💾 Archived View for spam.works › mirrors › textfiles › news › bp.txt captured on 2023-06-16 at 19:21:21.

View Raw

More Information

-=-=-=-=-=-=-

this article is from the Boston Phoenix, September 7, 1990

Hackers under attack
-----------------------
Crackdown raises questions about new forms of speech
-----------------------
by Mark Leccese

	The First and Fourth Amendments (ensuring free speech and 
protection against unreasonable search and seizure) became dust in 
the wind on March 1, in Austin, Texas, when US Secret Service busted 
Steve Jackson Games for no reason anyone can explain. The firm was 
preparing to market a Dungeons and Dragons-type game called GURPS 
Cyberpunk when the feds raided its headquarters, seized the 
computers the company was using both to create the game and 
maintain a computer-bulletin-board system (BBS) for dialog with its 
customers. The feds also confiscated software, company records and 
all available drafts of the book. Law enforcement officials even tried 
to pry open locked file cabinets with letter openers they found on 
employees' desks.

	And yet, as Jackson told the Phoenix, "No one connected with 
the business was ever arrested, charged, indicted or even questioned" 
after the raid, which put the company temporarily out of business.

	Steve Jackson Games appears to have been an early-year victim 
of a federal war against "hackers" - persons who gain unauthorized 
access to other people's computers - that began with a raid in Arizona 
on May 8 and escalated into a nationwide sweep known as Operation 
SunDevil covering 14 cities and involving more than 150 Secret 
Service agents.

	As John Perry Barlow, a Wyoming rancher, expert on computer 
hackers, and long time lyricist for the Grateful Dead ("I Need a 
Miracle," "Hell in a Bucket," "Mexicali Blues"), sees it, computer abuse 
can be divided into three categories: crimes committed by insiders; 
crimes committed by hackers who steal, say, credit card numbers and 
long distance phone codes; and gaining of access - just for the purpose 
of looking around and learning - by computer "phreaks."

	Everyone agrees that the first two are crimes, including the 
Electronic Frontier Foundation (EFF), an organization co-founded by 
Barlow and Mitchell Kapor, the Cambridge-based wizard who designed 
Lotus 1-2-3, to educate the public and the country's leaders about the 
electronic world, lobby for change, and when necessary take legal 
action such as filing friend-of-the-court briefs. The controversy 
surrounds the third category of abuse, which many hackers 
characterize as harmless high-tech fun. "The government is drawing 
no distinction" between these kinds of activities, says Barlow.

	The Secret Service held the confiscated material for three 
months while Jackson tried, in vain, to find out why it had been seized 
in the first place. According to attorney Sharon Beckman, of the Boston 
law firm Silvergate & Good, which represents the company, the 
government's application for a search warrant - which would describe 
what its agents were after - has never been released. "So far, I haven't 
heard anything to indicate probable cause," she says.

	The only thing a search warrant authorizes government agents 
to seize, Beckman contends, is information relating directly to a crime 
or a criminal conspiracy. The kind of "fishing expedition" conducted at 
Steve Jackson Games, she says, "is against the Forth Amendment" of 
the US Constitution.

	After Jackson wrote to his congressmen and, with his lawyers, 
applied pressure on the feds, most, but not all, of the property was 
returned - some of it badly damaged. "There's one computer I'm not 
even going to turn on unless I have a fire extinguisher handy," he 
says.

	During the time the government was holding on to Steve 
Jackson Games' equipment, the small business had to lay off eight of 
its 25 employees, none of whom have been rehired. "They cost us an 
awful lot of money with their little visit," Jackson says.

	All this apparently for a fantasy game with imaginary futuristic 
weapons - one Beckman describes as akin to "as James Bond movie. 
James Bond has all kinds of special tools, too, but the government 
doesn't close down James Bond movies because they could teach 
people physical-trespass skills."

	Says Jackson of the government gumshoes: "These people don't 
have enough expertise to tell fantasy from reality."

	The Jackson raid and the Operation SunDevil forays represent 
the fed's opening gambit is what many worry could be a major civil-
liberties debacle. The culprits in these Kafka-esque trials are the ever-
proliferating digital electronic impulses carried across what is known 
to computer aficionados as "the net," or, to sci-fi fans, "Cyberspace" or 
the "virtual" world - a vast and complex web of computer networks 
that make up the electronic frontier, where nothing exists in physical 
form but the hardware used to translate the bleeps into information.

	The frontier is unmapped, confusing, and infinitely expandable. 
Like the 19th-century American frontier, it is populated mostly by 
earnest settlers searching for new knowledge, but it also has its share 
of fringe characters and desperados taking advantage of the wide-
open spaces. With the advent of electronic mail, BBS's and publications 
that never put ink on paper, technology has out-paced the law. Forty 
years ago the government saw a Red under every bed; now it sees a 
hacker behind each keyboard. Over the past two years, the lawmen, 
led by the US Secret Service, have come crashing across the plains, 
dispensing frontier justice. Some actual criminals have been arrested 
and convicted, but the government, in its zealousness and ignorance of 
this new land, has also rounded up many innocent computer users 
and, in the process, trampled constitutional rights.

	Notes Kapor, "We get into trouble when we blindly try to apply 
the laws for physical media to digital media. We have to reinterpret 
what data and speech and property are."

	The Senate Judiciary Committee is now considering an 
amendment to the 1986 Computer Fraud and Abuse Act that would 
create a "recklessness" misdemeanor under which computer users who 
gain illegal access to a system and accidentally cause damage would be 
prosecuted. The EFF and the Washington based Computer Professionals 
for Social Responsibility (CPSC) both back the amendment.

	The most famous example of such "recklessness" is the case of 
Cornell graduate student Robert Morris Jr., who designed a program to 
break into the Internet system in an attempt, Barlow says, to map the 
almost unbelievably complex network (no one knows how many 
computers are hooked up to it or where they are). But the program 
written by Morris had a bug in it, and rather than mapping the 
system, it endlessly reproduced itself on computers around the 
country, temporarily bringing the Internet system to a halt. No data 
was destroyed, but valuable computing time was lost.

	"You don't want to send somebody like that to jail for 30 years 
because he wrote a bad program," Barlow says.

	Barlow - who doesn't say how he'd feel if it were his data being 
trashed - is not alone in his judgment. Surprisingly, even some in the 
corporate world that so fears and loathes the new pioneers think that 
there may be an alternative. (It is obviously in the corporate interest 
to have information - and the free flow of communication - controlled 
as tightly as possible; after all knowledge is power and power is 
money).

	Whatever else you can say about hacking, there is no question 
that it requires a gifted intellect, cleverness and hard work - all 
qualities prized and encouraged by American society. So if you can't 
stop the hackers - and no matter how hard it tries, nor how many civil 
liberties it steps on, the government doesn't seem able to - why not 
put them to good use?

	At least one expert from an unlikely quarter agrees. Dorothy E. 
Denning, of Digital Equipment Corporation (DEC), has prepared a paper 
to be presented to the National Computer Conference in Washington 
next month in which she recommends that she and her fellow security 
professionals "work closely with hackers."

	Denning has a truly novel idea: systems managers who obtain 
access to a supposedly secure system to leave a "calling card," 
explaining how they broke in.

	"This approach could have the advantages of not only letting the 
hackers contribute to the security of the system, but of allowing the 
managers to quickly recognize the malicious hackers, since they are 
unlikely to leave their cards. Perhaps if hackers are given the 
opportunity to make contributions outside the underground, this will 
dampen their desire to pursue illegal activities," she writes.

	It's hard to imagine the large corporations going along with this 
clever but quirky idea. "Corporations that feel they've been affected 
have voiced strong demands for government action," Kapor says. To 
wit: at least 10 corporations aided the feds in Operation SunDevil.

No sympathy for the Devil

	During Operation SunDevil numerous BBS's were shut down and 
40 computers and the equivalent of more than five million pages of 
information were swept up. Since then, there have been many more 
raids and seizures just as egregious, but they have received less 
publicity. And the campaign shows no signs of abating.

	With large corporations pressuring elected officials to take 
action, the law has its work cut out for it. There are tens of thousands 
of BBS's and national computer networks in this country, and most of 
them can be interlinked. Log on to one network, and you can travel 
the globe - and you won't be alone. According to the New York Times, 
Internet carried the equivalent of about half a trillion keyboard 
strokes in July alone.

	Anyone with a home computer and a modem can log on to a BBS 
and join discussions on, say, new computer projects and movies; copy 
"freeware" and "shareware," software in the public domain; or 
contribute to talks on topics such as ham radio, the Holocaust, good 
dinners, or travel in Europe. You can either "post" a message for all to 
read, or send private electronic mail ("e-mail") to a fellow BBS 
member or to the BBS's system operator (generally the person who's 
set up the board). If you've got some kind of computer question, just 
post it on the BBS and you'll get a dozen good suggestions.

	Or, for a fee, you can hook up to a national computer network. 
Once connected to the GEnie network (operated by General Electric), 
for example, you can, among other things, join roundtable discussions 
on subjects ranging from investments to photography, send and 
receive e-mail, play on-line games against other members, read up-to-
the-minute wire-service reports, access an encyclopedia, copy one of 
hundred of programs, get stock quotes, make airline reservations, and 
buy jewelry from Tiffany.

	In other words, you could spend the rest of your life wandering 
around the net and never retrace your steps.

	Of course, these days chances are you'll bump into some folks 
who have no business joining the club. Following a Freedom of 
Information Act request earlier this year from Representative Don 
Edwards (D-California), the Secret Service admitted to Congress that its 
agents, posing as legitimate users, were secretly monitoring BBS's. And 
though reading messages posted to the public is not illegal, 
government agents' reading and most likely making records of BBS 
conversations is "a little bit like an agent who attends a political rally 
to get information for a file," says CPSR president Marc Rotenberg.

	Barlow likens a BBS to "a village with a continuous town 
meeting in progress 24 hours a day." The US government, he says, is 
"confiscating towns."

	As federal agents scan the BBSs for criminal activity, what other 
small fish might they catch in their nets? Well, for one, the Secret 
Service, in response to Edward's FOIA request, admitted it has a new 
Computer Diagnostics Center, about which Rotenburg paints this 
frightening picture: the technology is readily available for a computer, 
purring quietly in a corner 24 hours a day, to scan electronic BBSs for 
key words like "hacking" or even key name - like yours - and dump 
every communication it finds with that word into a database. A BBS 
user, entirely unaware, could have a thousand page file on him at the 
Secret Service's disposal in a matter of weeks.

	For its part, the Secret Service denies that the agency is 
undertaking such surveillance, or will. Special agent and Washington 
Secret Service spokesman Richard Adams told the Phoenix, "The only 
folks the Secret Service is targeting are those operators who are using 
or encouraging others in the use of stolen phone-company numbers 
and stolen credit-card numbers."

	"I can assure you we're not randomly searching bulletin 
boards," he said. "We're bound by the courts. You've got to have 
probable cause, as you do in any case, to obtain a search warrant or an 
arrest warrant."

	But what constitutes probable cause? After all, hasn't the US 
Supreme Court ruled repeatedly that speech - and even "encouraging 
others," as agent Adams put it - is protected under the First 
Amendment unless it is "likely" to lead to "imminent" criminal 
activity?

	Where, for instance, was probable cause in the case of the 
much-publicized Phrack imbroglio? Which raises an even more 
ominous consideration: does corporate status play a role in 
determining it?

	Say you are a publisher into whose system a stolen document 
falls (a circumstance roughly equivalent to someone's dropping 
purloined papers on a newspapers editor's desk). You publish it. What 
happens to you and your publication?

	If you are Arthur Sulzberger, publisher of the New York Times, 
you publish the Pentagon Papers. The government tries to take action 
against you, but the courts, citing First Amendment, stand foursquare 
behind you.

	If you are Craig Neirdorf, publisher of Phrack, an electronic 
newsletter covering the hackers' world, you, too, publish a stolen 
document. You are arrested by the Secret Service, hit with a seven-
count grand-jury indictment, and the equipment you use to publish - 
along with all your files - is seized. Your publication is out of business.

	Phrack's document was an internal BellSouth memorandum 
describing the company's 911 emergency system. In elegant 
bureaucratese, the document was titled " A Bell South Standard 
Practice (BSP) 660-225-104SV-Control Office Administration of 
Enhanced 911 Services for Special Services and Major Account Centers, 
March 1988." It was plucked from BellSouth's computers and dropped 
into Neirdorf's system, among others, by a hacker named Robert Riggs, 
who was indicted and pleaded guilty to this and other incidents of 
illegal entry. In February 1989, Neidorf, a 20-year-old University of 
Missouri student, included the three-page document in Phrack. 
BellSouth claimed the document was worth exactly $79,449 and by 
being made public could cause potentially fatal disruption of its 911 
system. Neidorf was busted and indicted on felony charges that 
included interstate transmission of stolen goods. Earlier this month, 
the prosecuting US Attorney dropped the charges against Neidorf after 
his attorney proved that all the information in the document was 
already in the public domain and that contained much of the same 
data as the stolen one - and that went into more detail - could be 
obtained by calling an 800 number and paying $13. Neidorf's lawyers 
are considering a civil suit against the government. Neidorf, now in his 
senior year, has no plans to publish another issue of Phrack "in the 
near future," says his attorney.

	According to attorney Beckman, the government was "blaming 
Phrack for what other people might do with the information it would 
publish... It's like a newspaper publishing an article about home 
security systems that someone would use to break into a house."

	"I don't think the government even thought through the First 
Amendment implications," she says.

	Not to mention corporate fallout. As Steve Jackson sees it, "The 
Times was only going up against the military-industrial complex. 
Neidorf pulled the nose of the phone company."

	Sheldon Zenner, the Chicago attorney who represented Neidorf, 
says the legal issue raised by the Phrack case - an illegally obtained 
document appearing on a BBS and the government then seizing the 
BBS - is likely to recur. The Secret Service's press release announcing 
the Operation SunDevil raid calls computer users who gain illegal 
access "a frightening threat" and states that their actions have "serious 
implications for the health and welfare of all individuals, corporations, 
and United States Government agencies relying on computers and 
telephones to communicate." To back up its assertions, the feds add 
that the telephone companies put their losses to stolen phone service 
"as high as 50 million dollars" and that hackers have had access to 
hospital records and "could have added, deleted, or altered vital 
patient information, possibly causing life-threatening situations." As 
Barlow points out, that's a mighty big "could" - especially since no one 
has ever proven that a single patient record has ever been altered by 
a hacker.

	Why do the powers-that-be so fear BBSs? Mark Worthington, of 
Cambridge's MacEast BBS, posted a message saying it's out of 
ignorance, "but I also think they fear them for a much more troubling 
reason. They rightly perceive BBSs as a place where people can 
congregate and communicate without physically meeting... A BBS 
represents the electronic First Amendment right of free assembly, and 
thus constitutes a political threat to the paranoid and powerful."

	Perhaps the most troubling example of the government's blind 
zeal concerns the Jolnet BBS, in Illinois. Its operator, Richard Andrews, 
discovered in storage on his system (again, thanks to Riggs) the 
infamous 911 document that Phrack later published. He suspected 
something illegal and asked the advice of a friend, who notified the 
phone company in an effort to set things right. Government agents 
shut down the Jolnet BBS and seized Andrew's equipment last 
December; they still have yet to return any equipment or to charge 
Andrews.

Ignorance of the law is no excuse

	It was not only Operation SunDevil and the surrounding spate of 
arrests that prompted Barlow to get in touch with Kapor and found 
EFF. Barlow's visit from a technically illiterate FBI agent, which he 
recounts in his article "Crime & Puzzlement" in the fall issue of The 
Whole Earth Review, sealed in his mind the need to take action.

	"It's not until you get your own visit from an FBI agent that you 
realize this isn't an abstract problem," Barlow says. "I came to the 
realization the government was now dealing with things it didn't 
understand."

	Barlow spent two hours with the FBI agent who'd come to 
question him, most of it explaining how computers and networks 
operate. "He took to rubbing his face with both hands, peering up over 
his fingertips, and saying, 'It sure is something, isn't it?' or 'Whoooo-
eee,'" Barlow writes in his story. "Or:'My eight-year-old knows more 
about these things than I do.' He didn't say this with a father's pride 
so much as an immigrant's fear of a strange new land into which he 
will be forcibly moved and in which his own child is native. He looked 
across my keyboard into Cyberspace and didn't like what he saw."

	Kapor and Steve Wozniak, the iconoclastic co-founder of Apple 
Computers, put up the seed money to establish EFF, which has already 
issued its first grant: $275,000 to the Computing and Civil Liberties 
Project of the CPSR. The EFF has filed a freind-of-the-court brief in the 
Neidorf case, and has hired Silverglate & Good to clarify and articulate 
the civil-liberties issue at stake on the electronic frontier.

	Kapor is clear about what the EFF is not. "It's not a hacker-
defense fund," he stresses. "Legally, the big thing now is to figure out 
what we're going to do about these BBS seizures and the reading of 
[electronic] mail" by the Secret Service.

	The EFF's purpose, Kapor says, "is to try to ensure that in a new 
scheme, the public networks will be universal and open, encouraging 
informational entrepreneurship."

	The "hacker ethic," as it was so brilliantly described by Stephen 
Levy in his seminal 1984 book Hackers, is about learning, not stealing. 
(Thus serious hackers' insistence on the term "crackers" for law-
breakers.)

	"When a hacker breaks into a system, the objective is to learn 
and avoid causing damage," DEC's Denning wrote in her paper, 
"Downloaded information [electronically transferred to the hacker's 
computer] is copied, not stolen, and still exists on the original system. 
Moreover, information has traditionally not been regarded as 
property."

Future Shock?

	No matter what the corporations or the feds want, or what 
restrictive steps they may take, Cyberspace isn't going to go away. If 
anything, it will expand. One prominent Apple researcher recently 
predicted that within a few years home computers "50 times more 
powerful" than those now on the market will be available.

	Moreover, the networks themselves are expected to become 
more accessible to the general public. To those ends US Senator Albert 
Gore (D-Tennessee) has proposed in Congress a $1.75 billion bill that 
would fund a supernet to link the nation's universities and 
supercomputers.

	Gore's bill is considered a step toward a nascent high-speed 
national computer network that could potentially reach every home in 
the country. Such a network, the New York Times noted on September 
2, could trigger a "technological transformation that will be every bit 
as profound for America in the next century as the transcontinental 
railroad was in the last." Such a network would cost an estimated $200 
billion.

	Surprisingly, sometimes there is encouraging news from the top 
brass themselves. President George Bush last month removed 
restrictions the previous administration had placed on computer 
access to non-classified federal databases and information collected by 
university researchers and private firms working with the 
government.

	Given this rapid expansion of boundaries, decisions about how 
civil liberties will be protected in a world the Bill of Rights' authors 
could never have foreseen must be made now, by the courts and the 
government. The law-enforcement community and corporations have 
so far shown no sign of letting up their technophobic campaign, and, 
with a few exceptions, civil libertarians seem slow to wake up to the 
issue. The American Civil Liberties Union, for example, has yet to be 
heard from in the Operation SunDevil debate, though it has formed a 
subcommittee on technology.

	The EFF, in its mission statement, recognizes the lack of law and 
legal precedent in the electronic frontier and warns that "in their 
absence, law-enforcement agencies like the Secret Service and FBI, 
acting at the disposal of large information corporations, are seeking to 
create legal precedents which would radically limit Constitutional 
application to digital media."

	"The excesses of Operation SunDevil are only the beginning of 
what threatens to become a long, difficult, and philosophically obscure 
struggle between institutional control and individual liberty."