home *** CD-ROM | disk | FTP | other *** search
-
-
- ==Phrack Inc.==
-
- Volume Three, Issue Thirty-five, File 11 of 13
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Issue XXXV / Part Two PWN
- PWN PWN
- PWN Compiled by Dispater PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
- Justice Revs Up Battle On Computer Crime October 7, 1991
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Michael Alexander (ComputerWorld)(Page 4)
-
- Washington D.C. -- The nation's top federal computer crime law enforcers
- announced plans to escalate the war on computer crime.
-
- At the federal government's 14th National Computer Security Conference held in
- Washington D.C., officials at the U.S. Department of Justice said the
- department is launching a computer crime unit that will be charged with
- prosecuting crimes and pushing for stiffer penalties for convicted computer
- outlaws.
-
- "Computer crime is on the rise, and the Justice Department is taking this area
- very seriously -- as well as the FBI, U.S. Secret Service, and the military,"
- said Mary Spearing, chief of general litigation and legal advice in the
- criminal division at the Justice Department.
-
- The new crime unit will also advocate closing loopholes in the government's
- computer crime statute. The Computer Fraud & Abuse Act of 1986 "is outmoded
- and outdated," said Scott Charney, a computer crime prosecutor and chief of the
- new computer crime unit.
-
- The Justice Department wants to amend the law with a provision that would make
- inserting a virus or worm into a computer system a crime, Charney said.
-
- Those convicted of computer crimes will more often be sentenced according to
- federal guidelines rather than on recommendation of prosecutors, who may ask
- for lighter penalties, said Mark Rasch, the government's attorney who
- prosecuted Robert Morris in the infamous Internet worm case.
-
- A new Justice Department policy now mandates that all defendants will be
- treated equally, without regard for personal history or other factors that
- might mitigate stiffer sentences, Rasch said.
-
- "The penalties for computer crime will become increasingly more severe,"
- predicted Kent Alexander, assistant U.S. attorney in Atlanta <prosecutor of the
- Atlanta members of the Legion of Doom>. "In five years, they are going to look
- back and think a year in jail was a light sentence."
-
- The FBI is "staffing up to address concerns about computer crimes" and
- increasing its training efforts, said Mike Gibbons, FBI supervisory special
- agent <who worked on both the Morris and the Clifford Stoll KGB hackers
- cases>.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Supreme Court Refuses Morris Appeal October 14, 1991
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Michael Alexander (ComputerWorld)(Page 14)
-
- Washington, D.C. -- The U.S. Supreme Court refused without comment to hear
- Robert T. Morris' appeal last week, ending a legal journey that began nearly
- three years ago when he injected a worm into the Internet network.
-
- While the trek is over for Morris, there remain serious questions about the
- Computer Fraud and Abuse Act of 1986, the statute under which he was
- prosecuted.
-
- The refusal to review the Morris case leave intact a "bone breaker" law that
- could transform otherwise law-abiding computer users in felons and inhibit the
- creative uses of computer technology according to Thomas Viles, an attorney at
- the Silverglate & Good law firm in Boston. Viles authored a friend of the
- court brief in the Morris appeal on behalf of the Electronic Frontier
- Foundation.
-
- Some legal experts worry that computer users who enter a computer system
- without authorization, either unwittingly or with the intention of merely
- looking around, could be given penalties that are overly severe.
-
- "A single computer entry is of an entirely different order than the destruction
- of data or the intentional alteration of data, just as simple trespass is
- pretty minor stuff compared to vandalism or burglary," Viles said. "Now if
- people whose livelihoods depend on computers get into somebody else's computer
- without authorization, they could be in Leavenworth for five years."
-
- The Morris appeal boiled down to the critical question of whether he intended
- to cause the harm that ensued after he set loose his ill-conceived computer
- program on November 2, 1988.
-
- In 1990, a federal judge in Syracuse, New York ruled that it was not necessary
- for the government to prove that Morris intended to cause harm, only that
- Morris intended to access computers with authorization or to exceed
- authorization that he may have had. Earlier this year a federal appeals court
- upheld Morris' May 1990 conviction under which he received three years
- probation, a $10,000 fine, and 400 hours of community service.
-
- That affirmation goes against the widely accepted tenet that an injury can
- amount to a crime only when deliberately intended, Viles said. "The law
- distinguishes, say, between murder and manslaughter. You can't be guilty of
- murder if the killing was utterly accidental and unintended."
-
- A General Accounting Office (GAO) report released in 1989 noted other flaws in
- the federal computer statute. While the law makes it a felony to access a
- computer without authorization, the law does not define what is meant by
- "access" or "authorization," the GAO reported.
-
- UPDATING THE LAW
-
- U.S. Department of Justice Officials recently acknowledged that the Computer
- Fraud and Abuse Act is outdated and noted that it should be refined <see
- Justice Revs Up Battle On Computer Crime (the previous article)>. Scott
- Charney, chief of the Justice Department's newly created computer crime unit,
- said the department will lobby to fortify the law with provisions that would
- outlaw releasing viruses and worms and make it a felony to access a computer
- without authorization and cause damage through reckless behavior.
-
- Trespassing into a computer is more serious than it may appear at first
- glance, Charney said. "It is not easy to determine what happened, whether
- there was damage, how safe the system now is or what the intruder's motives
- were."
-
- Some legal experts said they believe the law is already overly broad and do not
- advocate expanding it with new provisions. "It is a far-reaching law, whose
- boundaries are still not known," said Marc Rotenberg, an attorney and director
- of the Washington, D.C. office of Computer Professionals for Social
- Responsibility. "The way I read the law is, the Justice Department has
- everything it needs and more," he said. "After the Morris decisions, if you
- sneeze, you could be indicted."
-
- The Morris case pointed out deficiencies in the law that have resulted from
- technology's rapid advance, said Thomas Guidoboni, the Washington, D.C.-based
- attorney who defended Morris.
-
- Neither Guidoboni nor Morris were surprised by the Supreme Court's refusal to
- hear his appeal, according to Guidoboni. "Robert's case had a particular
- problem in that it was the first one involving the 1986 act. They like to take
- cases after the circuit courts had had some chance to play with them and see if
- there is a disagreement."
-
- Morris is working as a computer programmer in Cambridge, Massachusetts for a
- company that "knows who he is and what he's done," Guidoboni said. He declined
- to identify the company.
-
- <Editor's Note: Morris was actually the SECOND person to be tried under the
- 1986 Computer Fraud and Abuse Act. The first person was Herbert Zinn, Jr.
- a/k/a Shadow Hawk of Chicago, Illinois, who was convicted in 1989 in a
- prosecution led by William Cook, a now former assistant U.S. attorney whose
- name most of you should recognize from the Craig Neidorf (Knight Lightning)
- and Lynn Doucette (Kyrie) cases.
-
- Zinn was tried as a minor and therefore in a bench trial before a sole judge.
- Morris is the first person to be tried under the Act in front of a jury.
- Zinn's conviction earned him 10 months in a juveniles prison facility in South
- Dakota, a fine of $10,000, and an additional 2 1/2 years of probation that
- began after his prison term ended.
-
- For additional information about the Shadow Hawk case, please read "Shadow
- Hawk Gets Prison Term," which appeared in Phrack World News, Issue 24,
- Part 2.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Justice Unit Spurred On By Cross-Border Hackers October 21, 1991
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Michael Alexander (ComputerWorld)(Page 6)
-
- Washington D.C. -- The U.S. Department of Justice's formal launch of a computer
- crime unit was prompted largely by an alarming rise in computer invasions that
- traverse geographic and jurisdictional boundaries, according to a top Justice
- Department official.
-
- Robert Mueller III, assistant U.S. attorney general, said the Justice
- Department needs to be better prepared to prosecute computer criminals. he is
- one of the architects of a five-person unit recently established by the justice
- department expressly to combat computer crime.
-
- "One of the principal functions of the unit is to anticipate areas where
- federal, state, and local law enforcement will have to expend resources in the
- future," Mueller said. "One that comes immediately to our attention is crime
- related to computers used as a target as in The Cuckoo's Egg." He was
- referring to author Clifford Stoll's account of how he tracked West German
- hackers who penetrated U.S. computers for the KGB in exchange for cash and
- cocaine.
-
- Increasingly, computer crimes cut across state and international boundaries,
- making them difficult to investigate because of jurisdictional limits and
- differing laws, Mueller said. The computer crime unit will be charged with
- coordinating the efforts of U.S. attorneys general nationwide during
- investigations of crimes that may have been committed by individuals in several
- states.
-
- One of the unit's first assignments will be to take a pivotal role in OPERATION
- SUN-DEVIL, last year's much-publicized roundup of computer hackers in several
- states. That investigation is still under way, although no arrests have
- resulted, Justice Department officials said.
-
- The unit will coordinate efforts with foreign law enforcers to prosecute
- hackers who enter U.S. computer systems from abroad while also working to
- promote greater cooperation in prosecuting computer criminals according to
- Mueller.
-
- The unit will also assist in investigations when computers are used as a tool
- of a crime -- for example, when a computer is used to divert electronically
- transferred funds -- and when computers are incidental to a crime, such as when
- a money launderer uses a computer to store records of illegal activities,
- Mueller said.
-
- "There have been many publicized cases involving people illegally accessing
- computers, from phone phreaks to hackers trying to take military information,"
- said Scott Charney, chief of the new computer unit. "Those cases have high
- importance to us because any time that computers are the target of an offense,
- the social cost is very high. If you bring down the Internet and cripple 6,000
- machines and inconvenience thousands of users, there is a high social cost to
- that type of activity."
-
- The computer crime unit will also work to promote closer cooperation between
- the Justice Department and businesses that have been the victims of computer
- crime, Charney said.
-
- Law enforcers are better trained and more knowledgeable in investigating and
- prosecuting computer crimes, Charney said. "Businesses need not be concerned
- that we are going to come in, remove all of their computers, and shut their
- businesses down. FBI and Secret Service agents can go in and talk to the
- victim in a language they understand and get the information they need with a
- minimum amount of intrusion."
-
- <Editor's Note: "Businesses need not be concerned that we are going to come
- in, remove all of their computers, and shut their businesses down." Excuse
- me, but I think STEVE JACKSON GAMES in Austin, Texas might disagree with that
- statement. Mr. Charney -- Perhaps you should issue an apology!>
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- V I E W P O I N T
-
- Let's Look Before We Legislate October 21, 1991
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Marc Rotenberg (ComputerWorld)(Page 25)
-
- "Laws Are Adequate To Handle Computer Crime -- 'Net Police' Not Needed"
-
- The U.S. Department of Justice is now circulating a proposal to expand the
- reach of federal computer crime law. On first pass, this might seem a sensible
- response to concerns about computer crime. The reality, however, it that the
- current federal law is more than adequate and the Justice Department proposal
- is poorly conceived.
-
- The Justice Department proposal will give federal agencies broad authority to
- investigate computer crime, allowing them to intercede in any situations
- involving a computer hooked to a network.
-
- Creating a worm or virus could become a felony act, no questions asked.
- Espionage laws would be broadened and intent requirements would be lowered.
- Certain procedural safeguards would be removed from existing law.
-
- CURRENT LAW ADEQUATE
-
- Taken as a whole, the proposal will make it possible for the federal government
- to prosecute many more computer crimes, but the question is whether this
- additional authority will improve computer security. Between the current
- federal statute, the Morris decision, and the sentencing guidelines, federal
- prosecutors already have more than enough tools to prosecute computer crime.
-
- Under the Computer Fraud & Abuse Act, passed in 1984 and amended in 1986, the
- unauthorized use of a computer system is a felony. Though the act does not
- define what "authorization" is or how it is obtained, a person found guilty
- faces up to five years in jail and fines of $250,000. It is a far-reaching law
- whose boundaries are still not known.
-
- THE MORRIS FACTOR
-
- The Morris case strengthened the hand of federal prosecutors still further.
- The judge ruled that it was not necessary for the government to prove that
- Morris intended the harm that resulted when the worm was released, only that he
- intended unauthorized use when he did what he did.
-
- >From a common law viewpoint, that's a surprising result. Traditional criminal
- law distinguishes between trespass, burglary, and arson. In trespass, which is
- a misdemeanor, the offense is entering onto someone else's property. Burglary
- is simple theft and arson is destruction. To punish a trespasser as an
- arsonist is to presume an intent that may not exist.
-
- A federal appeals court affirmed the Morris decision, and the Supreme Court has
- refused to hear his appeal, so now the computer crime statute is essentially a
- trip-wire law. The government only has to show that the entry was unauthorized
- -- not that any resulting harm was intentional.
-
- There is another aspect of the Morris case that should be clearly understood.
- Some people were surprised that Morris served no time and jumped to the
- conclusion that sentencing provisions for this type of offense were
- insufficient. In fact, under the existing federal sentencing guidelines,
- Morris could easily have received two years in jail. The judge in Syracuse,
- New York, considered that Morris was a first-time offender, had no criminal
- record, was unlikely to commit a crime in the future, and, not unreasonably,
- decided that community service and a stiff fine were appropriate.
-
- To "depart" as the judge did from the recommended sentence was unusual. Most
- judges follow the guidelines and many depart upwards.
-
- That said, if the Department of Justice persists in its efforts, there are at
- least three other issues that should be explored.
-
- UNANSWERED QUESTIONS
-
- First there is the question of whether it is sensible to expand the authority
- of federal agents at the expense of local police and state government. If
- theft from a cash register is routinely prosecuted by local police, why should
- the FBI be called in if the cash register is a computer?
-
- What will happen to the ability of state government to tailor their laws to
- their particular needs? Do we really want "Net Police"?
-
- There is also the need to explore the government's performance in recent
- computer crime investigations before granting new powers. For example, the
- botch Operation Sun-Devil raid, which involved almost one quarter of all Secret
- Service agents, resulted in hardly a conviction. (A good cop could have done
- better in a night's work.)
-
- In a related investigation, Steve Jackson, the operator of a game business in
- Texas was nearly forced out of business by a poorly conceived raid.
-
- In fact, documents just released to Computer Professionals for Social
- Responsibility by the Secret Service under the Freedom of Information Act raise
- substantial questions about the conduct, scope, and purpose of Operation
- Sun-Devil investigations. They reveal, for example, that the Secret Service
- monitored and downloaded information from a variety of on-line newsletters and
- conferences.
-
- A congressional hearing to assess Operation Sun-Devil would certainly be in
- order before granting federal officials new powers.
-
- PROTECTION OF RIGHTS
-
- Finally we should not rush to create new criminal sanctions without fully
- recognizing the important civil liberties interests in information
- technologies, such as the rights of privacy and free expression. There are,
- for example, laws that recognize a special First Amendment interest in newsroom
- searches.
-
- But no case has yet made clear the important principle that similar protections
- should be extended to computer bulletin boards. New criminal sanctions without
- necessary procedural safeguards throws off an important balance in the criminal
- justice system.
-
- Expanding the reach of federal law might sound good to many people who are
- concerned about computer crime, but broadening criminal law is always
- double-edged. Could you prove to a court that you have never used a computer
- in an "unauthorized" manner?
-
- <Editor's Note: Marc Rotenberg is the Director of the Washington office of
- Computer Professionals for Social Responsibility and he has testified in both
- the House of Representatives and the Senate on computer crime legislation.>
- _______________________________________________________________________________
-
- PWN Quicknotes
- ~~~~~~~~~~~~~
-
- 1. Operation Sun-Devil Scope Emerges (ComputerWorld, 10/14/91, page 119)
- --
- The Computer Professionals for Social Responsibility (CPSR), an advocacy
- group, received more than 2,400 documents from the U.S. Secret Service
- under the Freedom of Information Act. The documents relate to Operation
- Sun-Devil, last year's nationwide dragnet through the hacker underground.
- An early look at the documents reveals that the scope of the operation was
- considerably broader than the U.S. Secret Service has admitted, said Marc
- Rotenberg, director of CPSR's Washington, D.C. office. CPSR will soon hold
- a press conference to discuss the findings, he added.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- 2. 6 Police Employees Probed for Wiretaps (Washington Post/AP, 10/24/91, page
- A4) -- Jefferson City, Missouri -- Missouri's Highway Patrol is
- investigating six employees implicated in three illegal wiretaps, officials
- said.
-
- The wiretaps were "stupid" and were intended to "gain personal information
- in an effort to supervise subordinates," said Colonel C.E. 'Mel' Fisher,
- the patrol's chief.
-
- Fisher said that six employees are on administrative leave without pay
- after a two-month internal investigation confirmed conversations were
- recorded at patrol headquarters and at a troop office in Kirkwood,
- Missouri.
-
- Fisher did not identify the employees, who face hearings that could lead
- to possible penalties ranging from a written reprimand to dismissal. It is
- a federal felony to conduct an illegal wiretap. He said the FBI
- investigated the wiretaps.
-
- Major Bobby G. Gibson, chief of the patrol's Criminal Investigation Bureau,
- in which two of the wiretaps occurred, committed suicide on October 9,
- 1991. He was among five defendants in a $7 million federal lawsuit filed
- recently by a black patrolman, Corporal Oliver Dixon, who alleged he had
- been wiretapped and denied promotions because of his race. All of the
- defendants, including Fisher, are white.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- 3. Patrick Townson, the moderator of the Internet's Telecom Digest
- (comp.dcom.telecom) was less than pleased when an unknown person placed
- Phrack 34 into alt.dcom.telecom. Townson consistently preaches about the
- evils of hacking, but we know that he did not learn everything he knows
- about telecommunications in the classroom. See you after World War Three
- Pat! We know who you are, we know who you WERE and we know what crimes
- you have committed in the realm of telecommunications. We're anxious to
- talk some more with you about this in the near future.
-
- See below:
-
- "I assume you saw the stuff which was left in alt.dcom.telecom today:
- A whole series of messages telling how to break into several voicemail
- systems; how to break into the MILNET; a program designed to discover
- passwords; and other obnoxious files. All of them were left by the same
- anonymous user at the same non-existent site. Siemens Medical Systems
- (one of the victims in the theft-of-voicemail-services tutorial in
- alt.dcom.telecom today) has been notified that their 800 number link to
- voicemail is now under attack, and given the box number involved. Like
- cockroaches, you can stomp on those people all you like; they seem to
- survive. One person has said in the event of WW-3, the only species to
- survive will be the cockroaches and the hackerphreaks. Good socially
- responsible computing, that's what it is! PAT"
- _______________________________________________________________________________
-
- 4. The existence of back issues of Phrack Inc. found in a user's home
- directory was enough for a system administrator at Tufts University in
- Massachusetts to revoke a users account. Michael Godwin, an attorney for
- the Electronic Frontier Foundation went to bat for this individual and
- succeeded in restoring the user's account. The incident prompted the
- following response by a reader of Telecom Digest (comp.dcom.telecom):
-
- On Oct 19 at 11:51, TELECOM Moderator writes:
-
- > Is it easier and more pragmatic for a
- > system administrator to answer to his/her superiors regarding files at
- > the site which harassed or defrauded some third party (ie. telco) or
- > to simply remove the files and/or discontinue the feed" PAT]
-
- But this requires a judgment call on the part of the system
- administrator, does it not? Most of the system administrators that I
- know are too busy administering the system to worry about this file or
- that feed, except perhaps as it relates to traffic volume or disk space
- consumed.
-
- Will we ever get to the point where those in charge will stop dreaming of
- practicing mind control? I am so sick of those who are paranoid that
- someone somewhere may actually express an uncontrolled thought or idea to
- someone else.
-
- Ah, the advantages of owning one's own UUCP site ...
- _______________________________________________________________________________
-
- 5. The National Public Network Begins Now. You Can Help Build it.
-
- Telecommunications in the United States is at a crossroads. With the
- Regional Bell Operating Companies now free to provide content, the shape
- of the information networking is about to be irrevocably altered. But
- will that network be the open, accessible, affordable network that the
- American public needs? You can help decide this question.
-
- The Electronic Frontier Foundation recently presented a plan to Congress
- calling for the immediate deployment of a national network based on
- existing ISDN technology, accessible to anyone with a telephone
- connection, and priced like local voice service. We believe deployment of
- such a platform will spur the development of innovative new information
- services, and maximize freedom, competitiveness, and civil liberties
- throughout the nation.
-
- The EFF is testifying before Congress and the FCC; making presentations to
- public utility commissions from Massachusetts to California; and meeting
- with representatives from telephone companies, publishers, consumer
- advocates, and other stakeholders in the telecommunications policy debate.
-
- The EFF believes that participants on the Internet, as pioneers on the
- electronic frontier, need to have their voices heard at this critical
- moment.
-
- To automatically receive a description of the platform and details, send
- mail to archive-server@eff.org, with the following line:
-
- send documents open-platform-overview
-
- or send mail to eff@eff.org.
- _______________________________________________________________________________
-
- 6. The September/October 1991 issue of The Humanist has a cover story
- regarding Cyberspace, rights and freedoms on nets such as Usenet, and makes
- reference to Craig Neidorf, Jolnet, Prodigy and other matters.
- _______________________________________________________________________________
-
- 7. A Virginia Beach restaurateur plead guilty to illegally taping a telephone
- call by Governor L. Douglas Wilder and said he arranged for the tape to be
- delivered to the staff of Senator Charles Robb, D-Va., hoping it would be
- damaging to Wilder and politically helpful to Robb.
-
- Robert Dunnington, a onetime social companion of Robb's, admitted in
- federal court that he intercepted a 1988 car phone call by then-Lt.
- Governor Wilder as part of his hobby of monitoring and recording cellular
- calls.
-
- From February 1988 to October 1990, Dunnington overheard and taped hundreds
- of calls and, his attorney said, it was "just happenstance" that Wilder's
- call was picked up. (Washington Post)
- _______________________________________________________________________________
-
- 8. A Federal District Judge in New York ruled that a computer-network company
- is not legally liable for the contents of information it disseminates.
- While the decision could be influential because it tackles free speech on
- an electronic network, it is not clear how the ruling would affect bulletin
- boards ^S^Qon which users add comments. The decision concerned an electronic
- gossip column carried by CompuServe. In the decision, the judge stated
- "CompuServe has no more editorial control over such a publication than
- does a public library, bookstore or newsstand, and it would be no more
- feasible for CompuServe to examine every publication it carries for
- potentially defamatory statements than it would be for any other
- distributor to do so." (Wall Street Journal, October 31, 1991)
- _______________________________________________________________________________
-
-