**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 3, Issue #3.24 (July 3, 1991) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) PHILEMEISTER: Bob Krause // VACATIONMEISTER: Bob Kusumoto MEISTERMEISTER: Brendan Kehoe +++++ +++++ +++++ +++++ +++++ CONTENTS THIS ISSUE: File 1: From the Mailbag (Response to "Cyberpunk" definition) File 2: Bill Vajk, Len Rose, Gene Spafford File 3: Comsec Security Press Release File 4: Comments on ComSec Data Security File 5: Police Confiscations and Police Profit File 6: House Crime Bill (1400) and its Threat to Modemers File 7: Law Panel Recommends Computer Search Procedures File 8: The CU in the News (data erasing; cellular fraud) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CuD is available via electronic mail at no cost. Hard copies are available through subscription or single issue requests for the costs of reproduction and mailing. USENET readers can currently receive CuD as alt.society.cu-digest. Back issues of Computer Underground Digest on CompuServe can be found in these forums: IBMBBS, DL0 (new uploads) and DL4 (BBS Management) LAWSIG, DL1 (Computer Law) TELECOM, DL0 (New Uploads) and DL12 (Electronic Frontier) Back issues are also available from: GEnie, PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132); (2) cudarch@chsun1.uchicago.edu; (3) dagon.acc.stolaf.edu (130.71.192.18). E-mail server: archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ---------------------------------------------------------------------- Date: July 3, 1991 From: Various Subject: From the Mailbag (Response to "Cyberpunk" definition) ******************************************************************** *** CuD #3.24: File 1 of 8: From the Mailbag *** ******************************************************************** Date: Tue, 2 Jul 91 12:44:22 cdt From: <accidentally garbled by editors> Subject: Brad Hicks and Cyber Definitions I commend Brad Hicks for his generally concise set of definitions of definitions of computer underground types which make it clear that there are many different motivations and categories. However, I would modify his following definition: > CYBERPUNK: (n) A cyberpunk is to hackers/phreaks/crackers/crashers > what a terrorist is to a serial killer; someone who insists that their > crimes are in the public interest and for the common good, a > computerized "freedom fighter" if you will. In the works of Bruce Sterling, William Gibson, and others, cyberpunks are not terrorists in the conventional sense of the term, and the analogy to serial killers strikes me as a bit extreme. Cyberpunks are characterized by their resistance to oppressive authority (which makes them a form of freedom fighter), but the resistance tends to be highly individualistic. I wonder if cyberpunks might be based on the anti-hero model of westerns (Shane) or earlier science fiction in which the marginal but basically decent outsider steps in to use marginal skills to save the town, country, or civilization? I hope Mr. Hicks' comments generate some needed discussion along these lines. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Date: Tue, 2 Jul 91 14:34:38 edt From: wex@PWS.BULL.COM Subject: Cyberpunks (response to Brad Hicks in Cu Digest, #3.23) Hicks' gratuitous slap at cyberpunks tacked on to the end of his definitions of hackers, crackers and phreaks should not be allowed to pass. He refers to cyberpunks as being more extreme forms of the above, with an added dash of morality. I'd love to know where he got this idea. The cyberpunks I know are those who, as the word implies, have taken the punk ethic of disrespect for authority (and often for self, even to the point of nihilism) and applied it to the cyber world. Cyberpunks are those who think that the street has its own uses for technology (they're out there decoding the signals from Mattel Powergloves). They think that corporations are often a bigger threat than governments, though they dis both - sometimes to the point of breaking laws. The only freedom these people are interested in is the freedom to be left alone, both physically and, in the data world, to be left out of the ubiquitous info files being accumulated on us all. This combination often leads to a "fuck you, jack" attitude, not the platitudinous %%freedom fighter'' ethos Hicks talks about. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Mon, 24 Jun 91 23:58:37 EDT From: Jerry Leichter <@mp.cs.niu.edu:leichter@LRW.COM> Subject: Bill Vajk, Len Rose, Gene Spafford ******************************************************************** *** CuD #3.24: File 2 of 8: Vill Vajk, Len Rose, Gene Spafford *** ******************************************************************** In CuD 3.22, Bill Vajk writes an (overly long, repetitive) note in response to an earlier note of Gene Spafford's. I don't want to go into the details of everything he has to say; I'll make one comment on fact, and another a general observation. On fact: Vajk tries to attack the claim that Rose violated a trade secret or copyright of AT&T's by saying that AT&T claims both trade secret and copyright protection on the Unix source code, and they are incompatible because copyright protection requires deposit of a copy of the code with the Library of Congress, where the copy is available freely to the public. This is dead wrong. First of all, deposit is required within 3 months of PUBLICATION; however, even unpublished material can be protected by copyright, and AT&T can reasonably claim that they never published the source code. Second, there are exceptions to the requirements for deposit which will usually cover software. In any case, as a matter of law, even if the copyright owner disregards the deposit requirement, the copyright remains enforceable (though the owner may be subject to fines or other penalties.) Third, even where deposit is required - as when one wishes to register the copyright, a necessary first step in defending it in court - the Copyright Office has recognized the issue of trade secrecy, and does not require the entire program to be deposited. There are a couple of choices - e.g., you can deposit the entire first and last 10 pages of source code, or the first and last 25 pages with no more than half of the text blacked out, etc. (Note: This is taken from a Notice of Proposed Rulemaking issued in 1986, as quoted in a 1990 book. Apparently it is the policy that is being followed, although it has yet to be made completely official.) Finally, while it is true that copyright infringement as such is not a criminal matter, the copyright law does provide criminal penalties for fraudulent copyright notices and false representation. Also, going beyond copyrights as such, once a property right exists, it can be stolen. Depending on the circumstances, the theft may or may not be a criminal matter. If you leave your car at my service station for some repair work and I start using it and refuse to return it, you can sue me civilly for conversion; I am probably also guilty of auto theft. Civil and criminal law are not necessarily mutually exclusive. On philosophy: Vajk is right in commenting that some of the pain people are feeling is from seeing the law applied to "nice middle class white kids" in a way it is usually applied to poor black ones. The fact of the matter is that, for the most part, the law leaves the nice white middle class alone. Its instincts and modes of operation are developed for a much rougher atmosphere, where a kid being rousted, whether for good reasons or bad, is quite likely to be armed, or at least potentially dangerous. Sure, a cracker - or a whitecolor criminal - is unlikely to attack the police who've arrested him; but policy says that those under arrest will be handcuffed, because it's safer (for the police) that way, and their safety outweighs the arrestee's dignity. Presumption of innocence or no, the gut feeling that police, prosecuters, and probably most defense attornies have is that those arrested are probably guilty, if not of the particular offense charged, then of SOME offense. Guilt and innocence are of much less importance than making sure the legal rules are followed - and those legal rules can and do play rough. Innocent or guilty, you DON'T want to be caught up in the criminal justice system. Vajk is incensed that police officers are "learning on the job" how to deal with computers. In "To Engineer is Human", a wonderful book, Henry Petrofsky points out that engineering never learns much from successes, only from failures. The law acts the same way. It's not only police officers and prosecutors and judges who are "learning on the job"; it's the entire legal system. Much of the law is based on precedent; before a precedent is established, there IS no settled law in a particular area. Even law that is based on statute doesn't come out of nowhere: Laws are usually drafted in response to perceived problems. Only rarely are they anticipatory, and then they often turn out to be wrong. What we are seeing right now is the legal system learning what the right way to deal with "computer crimes" is. It tried ignoring them; that eventually proved unsatisfactory. Now it is reacting, and as is to be expected, it is doing so by pushing as hard as it can. The eventual boundaries of the law will be determined by the sum of the various pushes - by overzealous prosecuters, by defense attornies, by citizens enraged by computer crimes and citizens enraged by government over-reaction. One way or the other, the Steve Jackson case will establish some of the boundaries of search and seizure of computers. Had the Neidorf case gone through a full trial, it might well have established something about First Amendment protections for electronic publication. As it is, it made the prosecuters look stupid and AT&T look like liars. The next time around, a prosecuter will think twice about putting his reputation on the line based on some unverifiable AT&T claims. That, too, is part of the education of the legal system. The courts deliberately avoid deciding issues until they are forced to by actual cases. (There are some minor exceptions to this rule.) In practice, this means that if you want to challenge, say, an abortion law in court, you have to violate it - and be prepared to go to jail (as many challengers did) if your challenge fails. This method has worked reasonably well over hundreds of years, but it has the unfortunate property that while the boundaries of the law are being paved, some people will end up in the wrong place at the wrong time and will end up being squashed by an on-coming steamroller. The steamroller may have to roll back later, but that doesn't do the flattened fellow much good. So ... don't look at the current problems as a sign that the legal system is incapable of dealing with computer and communication technology. That's not at all what is going on. Within a couple of years we'll be on pretty firm ground on these issues. The important things to do now are (a) help provide pressure to push the law in the right directions before it "sets"; (b) help support the relatively few casualties of the process. I applaud EFF's efforts to do (a) (even if I don't always agree with the particular positions they may choose to take). As far as I can see, EFF isn't deliberately doing (b), though that will be a side-effect of some of their other actions; but in general (b) is more effectively done by concerned individuals in any case. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: June 11, 1991 From: COMSEC Press Release Subject: Comsec Security Press Release ******************************************************************** *** CuD #3.24: File 3 of 8: Comsec Security Press Release *** ******************************************************************** COMSEC PRESS RELEASE June 11, 1991 For future release Contact Scott Chasin or Chris Goggins 713-721-6500 Houston, TX, Comsec Data Security announced its entrance into the field of computer security consulting. Comsec, comprised mainly of the now defunct computer group "The Legion of Doom," plans to offer a full-scale security package to private industry. The firm's officers are Scott Chasin, Robert Cupps, Chris Goggins and Ken Shulman. The three key computer specialists Chasin, Goggins and Shulman, all ex-members of LOD, each have over eight years experience dealing with computer security. Cupps, a graduate of Emory School of Business and former securities trader, will operate as the firm's administrative partner and concentrate on the firm's marketing efforts. Since it's formation in the summer of 1984, the Legion of Doom had been the object of much controversy in the media. Often referred to as "the most notorious hacker group in America," LOD underwent four major reorganizations of members. Goggins, one of the original nine founding members of the group said of the final reorganization, "we were looking for individuals who had the skills and desire to move the group specifically to this point. "We feel that we are bringing a fresh approach to security consulting in the corporate marketplace. We were all the cream of the crop of the computer underground and know precisely how systems are compromised and what actions to take to secure them," said Goggins. In fact, the group feels its success rate in the area of system penetration is 80 to 85 percent. Comsec will offer security penetration testing and full auditing services to corporate clients. In addition, the firm aims to endorse a wide range of software and hardware security products. "Our firm has taken a unique approach to its sales strategy and is confident that contracts currently under negotiation will firm up within the next 30 days," said Cupps. Aware of the possible shockwave among the hacking underground over this venture, the firm maintains that they are security consultants and not informants or hacker-trackers. "We are not going to go after people, we are going to ensure that no one, hacker or corporate spy, can compromise the security of our clients computers," said Chasin. Comsec is ready to assume normal operations and is looking to provide the business community with a much needed service. Comsec is located at 60 Braeswood Square, in Houston, Texas, and can be reached at 713-721-6500 or 713-683-5742 (A/ hrs). ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Tue, 25 Jun 91 14:12:25 EST From: Gene Spafford <spaf@CS.PURDUE.EDU> Subject: Comments on ComSec Data Security ******************************************************************** *** CuD #3.24: File 4 of 8: Comments on ComSec *** ******************************************************************** I have a quick comment on the report of the start-up of Comsec Data Security. I have been quoted as asking people if they would hire a confessed/convicted arsonist to install their fire alarm system when talking about hiring "reformed" system crackers to do computer security. Personally and professionally, I think it is a dangerous decision from a business perspective and from a professional perspective. From a business perspective, you need to ask yourself the following questions: * If these guys know how to break through certain kinds of security, does that prove they know how to make the security better? Using an analogy to start with, does someone who has experience putting sugar in the gas tank know how to tune the engine? Or, more closely, does someone who has shown expertise at stealing cars with the keys left in the ignition know how to tell you something more valuable than not to leave the keys in the ignition? They can guess at telling you to leave the doors locked and windows rolled up. But can they tell you about car alarms, various forms of insurance, removable stereos, LoJac (sic?) tracers, cost/benefit of using various other models of car, etc? Likewise, with computer security, because some people have had good luck breaking weak passwords and circumventing poorly-placed controls, that does not make them experts in security. What do these guys know about formal risk assessment models, information theoretical background of ComSec evaluation, formal legal requirements for security, business resumption planning, employee training, biometric systems, .....? * How do you know they are reformed? Just because they claim they have reformed and hang a shingle out, does that mean they have *really* reformed? If your business presents a very tempting target, how do you know they aren't casing the system to make a single big haul and then skip town? How do you know they aren't going to traffic info on your system with their friends? One big haul and a quick trip to another country with no extradition, and that's it. The literature is full of instances where people with clean records couldn't resist the temptation to take advantage of their access to the system to make a quick buck. How much more can you trust people who have already shown they aren't particularly interested in niceties of the law and ethics? Ask the folks at SRI if hiring "reformed" crackers/phreakers is ultimately a sound business decision.... * Can you be sure if these guys find some of their former associates playing with your system, they will act in your best interests? This is a standard problem in a new realm -- will these guys really turn in their former buddies if they find that they have penetrated a client's system? * If they miss a problem, or cause a problem, will your business insurance pay off? Will you be immune from prosecution or stock-holder's lawsuits? These guys and others like them have a checkered history. Hiring them to protect your systems against loss could be grounds for negligence suits in the case of loss, or be sufficient to cause non-payment of insurance policies. In the case of various state & federal laws, you might be responsible for not showing a concerted effort to really protect your data. Are these guys bondable? If so, for how much? Can they receive security clearances? The decision is also a bad one professionally. What kind of statement does hiring these guys send to the rest of the world? It says "Gee, build up some experience hacking into other people's (or our ) systems without permission, and we'll give you a job!" That's a bad statement to make. Furthermore, it says to the true professionals in the field, the people who study the material, act professionally and ethically their whole careers, and who make every attempt to be responsible: "We will hire people who behave improperly instead; your training is equivalent (or less than) experience gained from acting unethically." That is a worse statement to make. Most of the professionals in the field could easily break in to business systems because of lax security, but would never dream of doing so. To prefer confessed crackers over honorable professionals is quite an insult. As a professional, I would refuse to do business with firms who hire these guys as security consultants. They show surprisingly poor business sense, and an (indirect) contempt for the people who work hard and *ethically* their whole careers. Note that I'm not stating that these three, in particular, are less than honorable now or will commit any crimes in the future. I'm stating that, in the general case, such "reformed" individuals are a very poor choice for security consulting. Neither am I making the statement (incorrectly attributed to me in CACM a year ago) that people like these three should never be employed in computing-related jobs. I am disturbed, however, that they would be hired *because* of their unethical and illegal behavior-past. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: June 30, 1991 From: Moderators Subject: Police Confiscations and Police Profit ******************************************************************** *** CuD #3.24: File 5 of 8: Police Confiscations and Profit *** ******************************************************************** The policy of indiscriminant confiscation of computer property in search and seizure operations has drawn criticism. The roots of the policy stem from RICO and anti-drug enforcement policies. A recent article in _Law Enforcement News_ suggests that the police may be significant beneficiaries of seized assets when they are "donated" to the seizing agency. This creates the risk of police expansion of the (ab)use of seizure power by providing an incentive to increase the stockpiles of "forfeited" assets. The risky logic might run something like this: "Our agency is need, so if we seize enough assets that we can use, we can meet our needs." Although the seizure of assets in drug raids far exceeds seizures in computer raids, the danger remains the same: There is incentive for police to confiscate as much as they can if they will be the ultimate recipients. Two blurbs from _Law Enforcement News_ (April 30, 1991, p. 1, "Seized-asset funds prove tempting") underscore this point. One article subhead, "Mass. city seeks drug funds to avert layoffs of officers," begins: "The Mayor of a Massachusetts city says revenue shortfalls are forcing him to lay off police officers, and he believes he has a temporary solution to the bind: using forfeited assets and cash from drug busts to forestall layoffs or rehire furloughed officers." According to the article, Somerville Mayoer Michael Capuano introduced a petition to the Massachusetts Legislation in April to allow police agencies to use funds for personnel. Fund are currently restricted to drug enforcement expenditures. A second subhead, "Illinois audit eyes using funds to upgrade police wardrobe," indicates that: "The Illinois State Police spent $408,000 in seized drug assets to buy new uniforms--in an apparent violation of provisions of the state's asset-forfeiture laws--but State Police officials defended the purchase on the grounds that the money was spent before an amendment went into effect last year to require that such funds be spent only for drug enforcement." Liberal interpretation of law, expansion of policies intended for one type of crime (drugs) to other types of crime (e.g., computers), and the possibility that those who do the seizing have the most to gain by incentives that reward more seizures, poses a threat to Constitutional protections against deprivation of property. Given the erosion of First and Fourth Amendment protections in a variety of areas, the broader definitions of "criminal behavior" related to computer behavior, and the sweeping scope of equipment eligible for seizure in computer cases, expanding the profit motive for law enforcement agencies strikes us as a continuation of the danger trend of "Big Brotherism." ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: June 30, 1991 From: Moderators Subject: House Crime Bill (1400) and its Threat to Modemers ******************************************************************** *** CuD #3.24: File 6 of 8: Threat of HR 1400 to Modemers *** ******************************************************************** Why should modemers be concerned about the Bush "war on crime?" Proposed anti-crime legislation could, if passed, increase the risk of intrusion of government into the lives of law-abiding citizens. Among the provisions of HR 1400 (_The Comprehensive Violent Crime Control Act of 1991_) is a change in 18 USSC (sect) 2709 that expands the power of the FBI to intrude into the privacy of citizens. An article in _First Principles_ (June, 1991, p. 6) describes the proposed revision this way: "Sections 743 and 744 %of HR 1400% would grant the FBI authority to obtain subscriber information on persons with nonpublished telephone numbers, as well as credit records, simply by certifying in writing to the telephone company or credit bureau that such information is relevant to an authorized foreign counterintelligence investigation. The proposals would seriously erode current privacy protections by giving the FBI authority to obtain these records without a subpoena or court order and without notice to the individuals that their records have been obtained by the bureau." %/%/%/%/%/%/%/%/%/%/%/%/Current law%/%%/%/%/%/%/%/%/%/%/%/%/% CHAPTER 121. STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS s 2709. Counterintelligence access to telephone toll and transactional records (a) Duty to provide. A wire or electronic communication service provider shall comply with a request for subscriber information and toll billing records information, or electronic communication transactional records in its custody or possession made by the Director of the Federal Bureau of Investigation under subsection (b) of this section. (b) Required certification. The Director of the Federal Bureau of Investigation (or an individual within the Federal Bureau of Investigation designated for this purpose by the Director) may request any such information and records if the Director (or the Director's designee) certifies in writing to the wire or electronic communication service provider to which the request is made that (1) the information sought is relevant to an authorized foreign counterintelligence investigation; and (2) there are specific and articulable facts giving reason to believe that the person or entity to whom the information sought pertains is a foreign power or an agent of a foreign power as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801). (c) Prohibition of certain disclosure. No wire or electronic communication service provider, or officer, employee, or agent thereof, shall disclose to any person that the Federal Bureau of Investigation has sought or obtained access to information or records under this section. (d) Dissemination by bureau. The Federal Bureau of Investigation may disseminate information and records obtained under this section only as provided in guidelines approved by the Attorney General for foreign intelligence collection and foreign counterintelligence investigations conducted by the Federal Bureau of Investigation, and, with respect to dissemination to an agency of the United States, only if such information is clearly relevant to the authorized responsibilities of such agency. (e) Requirement that certain Congressional bodies be informed. On a semiannual basis the Director of the Federal Bureau of Investigation shall fully inform the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate concerning all requests made under subsection (b) of this section. %/%/%/%/%/%/%/%/%/%/%/%proposed law%/%/%/%/%/%/%/%/%/%/%/%/% SEC. 743. COUNTERINTELLIGENCE ACCESS TO TELEPHONE RECORDS. Section 2709 of title 18 of the United States Code is amended by- (1) striking out subsections (b) and (c); and (2) inserting the following new subsections (b) and (c): "(b) REQUIRED CERTIFICATION.-The Director of the Federal Bureau of Investigation (or an individual within the Federal Bureau of Investigation designated for this purpose by the Director) may: "(1) request any such information and records if the Director (or the Director's designee) certifies in writing to the wire or electronic communication service provider to which the request is made that- "(A) the information sought is relevant to an authorized foreign counterintelligence investigation; and "(B) there are specific and articulable facts giving reason to believe that the person or entity about whom information is sought is a foreign power or an agent of a foreign power as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801); "(2) request subscriber information regarding a person or entity if the Director (or the Director's designee certifies in writing to the wire or electronic communications service provider to which the request is made that- "(A) the information sought is relevant to an authorized foreign counterintelligence investigation; and "(B) that information available to the FBI indicates there is reason to believe that communication facilities registered in the name of the person or entity have been used, through the services of such provider, in communication with a foreign power or an agent of a foreign power as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801). "(c) PENALTY FOR DISCLOSURE.-No wire or electronic communication service provider, or officer, employee, or agent thereof, shall disclose to any person that the Federal Bureau of Investigation has sought or obtained access to information under this section. A knowing violation of this section is punishable as a class A misdemeanor.". /%/%/%/%/%//%//%the end/%/%/%/%/%/%/%/%/%/%//% David Cole (_The Nation_, May 6, 1991, "The Secret Tribunal", p. 581) describes aspects of the Crime Bill as a return to the seventeenth century Star Chamber. We agree with his concern that the expanded interpretation of the word "terrorism" creates new categories of people vulnerable to investigation--not on the basis of what they have done--but rather on the basis of who they may have associated with. Although looking at a different, but related, provision of the Bill, Cole's warning is sound: The current crime Bill contains changes that expand the power of government to curtail fundamental rights. In cloaking the rationale and the language in fears of terrorism, something most rationale people oppose, the Bill, if passed, reduces jeopardizes a broader number of law-abiding citizens to intrusion and potential harm by zealous law enforcement agents, and makes it a crime for other citizens to warn innocent folk of their vulnerability. Secret police tactics are not the way to create a safe society in a Constitutional democracy. Questions about HR1400 can be directed to Ted Vandermede, staff attorney for the House Criminal Justice subcommittee, at (202) 225-0600. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: July 2, 1991 From: Barbara E. McMullen and John F. McMullen (Newsbytes Reprint) Subject: Law Panel Recommends Computer Search Procedures ******************************************************************** *** CuD #3.24: File 7 of 8: Law Panel and Search Procedures *** ******************************************************************** LAW PANEL RECOMMENDS COMPUTER SEARCH PROCEDURES WASHINGTON, D.C., U.S.A., 1991 JULY 2 (NB) -- A panel of lawyers and civil libertarians, meeting at the Computer Professionals for Social Responsibility (CPSR) Washington roundtable, "Civilizing Cyberspace", have proposed procedures for police searches and seizures which they feel will both allow adequate investigations and protect the constitutional rights of the subject of the investigation. The panel, composed of Mike Godwin, staff counsel of Electronic Frontier Foundation; Sharon Beckman attorney with Silverglate & Good; David Sobel of CPSR, Jane Macht, attorney with Catterton, Kemp and Mason; and Anne Branscomb of Harvard University, based its proposals on the assumption that a person, in his use of computer equipment, has protection under both the Fourth Amendment and the free speech and association provisions of the first amendment. The panel first addressed the requirements for a specific warrant authorizing the search and recommended that the following guidelines be observed: 1. The warrant must contain facts establishing probable cause to believe that evidence of a particular crime or crimes will be found in the computers or disks sought to be searched. 2. The warrant must describe with particularity both the data to be seized and the place where it is to be found ("with particularity" is underlined). 3. The search warrant must be executed so as to minimize the intrusion of privacy, speech and association. 4. Officers may search for and seize only the data, software, and equipment specified in the warrant. 5. The search should be conducted on-site. 6. Officers must employ available technology to minimize the intrusive of data searches. The panel then recommended limitations on the ability of officials to actually seize equipment by recommending that "Officers may not seize hardware unless there is probable cause to believe that the computer is used primarily as an instrumentality of a crime or is the fruit of a crime; or the hardware is unique and required to read the data; or examination of hardware is otherwise required." The panel further recommended that, in the event hardware or an original and only copy of data has been seized, an adversary post-seizure hearing be held before a judge within 72 hours of the seizure. Panel member Sharon Beckman commented to Newsbytes on the recommendations, saying "It is important that we move now to the implementation of these guidelines. They may be implemented either by the agencies themselves through self-regulation or through case law or legislation. It would be a good thing for the agencies t o take the initiative." The panels recommendations come at a time in which procedures used in computer investigations have come under criticism from computer and civil liberties groups. The seizure of equipment by the United Secret Service from Steve Jackson Games has become the subject of litigation while the holding of equipment belonging to New York hacker "Phiber Optic" for more than a year before his indictment has prompted calls from law enforcement personnel as well as civil liberties for better procedures and technologies. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: July 3, 1991 From: Various Subject: The CU in the News (data erasing; cellular fraud) ******************************************************************** *** CuD #3.24: File 8 of 8: The CU in the News *** ******************************************************************** From: <garbled> Subject: Ex-employee Attacks Data-base Date: Thu, 27 Jun 91 17:19:23 CDT "Ex-Employee Guilty of Erasing Data" By Joseph Sjostrom CHICAGO TRIBUNE, June 27, 1991, Section 2, p. 2 A computer technician pleaded guilty Wednesday in Du Page County Court to erasing portions of his former employer's database last November in anger over the firing of his girlfriend. Robert J. Stone, 30, of 505 W. Front St., Wheaton, entered the plea on a charge of computer fraud to Associate Judge Ronald Mehling. In exchange for the guilty plea, prosecutors dismissed a burglary charge. Mehling scheduled sentencing for Aug. 8. Defense lawyer Craig Randall said after the hearing that Stone still has a 30-day appeal period during which he can seek to withdraw the guilty plea. "I don't think he erased anything as alleged, and I don't think the %prosecution% would be able to prove that he did," Randall said. Stone was indicted last January for one count of burglary and one count of computer fraud for entering the office of his former employer, RJN Environmental, 202 W. Front St., Wheaton, and deleting eight programs from the company computer. Assistant Du Page County State's Atty. David Bayer, who prosecuted the case along with Assistant State's Atty. Brian Ruxton, said the progams were part of a company project for the state of Florida in which RJN was, in effect, redrawing maps in digital form and storing them in a computer. Bayer said Stone had left the company the previous April and that his girlfriend, who was not identified, worked there too but was fired in November. Bayer said Stone entered the firm's office last Nov. 24, a Saturday when nobody else was there. Employees who came to work on Sunday discovered that data had been erased and a quantity of data storage disks were missing. Bayer said the disks contained several months' worth of work, but were recovered. It took about a week to restore the rest of the missing computer information, Bayer said. Bayer said Wheaton police Detective Kenneth Watt interviewed Stone the following Monday, and said Stone admitted to erasing data and taking the disks. Bayer said Stone told the detective where to find the disks, which he had left under a stairwell at RJN. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Date: Tue, Jul 2, 1991 (22:30) From: Barbara E. McMullen and John F. McMullen (Newsbytes Reprint) Subject: Arrests in "Multi-Million" Cellular Phone Fraud ****ARRESTS IN "MULTI-MILLION" CELLULAR PHONE FRAUD 07/01/91 ALBANY, NEW YORK U.S.A., 1991 JUL 1 (NB) -- The New York State Attorney General's office has announced the arrest and arraignment of four individuals for allegedly illegally utilizing Metro One's cellular service for calls totalling in excess of $1 million per month. According to the charges, the arrested individuals duplicated a Metro One customer's electronic serial number (ESN) -- the serial number that facilitates customer billing -- and installed the chip in a number of cellular phones. Th defendants then allegedly installed the phones in cars which they parked in a location near a Metro One cell site in the Elmhurst section of Queens in New York City. From these cars, the defendants allegedly sold long distance service to individuals, typically charging $10 for a 20 minute call. Metro One told investigators that many of the calls were made to South American locations an that its records indicate that more than $1 million worth of calls were made in this manner in May 1991. The arrests were made by a joint law enforcement force composed of investigators from The New York State Police, New York City Police Special Frauds Squad, United States Service, and New York State Attorney General's office. The arrests were made after undercover officers, posing as customers, made phone calls from the cellular phones to out-of-state locations. The arrests were, according to a release from the Attorney General's office, the culmination of an investigation begun in September 1990 as the result of complaints from Metro One. The defendants, Carlos Portilla, 29, of Woodside, NY; Wilson Villfane, 33, of Jackson Heights, NY; Jaime Renjio-Alvarez, 29, of Jackson Heights, NY and Carlos Cardona, 40, of Jackson Heights, NY, were charged with computer tampering in the first degree and falsifying business records in the first degree, both Class E felonies,- and theft of services, a Class A misdemeanor. Additionally, Portilla and Villfane were charged were possession of burglar tools, also a Class A misdemeanor. At the arraignment, Portilla and Renjio-Alvarez pleaded guilty to computer tampering and the additional charges against those individuals were dropped. New York State Police Senior Investigator Donald Delaney, commenting on the case to Newsbytes, said "This arrest is but the tip of the iceberg. There is an on-going investigation in the area of cellular phone fraud and we are looking for those that are organizing this type of criminal activity." (Barbara E. McMullen & John F. McMullen/Press Contact: Edward Barbini, NYS Department of Law, 518-473-5525/19910701) ******************************************************************** ------------------------------ **END OF CuD #3.24** ********************************************************************