms and strive to
- promote an appropriate outcome. Possible "deliverables" are
- described below.
-
-
- Possible Output From a DIAC-92 Workshop
-
- + Statements or press releases
- + Bibliography on subject matter
- + Electronic distribution list on the subject
- + Ideas for a follow up meeting, workshop, or conference
- + List of possible projects on the subject
- + Writeup of meeting for electronic or print dissemination
- + A project proposal
- + A panel discussion proposal
- + A grant proposal
- + An experiment
- + A working agreement -- e.g. to connect two networks, to share
- data, to begin a study, to write an article, to build software
- jointly, etc.
- + A videotape of some or all of a workshop
- + A brainstormed list of viewpoints, a "semantic network" of the
- issues
- + A list of hypotheses
- + Any plan to continue discussion on the topic
-
- Please send proposal (four copies) to Doug Schuler, 2202 N. 41st St,
- Seattle, WA, 98103. Proposals are due by March 1, 1992. Proposals
- will be reviewed by the program committee. Acceptance or rejection
- notices will be mailed by April 1, 1992. We plan to incorporate
- workshop proposals into the proceedings. Please contact us if you
- have any questions or comments.
-
- Doug Schuler, 206-865-3832 (work), 206-632-1659 (home),
- dschuler@june.cs.washington.edu
-
- The program committee includes David Bellin (consultant), Eric Gutstein (U.
- WI), Batya Friedman (Mills College), Jonathan Jacky (U. WA), Deborah
- Johnson (Rensselaer Polytechnic Inst.), Richard Ladner (U. WA), Dianne
- Martin (George Washington U.), Judith Perrolle (Northeastern U.) Marc
- Rotenberg (CPSR), Douglas Schuler (Boeing Computer Services), Barbara
- Simons (IBM), Lucy Suchman (Xerox), Karen Wieckert (U. CA. Irvine), and
- Terry Winograd, (Stanford).
-
-
- Sponsored by Computer Professionals for Social Responsibility
- P.O. Box 717
- Palo Alto, CA 94301
-
- DIAC-92 is co-sponsored by the American Association for Artificial
- Intelligence, and the Boston Computer Society Social Impact Group, in
- cooperation with ACM SIGCHI and ACM SIGCAS.
-
- ------------------------------
-
- End of Computer Underground Digest #4.06
- ************************************
-