home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 58.8 KB | 1,046 lines |
- Newsgroups: comp.society.cu-digest
- Path: vanbc.wimsey.com!deep.rsoft.bc.ca!agate!usenet.ins.cwru.edu!gatech!swrinde!cs.utexas.edu!chinacat!chinacat!not-for-mail
- From: Cu-Digest <tk0jut2@mvs.cso.niu.edu>
- Subject: Cu Digest, #5.43 [repost]
- Reply-To: tk0jut2@mvs.cso.niu.edu
- Organization: the Computer Underground Digest gateway
- Date: Thu, 24 Jun 1993 23:32:32 GMT
- Approved: usenet@chinacat.unicom.com (mail-to-news gateway)
- Message-ID: <1993Jun24.233232.3500@chinacat.unicom.com>
- Sender: usenet@chinacat.unicom.com (mail-to-news gateway)
- Lines: 1033
-
- [Note: I have been told that issues 42 and 43 might have been lost during
- the recent gateway outage. This is a repost of issue 43. -chip]
-
- Computer underground Digest Wed June 13 1993 Volume 5 : Issue 43
- ISSN 1004-043X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Editor: Etaoin Shrdlu, Seniur
-
- CONTENTS, #5.43 (June 13 1993)
- File 1--Hacker testimony to House subcommittee largely unheard
- File 2--CPSR Clipper Testimony (6-9-93) in House Subcommittee
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-6430), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) 203-832-8441 NUP:Conspiracy
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 10 Jun 1993 16:53:48 -0700
- From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
- Subject: File 1--Hacker testimony to House subcommittee largely unheard
-
- What follows is a copy of my written testimony before the House
- Subcommittee on Telecommunications and Finance. The June 9th hearing
- was supposed to have been on the topic of network security, toll
- fraud, and the social implications of the rapidly emerging
- technologies. I was asked to speak for those who had no voice, which
- translates to hackers and consumers. Instead I found myself barraged
- with accusations from the two representatives in attendance (Rep. Ed
- Markey D-MA and Rep. Jack Fields R-TX) who considered 2600 Magazine
- (of which I'm the editor) nothing more than a manual for computer
- crime. One article in particular that Markey latched upon was one in
- our Spring issue that explained how a cable descrambler worked.
- According to Markey, there was no use for this information outside of
- a criminal context. Fields claimed we were printing cellular "codes"
- that allowed people to listen in on cellular calls. In actuality, we
- printed frequencies. The difference didn't seem to matter - after
- explaining it to him, he still said he was very disturbed by the fact
- that I was allowed to keep publishing. It soon became apparent to me
- that neither one had read my testimony as there seemed to be no
- inclination to discuss any of the issues I had brought up. In a way,
- it was very much like being on the Geraldo show. Somehow I thought
- elected representatives would be less sensationalist and more
- interested in learning but this was not the case here. We got
- absolutely nowhere. Markey in particular was rude, patronizing, and
- not at all interested in entertaining any thought outside his narrow
- perception. It's too bad this opportunity was lost. There is a real
- danger in elected officials who don't listen to all relevant opinions
- and who persist in sticking to old-fashioned, outdated notions that
- just don't apply to high technology. You can look forward to more
- restrictive regulations and higher penalties for violating them if
- this mentality continues to dominate.
-
- +++++++++++++++++++
- WRITTEN TESTIMONY FOLLOWS:
-
- Mr. Chairman, members of the Committee, thank you for the
- opportunity to speak on the issue of the rapid growth and changes in
- the telecommunications industry.
-
- My name is Emmanuel Goldstein and I am the publisher of 2600
- Magazine, which is a journal for computer hackers as well as anyone
- else who happens to be interested in the direction that technology is
- taking us. We tend to be brutally honest in our assessments and, as a
- result, we do get some corporations quite angry at us. But we've also
- managed to educate a large number of people as to how their telephone
- system works, what kinds of computers may be watching them, and how
- they can shape technology to meet their needs, rather than be forced
- to tailor their existence to meet technology's needs.
-
- I am also the host of a weekly radio program called Off The Hook
- which airs over WBAI in New York. Through that forum we have
- discovered the eagerness and curiosity that many "ordinary people on
- the street" possess for technology. At the same time we have seen
- fears and suspicions expressed that would be unwise to ignore.
-
- HOW TO HANDLE RAPIDLY CHANGING TECHNOLOGY
-
- The next few years will almost certainly go down in history as
- those in which the most change took place in the least amount of time.
- The computer and telecommunications revolution that we are now in the
- midst of is moving full speed ahead into unknown territory. The
- potential for amazing advances in individual thought and creativity is
- very real. But so is the potential for oppression and mistrust the
- likes of which we have never before seen. One way or the other, we
- will be making history.
-
- I think we can imagine it best if we think of ourselves speeding
- down a potentially dangerous highway. Perhaps the road will become
- slick with ice or fraught with sharp curves. It's a road that nobody
- has gone down before. And the question we have to ask ourselves is
- what kind of a vehicle would we prefer to be in if things should start
- getting out of control: our own automobile where we would have at
- least some chance of controlling the vehicle and bringing it down to a
- safe speed or a bus where we, along with many others, must put all of
- our trust behind a total stranger to prevent a disaster. The answer is
- obviously different depending on the circumstances. There are those of
- us who do not want the responsibility of driving and others who have
- proven themselves unworthy of it. What's important is that we all have
- the opportunity at some point to choose which way we want to go.
-
- Rapidly changing technology can also be very dangerous if we
- don't look where we're going or if too many of us close our eyes and
- let someone else do the driving. This is a ride we all must stay awake
- for.
-
- I am not saying we should be overly suspicious of every form of
- technology. I believe we are on the verge of something very positive.
- But the members of this committee should be aware of the dangers of an
- uninformed populace. These dangers will manifest themselves in the
- form of suspicion towards authority, overall fear of technology, and
- an unhealthy feeling of helplessness.
-
- HOW NEW TECHNOLOGY CAN HURT US
-
- The recent FBI proposal to have wiretap capabilities built into
- digital telephone systems got most of its publicity because American
- taxpayers were expected to foot the bill. But to many of the
- non-technical people I talked to, it was just another example of Big
- Brother edging one step closer. It is commonly believed that the
- National Security Agency monitors all traffic on the Internet, not to
- mention all international telephone calls. Between Caller ID, TRW
- credit reports, video cameras, room monitors, and computer
- categorizations of our personalities, the average American feels as if
- life no longer has many private moments. Our Social Security numbers,
- which once were for Social Security, are now used for everything from
- video rentals to driver's licenses. These numbers can easily be used
- to track a person's location, expenses, and habits - all without any
- consent. If you know a person's name, you can get their telephone
- number. If you have their phone number, you can get their address.
- Getting their Social Security number is not even a challenge anymore.
- With this information, you can not only get every bit of information
- about this person that exists on any computer from Blockbuster Video
- to the local library to the phone company to the FBI, but you can
- begin to do things in this poor person's name. It's possible we may
- want a society like this, where we will be accountable for our every
- movement and where only criminals will pursue privacy. The American
- public needs to be asked. But first, they need to understand.
-
- In Germany, there is a fairly new computerized system of identity
- cards. Every citizen must carry one of these cards. The information
- includes their name, address, date of birth, and nationality - in
- other words, the country they were originally born in. Such a system
- of national identity can be quite useful, but in the wrong hands it
- can be extremely scary. For example, if a neo-Nazi group were to
- somehow get their hands on the database, they could instantly find out
- where everyone of Turkish nationality lived. A malevolent government
- could do the same and, since not carrying the card would be a crime,
- it would be very hard to avoid its wrath.
-
- Before introducing a new technology that is all-encompassing, all
- of its potential side-effects and disadvantages should be discussed
- and addressed. Opportunities must exist for everyone to ask questions.
- In our own country, nobody was ever asked if they wanted a credit file
- opened on them, if they wanted to have their phone numbers given to
- the people and companies they called through the use of Caller ID and
- ANI, or if they wanted to be categorized in any manner on numerous
- lists and databases. Yet all of this has now become standard practice.
-
- This implementation of new rules has resulted in a degree of
- cynicism in many of us, as well as a sense of foreboding and dread. We
- all know that these new inventions will be abused and used to
- somebody's advantage at some point. There are those who would have us
- believe that the only people capable of such misdeeds are computer
- hackers and their ilk. But it just isn't that simple.
-
- UNDERSTANDING COMPUTER HACKERS
-
- To understand computer hackers, it helps to think of an alien
- culture. We have such cultures constantly around us - those with
- teenage children ought to know what this means. There are alien
- cultures of unlimited varieties throughout the globe, sometimes in the
- most unexpected places. I'm convinced that this is a good thing.
- Unfortunately, all too often our default setting on whatever it is we
- don't understand is "bad". Suspicion and hostility follow and are soon
- met with similar feelings from the other side. This has been going on
- between and within our cultures for as long as we've existed. While we
- can't stop it entirely, we can learn to recognize the danger signs.
- The best way that I've found to deal with an alien culture, whether
- it's in a foreign country or right here at home, is to try and
- appreciate it while giving it a little leeway. There is not a single
- alien culture I've encountered that has not been decidedly friendly.
- That includes deadheads, skateboarders, Rastafarians, and hackers.
-
- When we talk about computer hackers, different images spring to
- mind. Most of these images have come about because of perceptions
- voiced by the media. Too often, as I'm sure the members of this
- committee already suspect, the media just doesn't get it. This is not
- necessarily due to malice on their part but rather a general lack of
- understanding and an overwhelming pressure to produce a good story.
- Hence we get an abundance of sensationalism and, when the dust clears,
- hackers are being compared with bank robbers, mobsters, terrorists,
- and the like. It's gotten to the point that the word hacker is almost
- analogous to the word criminal.
-
- Fortunately, the media is learning. Reporters now approach
- hackers with a degree of technological savvy. For the most part, they
- have stopped asking us to commit crimes so they can write a story
- about it. As the technology envelops us, journalists are developing
- the same appreciation and curiosity for it that hackers have always
- had. Any good reporter is at least part hacker because what a hacker
- does primarily is relentlessly pursue an answer. Computers naturally
- lend themselves to this sort of pursuit, since they tend to be very
- patient when asked a lot of questions.
-
- WHAT CONSTITUTES A HI-TECH CRIME?
-
- So where is the boundary between the hacker world and the
- criminal world? To me, it has always been in the same place. We know
- that it's wrong to steal tangible objects. We know that it's wrong to
- vandalize. We know that it's wrong to invade somebody's privacy. Not
- one of these elements is part of the hacker world.
-
- A hacker can certainly turn into a criminal and take advantage of
- the weaknesses in our telephone and computer systems. But this is
- rare. What is more likely is that a hacker will share knowledge with
- people, one of whom will decide to use that knowledge for criminal
- purposes. This does not make the hacker a criminal for figuring it
- out. And it certainly doesn't make the criminal into a hacker.
-
- It is easy to see this when we are talking about crimes that we
- understand as crimes. But then there are the more nebulous crimes; the
- ones where we have to ask ourselves: "Is this really a crime?" Copying
- software is one example. We all know that copying a computer program
- and then selling it is a crime. It's stealing, plain and simple. But
- copying a program from a friend to try it out on your home computer --
- is this the same kind of crime? It seems obvious to me that it is not,
- the reason being that you must make a leap of logic to turn such an
- action into a crime. Imagine if we were to charge a licensing fee
- every time somebody browsed through a magazine at the local bookshop,
- every time material was borrowed from a library, or every time a phone
- number was jotted down from the yellow pages. Yet, organizations like
- the Software Publishers Association have gone on record as saying that
- it is illegal to use the same computer program on more than one
- computer in your house. They claim that you must purchase it again or
- face the threat of federal marshalls kicking in your door. That is a
- leap of logic.
-
- It is a leap of logic to assume that because a word processor
- costs $500, a college student will not try to make a free copy in
- order to write and become a little more computer literate. Do we
- punish this student for breaking a rule? Do we charge him with
- stealing $500? To the hacker culture on whose behalf I am speaking
- today, the only sensible answer is to make it as easy as possible for
- that college student to use the software he needs. And while we're at
- it, we should be happy that he's interested in the first place.
-
- Of course, this represents a fundamental change in our society's
- outlook. Technology as a way of life, not just another way to make
- money. After all, we encourage people to read books even if they can't
- pay for them because to our society literacy is a very important goal.
- I believe technological literacy is becoming increasingly important.
- But you cannot have literacy of any kind without having access.
-
- If we continue to make access to technology difficult,
- bureaucratic, and illogical, then there will also be more computer
- crime. The reason being that if you treat someone like a criminal,
- they will begin to act like one. If we succeed in convincing people
- that copying a file is the same as physically stealing something, we
- can hardly be surprised when the broad-based definition results in
- more overall crime. Blurring the distinction between a virtual
- infraction and a real-life crime is a mistake.
-
- LEGISLATION FOR COMPUTER AGE CRIME
-
- New laws are not needed because there is not a single crime that
- can be committed with a computer that is not already defined as a
- crime without a computer. But let us not be loose with that
- definition. Is mere unauthorized access to a computer worthy of
- federal indictments, lengthy court battles, confiscation of equipment,
- huge fines, and years of prison time? Or is it closer to a case of
- trespassing, which in the real world is usually punished by a simple
- warning? "Of course not," some will say, "since accessing a computer
- is far more sensitive than walking into an unlocked office building."
- If that is the case, why is it still so easy to do? If it's possible
- for somebody to easily gain unauthorized access to a computer that has
- information about me, I would like to know about it. But somehow I
- don't think the company or agency running the system would tell me
- that they have gaping security holes. Hackers, on the other hand, are
- very open about what they discover which is why large corporations
- hate them so much. Through legislation, we can turn what the hackers
- do into a crime and there just might be a slim chance that we can stop
- them. But that won't fix poorly designed systems whose very existence
- is a violation of our privacy.
-
- THE DANGERS OF UNINFORMED CONSUMERS
-
- The concept of privacy is something that is very important to a
- hacker. This is so because hackers know how fragile privacy is in
- today's world. Wherever possible we encourage people to protect their
- directories, encrypt their electronic mail, not use cellular phones,
- and whatever else it takes to keep their lives to themselves. In 1984
- hackers were instrumental in showing the world how TRW kept credit
- files on millions of Americans. Most people had never even heard of a
- credit file until this happened. Passwords were very poorly guarded -
- in fact, credit reports had the password printed on the credit report
- itself. More recently, hackers found that MCI's Friends and Family
- program allowed anybody to call an 800 number and find out the numbers
- of everyone in a customer's "calling circle". As a bonus, you could
- also find out how these numbers were related to the customer: friend,
- brother, daughter-in-law, business partner, etc. Many times these
- numbers were unlisted yet all that was needed to "verify" the
- customer's identity was the correct zip code. In both the TRW and MCI
- cases, hackers were ironically accused of being the ones to invade
- privacy. What they really did was help to educate the American
- consumer.
-
- Nowhere is this more apparent than in the telephone industry.
- Throughout the country, telephone companies take advantage of
- consumers. They do this primarily because the consumer does not
- understand the technology. When we don't understand something
- complicated, we tend to believe those who do understand. The same is
- true for auto mechanics, plumbers, doctors, and lawyers. They all
- speak some strange language that the majority of us will never
- understand. So we tend to believe them. The difference with the phone
- companies, and here I am referring to the local companies, is that you
- cannot deal with somebody else if you happen to disagree with them or
- find them untrustworthy. The phone companies have us in a situation
- where we must believe what they say. If we don't believe them, we
- cannot go elsewhere.
-
- This is the frustration that the hacker community constantly
- faces. We face it especially because we are able to understand when
- the local phone companies take advantage of consumers. Here are a few
- examples:
-
- Charging a fee for touch tone service. This is a misnomer. It
- actually takes extra effort to tell the computer to ignore the tones
- that you produce. Everybody already has touch tone capability but we
- are forced to pay the phone company not to block it. While $1.50 a
- month may not seem like much, when added together the local companies
- that still engage in this practice are making millions of dollars a
- year for absolutely nothing. Why do they get away with it? Because too
- many of us don't understand how the phone system works. I try to draw
- an analogy in this particular case - imagine if the phone company
- decided that a fee would be charged to those customers who wanted to
- use the number five when dialing. They could argue that the five takes
- more energy than the four but most of us would see through this flimsy
- logic. We must seek out other such dubious practices and not blindly
- accept what we are told.
-
- Other examples abound: being charged extra not to have your name
- listed in the telephone directory, a monthly maintenance charge if you
- select your own telephone number, the fact that calling information to
- get a number now costs more than calling the number itself.
-
- More recently, we have become acquainted with a new standard
- called Signalling System Seven or SS7. Through this system it is
- possible for telephones to have all kinds of new features: Caller ID,
- Return Call, Repeat Calling to get through a busy signal, and more.
- But again, we are having the wool pulled over our eyes. For instance,
- if you take advantage of Call Return in New York (which will call the
- last person who dialed your number), you are charged 75 cents on top
- of the cost of the call itself. Obviously, there is a cost involved
- when new technologies are introduced. But there is no additional
- equipment, manpower, or time consumed when you dial *69 to return a
- call. It's a permanent part of the system. As a comparison, we could
- say that it also costs money to install a hold button. Imagine how we
- would feel if we were charged a fee every time we used it.
-
- The local companies are not the only offenders but it is
- particularly bad in their case because, for the vast majority of
- Americans, there is no competition on this level. The same complaints
- are being voiced concerning cable television companies.
-
- Long distance telephone companies are also guilty. AT&T, MCI, and
- Sprint all encourage the use of calling cards. Yet each imposes a
- formidable surcharge each and every time they're used. AT&T, for
- example, charges 13 cents for the first minute of a nighttime call
- from Washington DC to New York plus an 80 cent surcharge. Since a
- calling card can only be used to make telephone calls, why are
- consumers expected to pay an extra fee as if they were doing something
- above and beyond the normal capability of the card? Again, there is no
- extra work necessary to complete a calling card call - at least not on
- the phone company's part. The consumer, on the other hand, must enter
- up to 25 additional digits. But billing is accomplished merely by
- computers sending data to each other. Gone are the days of tickets
- being written up by hand and verified by human beings. Everything is
- accomplished quickly, efficiently, and cheaply by computer. Therefore,
- these extra charges are outdated.
-
- SOCIAL INJUSTICES OF TECHNOLOGY
-
- The way in which we have allowed public telephones to be operated
- is particularly unfair to those who are economically disadvantaged. A
- one minute call to Washington DC can cost as little as 12 cents from
- the comfort of your own home. However, if you don't happen to have a
- phone, or if you don't happen to have a home, that same one minute
- call will cost you $2.20. That figure is the cheapest rate there is
- from a Bell operated payphone. With whatever kind of logic was used to
- set these prices, the results are clear. We have made it harder and
- more expensive for the poor among us to gain access to the telephone
- network. Surely this is not something we can be proud of.
-
- A direct result of this inequity is the prevalence of red boxes.
- Red boxes are nothing more than tone generators that transmit a quick
- burst of five tones which convince the central office that a quarter
- has been deposited. It's very easy and almost totally undetectable.
- It's also been going on for decades. Neither the local nor long
- distance companies have expended much effort towards stopping red
- boxes, which gives the impression that the payphone profits are still
- lucrative, even with this abuse. But even more troubling is the
- message this is sending. Think of it. For a poor and homeless person
- to gain access to something that would cost the rest of us 12 cents,
- they must commit a crime and steal $2.20. This is not equal access.
-
- CORPORATE RULES
-
- Hackers and phone phreaks, as some of us are called, are very
- aware of these facts. We learn by asking lots of questions. We learn
- by going to libraries and doing research. We learn by diving into
- phone company trash dumpsters, reading discarded material, and doing
- more research. But who will listen to people like us who have been
- frequently characterized as criminals? I am particularly grateful that
- this committee has chosen to hear us. What is very important to us is
- open communications. Freedom of information. An educated public.
-
- This puts us at direct odds with many organizations, who believe
- that everything they do is "proprietary" and that the public has no
- right to know how the public networks work. In July of 1992 we were
- threatened with legal action by Bellcore (the research arm of the
- Regional Bell Operating Companies) for revealing security weaknesses
- inherent in Busy Line Verification (BLV) trunks. The information had
- been leaked to us and we did not feel compelled to join Bellcore's
- conspiracy of silence. In April of this year, we were threatened with
- legal action by AT&T for printing proprietary information of theirs.
- The information in question was a partial list of the addresses of
- AT&T offices. It's very hard for us to imagine how such information
- could be considered secret. But these actions are not surprising. They
- only serve to illustrate the wide disparities between the corporate
- mindset and that of the individual. It is essential that the hundreds
- of millions of Americans who will be affected by today's
- all-encompassing inventions not be forced to play by corporate rules.
-
- In 1990 a magazine similar to 2600 was closed down by the United
- States government because Bell South said they printed proprietary
- information. Most people never found out about this because Phrack
- Magazine was electronic, i.e., only available on computer bulletin
- boards and networks. This in itself is wrong; a publication must have
- the same First Amendment rights regardless of whether it is printed
- electronically or on paper. As more online journals appear, this basic
- tenet will become increasingly critical to our nation's future as a
- democracy. Apart from this matter, we must look at what Bell South
- claimed - that a document discussing the Enhanced 911 system which was
- worth $79,449 had been "stolen" and printed by Phrack. (Some newspaper
- accounts even managed to change it into an E911 program which gave the
- appearance that hackers were actually interfering with the operation
- of an E911 system and putting lives at risk. In reality there has
- never been a report of a hacker gaining access to such a system.) It
- was not until after the publisher of Phrack was forced to go to trial
- that the real value of the document was revealed. Anyone could get a
- copy for around $14. The government promptly dropped its case against
- the publisher who, to this day, is still paying back $100,000 in legal
- fees. As further evidence of the inquity between individual justice
- and corporate justice, Bell South was never charged with fraud for its
- claim that a $14 document was worth nearly $80,000. Their logic, as
- explained in a memo to then Assistant U.S. Attorney Bill Cook, was
- that the full salaries of everyone who helped write the document, as
- well as the full cost of all hardware and software used in the
- endeavor ($31,000 for a Vaxstation II, $6,000 for a printer), was
- perfectly acceptable. It is very disturbing that the United States
- government agreed with this assessment and moved to put a pre-law
- student behind bars for violating corporate rules.
-
- MISGUIDED AUTHORITY
-
- I wish I could stand before this committee and say that we have
- been successful in stopping all such miscarriages of justice. While
- the Phrack case may have been the most bizarre, there are many more
- instances of individuals being victimized in similar manners. A
- teenager in Chicago was jailed for a year for copying a file that was
- worth millions, according to AT&T, but was utterly worthless and
- unusable to a kid. A bulletin board operator in California, along with
- his entire family, was held at gunpoint for hours while authorities
- seized his equipment in an unsuccessful attempt to find child
- pornography. Three hackers in Atlanta, after being imprisoned up to a
- year for dialing into a Bell South computer system that had no
- password, were forced to pay $233,000 in restitution so the company
- could install a password system. More recently, a student at the
- University of Texas at Houston was suspended from school for a year
- because he accessed a file that merely listed the users of the system
- (a file which the system allows all users to access). In increasing
- numbers, young people are being sent to jail, not necessarily for
- something they did, but rather for something they could have done in a
- worst-case scenario. Again this indicates fear and misunderstanding of
- technology and its applications. But this time those feelings emanate
- from those in authority.
-
- Locally, an ominous happening occurred at a 2600 monthly meeting
- last November. (These meetings occur in public areas in cities
- throughout the nation on the first Friday of every month.) Shortly
- after it began, the Washington meeting was broken up by Pentagon City
- Mall security guards. Without any provocation, people were forced to
- submit to searches and everybody's name was taken down. One of the
- attendees who was writing down an officer's name had the paper ripped
- from his hand, another had his film taken from his camera as he tried
- to document what was going on. Upon questioning by a reporter from
- Communications Daily, the mall security chief claimed that he was
- acting under orders from the United States Secret Service. Subsequent
- Freedom of Information Act requests by Computer Professionals for
- Social Responsibility have yielded more evidence implicating the
- Secret Service in this illegal and unwarranted action. Nothing of a
- criminal nature was ever found in any of the bags that were searched.
- But a full list of the attendees wound up in the possession of the
- Secret Service. It seems ironic that while hackers are conducting an
- open gathering in the middle of a shopping mall in order to share
- knowledge and welcome new people, agents of the Secret Service are
- lurking in the shadows trying to figure out ways to stop them.
-
- How can we move forward and talk about exciting new applications
- of technology when we're off to such a bad start? The people that are
- being arrested, harassed, and intimidated are the people who will be
- designing and running these new systems. They are the ones who will
- appreciate their capabilities and understand their weaknesses. Through
- our short-sightedness and eagerness to listen to the loudest voices,
- we are alienating the promises of the future. How many here, who grew
- up in decades past, remember hearing teenagers talk of how the
- government is after them, watching their every move, listening to
- their phone calls, doing everything one might expect in a totalitarian
- regime. Such feelings are the sure sign of an ailing society. It does
- not matter if these things are not actually occurring - their mere
- perception is enough to cause lasting harm and mistrust.
-
- PROMISE OF THE INTERNET
-
- The future holds such enormous potential. It is vital that we not
- succumb to our fears and allow our democratic ideals and privacy
- values to be shattered. In many ways, the world of cyberspace is more
- real than the real world itself. I say this because it is only within
- the virtual world that people are really free to be themselves - to
- speak without fear of reprisal, to be anonymous if they so choose, to
- participate in a dialogue where one is judged by the merits of their
- words, not the color of their skin or the timbre of their voice.
- Contrast this to our existing "real" world where we often have people
- sized up before they even utter a word. The Internet has evolved, on
- its own volition, to become a true bastion of worldwide democracy. It
- is the obligation of this committee, and of governments throughout the
- world, not to stand in its way.
-
- This does not mean we should stand back and do nothing. Quite
- the contrary, there is much we have to do if accessibility and
- equality are our goals. Over-regulation and commercialization are two
- ways to quickly kill these goals. A way to realize them is to have a
- network access point in every house. Currently, network access is
- restricted to students or professors at participating schools,
- scientists, commercial establishments, and those who have access to,
- and can afford, local services that link into the Internet. Yes, a lot
- of people have access today. But a far greater number do not and it
- is to these people that we must speak. The bigger the Internet gets,
- the better it gets. As it exists today, cultures from around the globe
- are represented; information of all kinds is exchanged. People are
- writing, reading, thinking. It's potentially the greatest educational
- tool we have. Therefore, it is essential that we not allow it to
- become a commodity that only certain people in society will be able to
- afford. With today's technology, we face the danger of widening the
- gap between the haves and the have-nots to a monumental level. Or we
- can open the door and discover that people really do have a lot to
- learn from each other, given the opportunity.
-
- It is my hope that this committee will recognize the importance
- of dialogue with the American public, in order to answer the questions
- so many are asking and to address the concerns that have been
- overlooked. I thank you for this opportunity to express those issues
- that I feel relevant to this hearing.
-
- ------------------------------
-
- Date: Sat, 12 Jun 1993 12:30:38 EST
- From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
- Subject: File 2--CPSR Clipper Testimony (6-9-93) in House Subcommittee
-
- CPSR Clipper Testimony 6/9
-
- On June 9, 1993, Congressman Edward Markey, Chairman of the
- House Subcommittee on Telecommunications and Finance held an
- oversight hearing on Rencryption and telecommunications network
- security. Panelists were Whitfield Diffie of Sun Microsystems, Dr.
- Dorothy Denning, Steven Bryen of Secure Communications, Marc
- Rotenberg of the CPSR Washington Office and E.R. Kerkeslager of AT&T.
-
- Congressman Markey, after hearing the testimony presented,
- noted that the Clipper proposal had raised an arched eyebrow among
- the whole committeeS and that the committee viewed the proposal
- skeptically. This statement was the latest indication that the Clipper
- proposal has not been well received by policy makers. Last Friday,
- the Computer Systems Security and Privacy Advisory Board of NIST
- issued two resolutions critical of the encryption plan, suggesting
- that further study was required and that implementation of the plan
- should be delayed until the review is completed.
-
- At the Third CPSR Cryptography and Privacy Conference on
- Monday, June 7, the Acting Director of NIST, Raymond Kammer, announced
- that the implementation of the proposal will be delayed and that a
- more comprehensive review will be undertaken. The review is due in
- the fall. Kammer told the Washington Post that Rmaybe we wonUt
- continue in the direction we started ous.
-
- +-------------------------------------------------
-
- Prepared Testimony
- and
- Statement for the Record
- of
- Marc Rotenberg, director
- CPSR Washington Office
- on
- Encryption Technology and Policy
- Before
- The Subcommittee on Telecommunications and Finance.
- Committee on Energy and Commerce
-
- U.S. House of Representatives
- June 9, 1993
-
- SUMMARY
-
- The cryptography issue is of particular concern to CPSR.
- During the past several years CPSR has pursued an extensive study of
- cryptography policy in the United States. CPSR has organized public
- conferences, conducted litigation under the Freedom of Information Act,
- and has emphasized the importance of cryptography for privacy
- protection and the need to scrutinize carefully government proposals
- designed to limit the use of this technology.
- To evaluate the Clipper proposal it is necessary to look at a
- 1987 law, the Computer Security Act, which made clear that in the area
- of unclassified computing systems, the National Institute of Standards
- and Technology (NIST) and not the National Security Agency (NSA), would
- be responsible for the development of technical standards. The Act
- emphasized public accountability and stressed open decision-making.
- In the spirit of the Act, in 1989 NIST set out to develop a
- public key cryptography standard. According to documents obtained by
- CPSR through the Freedom of Information Act, NIST recommended that the
- algorithm be "public, unclassified, implementable in both hardware or
- software, usable by federal Agencies and U.S. based multi-national
- corporation." However, the Clipper proposal and the full-blown Capstone
- configuration that resulted is very different: the Clipper algorithm,
- Skipjack, is classified; public access to the reasons underlying the
- proposal is restricted; Skipjack can be implemented only in
- tamper-proof hardware; it is unlikely to be used by multi-national
- corporations, and the security of Clipper remains unproven.
- The Clipper proposal undermines the central purpose of the
- Computer Security Act. Although intended for broad use in commercial
- networks, it was not developed at the request of either U.S. business
- or the general public. It does not reflect public goals.
- The premise of the Clipper key escrow arrangement is that the
- government must have the ability to intercept electronic
- communications. However, there is no legal basis to support this
- premise. In law there is nothing inherently illegal or suspect about
- the use of a telephone. The federal wiretap statute says only that
- communication service providers must assist law enforcement execute a
- lawful warrant.
- CPSR supports the review of cryptography policy currently
- underway at the Department of Commerce. CPSR also supports the efforts
- undertaken by the Subcommittee on Telecommunications and Finance to
- study the full ramifications of the Clipper proposal. However, we are
- not pleased about the review now being undertaken at the White House.
- That effort has led to a series of secret meetings, has asked that
- scientists sign non-disclosure agreements and accept restrictions on
- publication, and has attempted to resolve public concerns through
- private channels. This is not a good process for the evaluation of a
- technology that is proposed for the public switched network.
- Even if the issues regarding Clipper are resolved favorably,
- privacy concerns will not go away. Rules still need to be developed
- about the collection and use of transactional data generated by
- computer communications. Several specific steps should be taken.
- First, the FCC should be given a broad mandate to pursue privacy
- concerns. Second, current gaps in the communications law should be
- filled. The protection of transactional records is particularly
- important. Third, telecommunications companies should be encouraged to
- explore innovative ways to protect privacy. "Telephone cards", widely
- available in other countries, are an ideal way to protect privacy.
-
-
- TESTIMONY
-
- Mr. Chairman, members of the Subcommittee, thank you for the
- opportunity to testify today on encryption policy and the Clipper
- proposal. I especially wish to thank you Congressman Markey, on behalf
- of CPSR, for your ongoing efforts on the privacy front as well as your
- work to promote public access to electronic information.
- The cryptography issue is of particular concern to CPSR.
- During the past several years we have pursued an extensive study of
- cryptography policy in the United States. We have organized several
- public conferences, conducted litigation under the Freedom of
- Information Act, and appeared on a number of panels to discuss the
- importance of cryptography for privacy protection and the need to
- scrutinize carefully government proposals designed to limit the use of
- this technology.
- While we do not represent any particular computer company or
- trade association we do speak for a great many people in the computer
- profession who value privacy and are concerned about the government's
- Clipper initiative.
- Today I will briefly summarize our assessment of the Clipper
- proposal. Then I would like to say a few words about the current
- status of privacy protection.
-
- CLIPPER
- To put the Clipper proposal in a policy context, I will need to
- briefly to describe a law passed in 1987 intended to address the roles
- of the Department of Commerce and the Department of Defense in the
- development of technical standards. The Computer Security Act of 1987
- was enacted to improve computer security in the federal government, to
- clarify the responsibilities of the National Institute of Standards and
- Technology (NIST) and the National Security Agency, and to ensure that
- technical standards would serve civilian and commercial needs.
- The law made clear that in the area of unclassified computing
- systems, NIST and not NSA, would be responsible for the development of
- technical standards. It emphasized public accountability and stressed
- open decision-making. The Computer Security Act also established the
- Computer System Security and Privacy Advisory Board (CSSPAB), charged
- with reviewing the activities of NIST and ensuring that the mandate of
- the law was enforced.
- The Computer Security Act grew out of a concern that classified
- standards and secret meetings would not serve the interests of the
- general public. As the practical applications for cryptography have
- moved from the military and intelligence arenas to the commercial
- sphere, this point has become clear. There is also clearly a conflict
- of interest when an agency tasked with signal interception is also
- given authority to develop standards for network security.
- In the spirit of the Computer Security Act, NIST set out in
- 1989 to develop a public key standard FIPS (Federal Information
- Processing Standard). In a memo dated May 5, 1989, obtained by CPSR
- through the Freedom of Information Act, NIST said that it planned:
-
- to develop the necessary public-key based security standards. We
- require a public-key algorithm for calculating digital signatures and
- we also require a public-key algorithm for distributing secret keys.
-
- NIST then went on to define the requirements of the standard:
-
- The algorithms that we use must be public, unclassified, implementable
- in both hardware or software, usable by federal Agencies and U.S. based
- multi-national corporation, and must provide a level of security
- sufficient for the protection of unclassified, sensitive information
- and commercial propriety and/or valuable information.
-
- The Clipper proposal and the full-blown Capstone configuration,
- which incorporates the key management function NIST set out to develop
- in 1989, is very different from the one originally conceived by NIST.
-
- % The Clipper algorithm, Skipjack, is classified,
- % Public access to the reasons underlying the proposal is
- restricted,
- % Skipjack can be implemented only in tamper-proof hardware,
- % It is Unlikely to be used by multi-national corporations, and
- % The security of Clipper remains unproven.
-
- The Clipper proposal undermines the central purpose of the
- Computer Security Act. Although intended for broad use in commercial
- networks, it was not developed at the request of either U.S. business
- or the general public. It does not reflect public goals. Rather it
- reflects the interests of one secret agency with the authority to
- conduct foreign signal intelligence and another government agency
- responsible for law enforcement investigations.
- Documents obtained by CPSR through the Freedom of Information
- Act indicate that the National Security Agency dominated the meetings
- of the joint NIST/NSA Technical Working group which made
- recommendations to NIST regarding public key cryptography, and that a
- related technical standard for message authentication, the Digital
- Signature Standard, clearly reflected the interests of the NSA.
- We are still trying to determine the precise role of the NSA in
- the development of the Clipper proposal. We would be pleased to
- provide to the Subcommittee whatever materials we obtain.
-
- LEGAL AND POLICY ISSUES
- There are also several legal and constitutional issues raised
- by the government's key escrow proposal. The premise of the Clipper
- key escrow arrangement is that the government must have the ability to
- intercept electronic communications, regardless of the economic or
- societal costs. The FBI's Digital Telephony proposal, and the earlier
- Senate bill 266, were based on the same assumption.
- There are a number of arguments made in defense of this
- position: that privacy rights and law enforcement needs must be
- balanced, or that the government will be unable to conduct criminal
- investigations without this capability.
- Regardless of how one views these various claims, there is one
- point about the law that should be made very clear: currently there is
- no legal basis -- in statute, the Constitution or anywhere else --
- that supports the premise which underlies the Clipper proposal. As the
- law currently stands, surveillance is not a design goal. General
- Motors would have a stronger legal basis for building cars that could
- go no faster than 65 miles per hour than AT&T does in marketing a
- commercial telephone that has a built-in wiretap capability. In law
- there is simply nothing about the use of a telephone that is inherently
- illegal or suspect.
- The federal wiretap statute says only that communication
- service providers must assist law enforcement in the execution of a
- lawful warrant. It does not say that anyone is obligated to design
- systems to facilitate future wire surveillance. That distinction is
- the difference between countries that restrict wire surveillance to
- narrow circumstances defined in law and those that treat all users of
- the telephone network as potential criminals. U.S. law takes the first
- approach. Countries such as the former East Germany took the second
- approach. The use of the phone system by citizens was considered
- inherently suspect and for that reason more than 10,000 people were
- employed by the East German government to listen in on telephone calls.
- It is precisely because the wiretap statute does not contain
- the obligation to incorporate surveillance capability -- the design
- premise of the Clipper proposal -- that the Federal Bureau of
- Investigation introduced the Digital Telephony legislation. But that
- legislation has not moved forward and the law has remained unchanged.
- The Clipper proposal attempts to accomplish through the
- standard-setting and procurement process what the Congress has been
- unwilling to do through the legislative process.
- On legal grounds, adopting the Clipper would be a mistake.
- There is an important policy goal underlying the wiretap law. The
- Fourth Amendment and the federal wiretap statute do not so much balance
- competing interests as they erect barriers against government excess
- and define the proper scope of criminal investigation. The purpose of
- the federal wiretap law is to restrict the government, it is not to
- coerce the public.
- Therefore, if the government endorses the Clipper proposal, it
- will undermine the basic philosophy of the federal wiretap law and the
- fundamental values embodied in the Constitution. It will establish a
- technical mechanism for signal interception based on a premise that has
- no legal foundation. The assumption underlying the Clipper proposal is
- more compatible with the practice of telephone surveillance in the
- former East Germany than it is with the narrowly limited circumstances
- that wire surveillance has been allowed in the United States.
-
- UNANSWERED QUESTIONS
- There are a number of other legal issues that have not been
- adequately considered by the proponents of the key escrow arrangement
- that the Subcommittee should examine. First, not all lawful wiretaps
- follow a normal warrant process. The proponents of Clipper should make
- clear how emergency wiretaps will be conducted before the proposal goes
- forward. Second, there may be civil liability issues for the escrow
- agents, if they are private parties, if there is abuse or compromise of
- the keys. Third, there is a Fifth Amendment dimension to the proposed
- escrow key arrangement if a network user is compelled to disclose his
- or her key to the government in order to access a communications
- network. Each one of these issues should be examined carefully.
-
-
- CPSR CONFERENCE
- At a conference organized by CPSR this week at the Carnegie
- Endowment for International Peace we heard presentations from staff
- members at NIST, FBI, NSA and the White House about the Clipper
- proposal. The participants at the meeting had the opportunity to ask
- questions and to exchange views.
- Certain points now seem clear:
-
- % The Clipper proposal was not developed in response to any
- perceived public or business need. It was developed solely to address
- a law enforcement concern.
- % Wire surveillance remains a small part of law enforcement
- investigations. The number of arrests resulting from wiretaps has
- remained essentially unchanged since the federal wiretap law was enacted
- in 1968.
- % The potential risks of the Clipper proposal have not been
- assessed and many questions about the implementation remain unanswered.
- % Clipper does not appear to have the support of the business or
- research community.
-
- Many comments on the Clipper proposal, both positive and
- negative as well the materials obtained by CPSR through the Freedom of
- Information Act, are contained in the Source book compiled by CPSR for
- the recent conference. I am please to make a copy of this available to
- the Subcommittee.
-
-
- NETWORK PRIVACY PROTECTION
- Communications privacy remains a critical test for network
- development. Networks that do not provide a high degree of privacy are
- clearly less useful to network users. Given the choice between a
- cryptography product without a key escrow and one with a key escrow, it
- would be difficult to find a user who would prefer the key escrow
- requirement. If this proposal does go forward, it will not be because
- network users or commercial service providers favored it.
- Even if the issues regarding the Clipper are resolved
- favorably, privacy concerns will not go away. Cryptography is a part
- of communications privacy, but it is only a small part. Rules still
- need to be developed about the collection and use of transactional data
- generated by computer communications. While the federal wiretap law
- generally does a very good job of protecting the content of
- communications against interception by government agencies, large holes
- still remain. The extensive use of subpoenas by the government to
- obtain toll records and the sale of telephone records by private
- companies are just two examples of gaps in current law.
- The enforcement of privacy laws is also a particularly serious
- concern in the United States. Good laws without clear mechanisms for
- enforcement raise over-arching questions about the adequacy of legal
- protections in this country. This problem is known to those who have
- followed developments with the Privacy Act since passage in 1974 and
- the more recent Video Privacy and Protection Act of 1988. I make this
- point because it has been the experience in other countries that
- agencies charged with the responsibility for privacy protection can be
- effective advocates for the public in the protection of personal
- privacy.
-
- RECOMMENDATIONS
- Regarding the Clipper proposal, we believe that the national
- review currently underway by the Computer Security and Privacy Advisory
- Board at the Department of Commerce will be extremely useful and we
- look forward to the results of that effort. The Panel has already
- conducted a series of important open hearings and compiled useful
- materials on Clipper and cryptography policy for public review.
- We are also pleased that the Subcommittee on Telecommunications
- and Finance has undertaken this hearing. This Subcommittee can play a
- particularly important role in the resolution of these issues. We also
- appreciate the Chairman's efforts to ensure that the proper studies are
- undertaken, that the General Accounting Office fully explores these
- issues, and that the Secretary of Commerce carefully assesses the
- potential impact of the Clipper proposal on export policy.
- We are, however, less pleased about the White House study
- currently underway. That effort, organized in large part by the
- National Security Council, has led to a series of secret meetings, has
- asked that scientists sign non-disclosure agreements and accept
- restrictions on publication, and has attempted to resolve public
- concerns through private channels. This is not a good process for the
- evaluation of a technology that is proposed for the public switched
- network. While we acknowledge that the White House has been reasonably
- forthcoming in explaining the current state of affairs, we do not think
- that this process is a good one.
- For these reasons, we believe that the White House should
- properly defer to the recommendations of the Computer System Security
- and Privacy Advisory Board and the Subcommittee on Telecommunications
- and Finance. We hope that no further steps in support of the Clipper
- initiative will be taken. We specifically recommend that no further
- purchase of Clipper chips be approved.
- Speaking more generally, we believe that a number of steps
- could be taken to ensure that future communications initiatives could
- properly be viewed as a boost to privacy and not a set-back.
-
- % The FCC must be given a strong mandate to pursue privacy
- concerns. There should be an office specifically established to
- examine privacy issues and to prepare reports. Similar efforts in
- other countries have been enormously successful. The Japanese Ministry
- of Post and Telecommunications developed a set of privacy principles to
- ensure continued trade with Europe. The Canada Ministry of
- Communications developed a set of communications principles to address
- public concerns about the privacy of cellular communications. In
- Europe, the EC put forward an important directive on privacy protection
- for the development of new network services.
-
- % Current gaps in the communications law should be filled. The
- protection of transactional records is particularly important.
- Legislation is needed to limit law enforcement access to toll record
- information and to restrict the sale of data generated by the use of
- telecommunication services. As the network becomes digital, the
- transaction records associated with a particular communication may
- become more valuable than the content of the communication itself.
-
- % Telecommunications companies should be encouraged to explore
- innovative ways to protect privacy. Cryptography is a particular
- method to seal electronic communications, but far more important for
- routine communications could be anonymous telephone cards, similar to
- the metro cards here in the District of Columbia, that allow consumers
- to purchase services without establishing accounts, transferring
- personal data, or recording personal activities. Such cards are widely
- available in Europe, Japan, and Australia.
-
- I thank you very much for the opportunity to appear before the
- Subcommittee and would be pleased to answer your questions Computer
- Professionals for Social Responsibility
-
- CPSR is a national membership organization, established in
- 1982, to address the social impact of computer technology. There are
- 2,500 members in 20 chapters across the United States, and offices in
- Palo Alto, California, Cambridge, Massachusetts, and Washington DC. The
- organization is governed by a board of elected officers and meetings
- are open to the public. CPSR sponsors an annual meeting and the
- biennial conference on Directions and Implications of Advanced
- Computing. CPSR sponsored the first conference on Computers, Freedom,
- and Privacy in 1991. CPSR also operates the Internet Library at
- cpsr.org. The library contains documents from the White House on
- technology policy and a wide range of public laws covering privacy,
- access to information, and communications law and is available free of
- charge to all users of the Internet.
-
- Marc Rotenberg is the director of the CPSR Washington office
- and an adjunct professor at Georgetown University Law Center. He is
- chairman of the ACM Committee on Scientific Freedom and Human Rights,
- an editor for the Computer Law and Security Report (London), and the
- secretary of Privacy International, an organization of human rights
- advocates and privacy scholars in forty countries. He received an A.B.
- from Harvard College and a J.D. from Stanford Law School, and is a
- member of the bar of the United States Supreme Court. His forthcoming
- article "Communications Privacy: Implications for Network Design" will
- appear in the August 1993 issue of Communications o0f the ACM.
-
- ------------------------------
-
- End of Computer Underground Digest #5.43
- ************************************
- --
- Chip Rosenthal 512-447-0577 | I'm going out where the lights don't shine so
- Unicom Systems Development | bright. When I get back you can treat me like
- <chip@chinacat.Unicom.COM> | a Saturday night. -Jimmie Dale Gilmore
-