💾 Archived View for spam.works › mirrors › textfiles › law › way.law captured on 2023-06-16 at 19:03:28.

View Raw

More Information

-=-=-=-=-=-=-

THERE'S GOTTA BE A BETTER WAY

By	Glen Roberts
	Bill Vajk

This article is reprinted from Full Disclosure. Copyright (c) 1991 Full 
Disclosure. Permission granted by publisher to reprint when subscription 
information provided: Full Disclosure, Box 903-R, Libertyville, Illinois 
60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll 
free: (800) 786-6184. Subscriptions: $18 for 12 issues.

This issue of Full Disclosure is devoted to the current attempts at solving 
the problems of computer security through prosecution of computer crimes.

It would appear from the recent activities of the federal government that one 
of its major attacks is trying to spread fear throughout the ``hacker'' 
community. Such a concept will certainly work in a limited number of cases. 
However, as the reading of any local newspaper will show, numerous crimes are 
committed everyday, criminals are not stopped by the fear of punishment.

The other aspect of the government's fear program appears directed towards 
those who have no criminal involvement, who wish to participate in First 
Amendment activities by high-technology. Some have been subjected to 
punishment without even the allegation of criminal behavior. See related 
article titled ``Dr. Ripco Seizure.'' The result is a fear by some of 
participating in the First Amendment, not a legitimate goal of law 
enforcement or the government.

Reprinted in this issue is a copy a sentencing memorandum filed by the 
Government last year in a computer crime case. It portrays the defendants as 
particularly ``powerful by'' means of the information they stole. Missing is 
the fact that the lax nature of computer security is what actually gave the 
defendants power. If the state of computer security been reasonable secure, 
the information obtained by defendants (whether legally or not) would have 
granted them no extraordinary power.

A primary reason the government seeks incarceration as part of the sentence 
is not because of the criminal nature of the defendants activities, but 
rather to send ``the message that the hackers around the country need to 
hear.'' Unfortunately, the death penalty has failed to stop murder.

The government appears to be more concerned with the free flow of information 
than the fact that criminal acts were committed; ``[f]rom the start, 
information was stolen and, by definition no longer safeguarded.'' Later 
concluding, ``in essence, stolen information equalled power, and by that 
definition, all three defendants were becoming frighteningly powerful.''

The concept that information is the crux of the problem is also highlighted 
by William Cook, Assistant United States Attorney, Chicago, Illinois in an 
article he wrote for the Spring 1990, COMMUNICATOR<M^>*1. He noted that 
hackers can ``easily keep up with industry technical developments.'' He also 
perceives that hackers are able to easily use prior information to form 
attack plans on new computers.

As the Soviet Union moves toward a more open society, the United States is 
just as surely closing its windows of communication. The United States has 
always been the technological forefront in the world because of the ease of 
information flow. Researchers, corporations and individuals have always been 
free to group together and exchange information as desired. This has greatly 
increased the ability of the United States to make technological advances 
quickly.

One can easily see the results by looking at the space programs administered 
by NASA. They have resulted in many inventions finding their way quickly into 
our economy, including rapid improvements in our exports. A few of the things 
that have resulted from NASA's openness with U.S. industry have included: new 
applications such as teflon coatings (frying pans and such), inhalation 
therapy for lung ailments, teflon coatings for asbestos fiber made into 
special apparel for rescue in fires, and many more too numerous to mention.

The phenomenon of information exchange is exactly what William Cook describes 
in his article. However, because the ``hackers'' have apparently built or 
made use of a highly efficient communications medium they have been able to 
advance as quick as corporations which have failed to take devote resources 
to advance their informational security. The corporate security departments 
should make use of the same hacker communication techniques to work on their 
problems and see their use of the ``frightening power'' of information lead 
to secure computer systems.

The Communications Fraud Control Association (CFCA) in its published FRAUD 
ALERT of June 21, 1990, is concerned that the government may not be able to 
stop computer crime, if several organizations promising funding for legal 
defense follow through. At risk is the review of several federal and state 
statutes for compliance with constitutional guidelines. To date, even with 
the presence of one such rights organization, the EFF<M^><MI^>*2, in at least 
two federal cases, such a review has thus far been thwarted.

In short, we see the CFCA's position as allowing only two choices: 1) violate 
the rights of hackers in order to obtain convictions, or 2) the world will be 
runover by a rampage of hacking activities.

Two decades ago, the same problems, but with slightly different technology 
was showing its ugly face. The related article in this issue ``The Death of 
the Blue Box'' overviews the legal difficulties the government had in 
prosecuting those stealing telecommunications services.

Ultimately, the law enforcement efforts to stop blue boxers were by all 
practical means of measurement a complete failure. Only a handful of 
thousands of offenses were prosecuted. Those prosecutions proved to have no 
deterrent effect on others. Just as we will see that the few recent computer 
hacker prosecutions will do nothing to stem the flow of current day hacking 
and telecommunications fraud.

Prosecution of crimes throught to be victimless does little more than to 
strengthen the resolve to not get caught in a very evoluntionary way. The 
solution today is the same as it was in the blue box solution. An upgrading 
of the technology will prevent the simplistic attacks that are so common. The 
first step towards a technological upgrade requires an increase in the 
communication between those experiencing compromise of their data.

The CFCA's COMMUNICATOR claims in the February 1990 issue of Security 
Management to be the only regular journal on telecommunications crime. 
Apparently overlooking, CUD, 2600 and the non defunct Phrack. That is a small 
start towards the free flow of information needed by those who are looking 
for security solutions for their companies.


#300, McLean, Virginia 22102, Phone: (703) 848-9768, Fax: (703) 356-3701. The 
association also operates a Consumer Hotline for anyone experiencing phone 
fraud.


02141, Phone: (617) 864-0665, Fax: (617) 864-0866. 

The above is reprinted from Full Disclosure Newspaper. Subscribe today and 
get interesting articles like the above, plus more... pictures, graphics, 
advertisement, and more articles. Full Disclosure is your source for 
information on the leading edge of surveillance technology. Print the 
following form, or supply the information on a plain piece of paper:

----

Please start my subscription to Full Disclosure for:

[ ] Sample issue, $2.00

[ ] 12 issue subscription, $18.00

[ ] 24 issue subscription, $29.95
     With 24 issue susbcription include free one of the following:
         [ ] Directory of Electronic Surveillance Equipment Suppliers
         [ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts
         [ ] Maximizing PC Performance

Also available separately:

[ ] Directory of Electronic Surveillance Equipment Suppliers, $6.00

[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts, $5.00

[ ] Maximizing PC Performance, $6.00

    Illinois residences, add 6.5% sales tax on above 3 items.

Enclosed is payment in the form of:

[ ] Check/Money order, [ ] Visa, [ ] Mastercard

Card no:___________________________________ Exp date:_______

Signature:__________________________________________________

Phone:______________________________________________________
(required for credit card orders)

My name/address:

Name:_______________________________________________________

Street:_____________________________________________________

City/State/Zip:_____________________________________________

Return to: Full Disclosure, Box 903, Libertyville, Illinois 60048





Downloaded From P-80 International Information Systems 304-744-2253