About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Law
... and Justice for All
High Profile Legal Cases
Legal Forms
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Gotta Be A Better Way

THERE'S GOTTA BE A BETTER WAY

By Glen Roberts
Bill Vajk

This article is reprinted from Full Disclosure. Copyright © 1991 Full
Disclosure. Permission granted by publisher to reprint when subscription
information provided: Full Disclosure, Box 903-R, Libertyville, Illinois
60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll
free: (800) 786-6184. Subscriptions: $18 for 12 issues.

This issue of Full Disclosure is devoted to the current attempts at solving
the problems of computer security through prosecution of computer crimes.

It would appear from the recent activities of the federal government that one
of its major attacks is trying to spread fear throughout the ``hacker''
community. Such a concept will certainly work in a limited number of cases.
However, as the reading of any local newspaper will show, numerous crimes are
committed everyday, criminals are not stopped by the fear of punishment.

The other aspect of the government's fear program appears directed towards
those who have no criminal involvement, who wish to participate in First
Amendment activities by high-technology. Some have been subjected to
punishment without even the allegation of criminal behavior. See related
article titled ``Dr. Ripco Seizure.'' The result is a fear by some of
participating in the First Amendment, not a legitimate goal of law
enforcement or the government.

Reprinted in this issue is a copy a sentencing memorandum filed by the
Government last year in a computer crime case. It portrays the defendants as
particularly ``powerful by'' means of the information they stole. Missing is
the fact that the lax nature of computer security is what actually gave the
defendants power. If the state of computer security been reasonable secure,
the information obtained by defendants (whether legally or not) would have
granted them no extraordinary power.

A primary reason the government seeks incarceration as part of the sentence
is not because of the criminal nature of the defendants activities, but
rather to send ``the message that the hackers around the country need to
hear.'' Unfortunately, the death penalty has failed to stop murder.

The government appears to be more concerned with the free flow of information
than the fact that criminal acts were committed; ``[f]rom the start,
information was stolen and, by definition no longer safeguarded.'' Later
concluding, ``in essence, stolen information equalled power, and by that
definition, all three defendants were becoming frighteningly powerful.''

The concept that information is the crux of the problem is also highlighted
by William Cook, Assistant United States Attorney, Chicago, Illinois in an
article he wrote for the Spring 1990, COMMUNICATOR<M^>*1. He noted that
hackers can ``easily keep up with industry technical developments.'' He also
perceives that hackers are able to easily use prior information to form
attack plans on new computers.

As the Soviet Union moves toward a more open society, the United States is
just as surely closing its windows of communication. The United States has
always been the technological forefront in the world because of the ease of
information flow. Researchers, corporations and individuals have always been
free to group together and exchange information as desired. This has greatly
increased the ability of the United States to make technological advances
quickly.

One can easily see the results by looking at the space programs administered
by NASA. They have resulted in many inventions finding their way quickly into
our economy, including rapid improvements in our exports. A few of the things
that have resulted from NASA's openness with U.S. industry have included: new
applications such as teflon coatings (frying pans and such), inhalation
therapy for lung ailments, teflon coatings for asbestos fiber made into
special apparel for rescue in fires, and many more too numerous to mention.

The phenomenon of information exchange is exactly what William Cook describes
in his article. However, because the ``hackers'' have apparently built or
made use of a highly efficient communications medium they have been able to
advance as quick as corporations which have failed to take devote resources
to advance their informational security. The corporate security departments
should make use of the same hacker communication techniques to work on their
problems and see their use of the ``frightening power'' of information lead
to secure computer systems.

The Communications Fraud Control Association (CFCA) in its published FRAUD
ALERT of June 21, 1990, is concerned that the government may not be able to
stop computer crime, if several organizations promising funding for legal
defense follow through. At risk is the review of several federal and state
statutes for compliance with constitutional guidelines. To date, even with
the presence of one such rights organization, the EFF<M^><MI^>*2, in at least
two federal cases, such a review has thus far been thwarted.

In short, we see the CFCA's position as allowing only two choices: 1) violate
the rights of hackers in order to obtain convictions, or 2) the world will be
runover by a rampage of hacking activities.

Two decades ago, the same problems, but with slightly different technology
was showing its ugly face. The related article in this issue ``The Death of
the Blue Box'' overviews the legal difficulties the government had in
prosecuting those stealing telecommunications services.

Ultimately, the law enforcement efforts to stop blue boxers were by all
practical means of measurement a complete failure. Only a handful of
thousands of offenses were prosecuted. Those prosecutions proved to have no
deterrent effect on others. Just as we will see that the few recent computer
hacker prosecutions will do nothing to stem the flow of current day hacking
and telecommunications fraud.

Prosecution of crimes throught to be victimless does little more than to
strengthen the resolve to not get caught in a very evoluntionary way. The
solution today is the same as it was in the blue box solution. An upgrading
of the technology will prevent the simplistic attacks that are so common. The
first step towards a technological upgrade requires an increase in the
communication between those experiencing compromise of their data.

The CFCA's COMMUNICATOR claims in the February 1990 issue of Security
Management to be the only regular journal on telecommunications crime.
Apparently overlooking, CUD, 2600 and the non defunct Phrack. That is a small
start towards the free flow of information needed by those who are looking
for security solutions for their companies.

*1 Communications Fraud Control Association (CFCA), 7921 Jones Branch Dr,
#300, McLean, Virginia 22102, Phone: (703) 848-9768, Fax: (703) 356-3701. The
association also operates a Consumer Hotline for anyone experiencing phone
fraud.

*2 EFF, The Electronic Frontier Foundation, 155 Second St, Cambridge, MA
02141, Phone: (617) 864-0665, Fax: (617) 864-0866.

The above is reprinted from Full Disclosure Newspaper. Subscribe today and
get interesting articles like the above, plus more... pictures, graphics,
advertisement, and more articles. Full Disclosure is your source for
information on the leading edge of surveillance technology. Print the
following form, or supply the information on a plain piece of paper:

----

Please start my subscription to Full Disclosure for:

[ ] Sample issue, $2.00

[ ] 12 issue subscription, $18.00

[ ] 24 issue subscription, $29.95
With 24 issue susbcription include free one of the following:
[ ] Directory of Electronic Surveillance Equipment Suppliers
[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts
[ ] Maximizing PC Performance

Also available separately:

[ ] Directory of Electronic Surveillance Equipment Suppliers, $6.00

[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts, $5.00

[ ] Maximizing PC Performance, $6.00

Illinois residences, add 6.5% sales tax on above 3 items.

Enclosed is payment in the form of:

[ ] Check/Money order, [ ] Visa, [ ] Mastercard

Card no:___________________________________ Exp date:_______

Signature:__________________________________________________

Phone:______________________________________________________
(required for credit card orders)

My name/address:

Name:_______________________________________________________

Street:_____________________________________________________

City/State/Zip:_____________________________________________

Return to: Full Disclosure, Box 903, Libertyville, Illinois 60048



 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Ed & Elaine Brown * Shots Fired *
george galloway what do you think of him?
Hinchey Amendment
why UK accepts US subjugation and infiltration?
George galloway suspended from HP
Why Marxism IS Economically Exploitive...
Situation in Turkey
Putin not playing nicely
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS