Maximum Security:
A Hacker's Guide to Protecting Your Internet Site and Network
31
Reality Bytes: Computer Security and the Law
This chapter discusses law as it applies to the Internet both here and abroad.
For the most part, my analysis is aimed toward the criminal law governing the Internet.
The United States
My timeline begins in 1988 with United States v. Morris, the case of the
Internet worm. I should, however, provide some background, for many cases preceded
this one. These cases defined the admittedly confused construct of Internet law.
Phreaks
If you remember, I wrote about phone phreaks and their quest to steal telephone
service. As I explained, it would be impossible to identify the precise moment in
which the first phreak hacked his or her way across the bridge to the Internet. At
that time, the network was still referred to as the ARPAnet.
Concrete evidence of phreaks accessing ARPAnet can be traced (at least on the
Net) to 1985. In November of that year, the popular, online phreaking magazine Phrack
published its second issue. In it was a list of dialups from the ARPAnet and several
military installations.
Cross Reference: The list of dialups from
ARPAnet can be found in Phrack, Volume One, Issue Two, "Tac Dialups taken
from ARPAnet," by Phantom Phreaker. Find it on the Net at http://www.fc.net/phrack/files/p02/p02-1.html.
By 1985, this activity was being conducted on a wholesale basis. Kids were trafficking
lists of potential targets, and networks of intruders began to develop. For bright
young Americans with computers, a whole new world presented itself; this world was
largely lawless.
But the story goes back even further. In 1981, a group of crackers seized control
of the White House switchboard, using it to make transatlantic telephone calls. This
was the first in a series of cases that caught the attention of the legislature.
The majority of sites attacked were either federal government sites or sites that
housed federal interest computers. Although it may sound extraordinary, there was,
at the time, no law that expressly prohibited cracking your way into a government
computer or telecommunication system. Therefore, lawmakers and the courts were forced
to make do, applying whatever statute seemed to closely fit the situation.
As you might expect, criminal trespass was, in the interim, a popular charge.
Other common charges were theft, fraud, and so forth. This all changed, however,
with the passing of the Computer Fraud and Abuse Act of 1986. Following the enactment
of that statute, the tables turned considerably. That phenomenon began with U.S.
v. Morris.
United States of America v. Robert Tappan Morris
The Internet worm incident (or, as it has come to be known, the Morris Worm) forever
changed attitudes regarding attacks on the Internet. That change was not a gradual
one. Organizations such as CERT, FIRST, and DDN were hastily established in the wake
of the attack to ensure that something of such a magnitude could never happen again.
For the security community, there was vindication in Morris' conviction. Nonetheless,
the final decision in that case would have some staggering implications for hackers
and crackers alike.
The government took the position that Morris had violated Section 2(d) of the
Computer Fraud and Abuse Act of 1986, 18 U.S.C. 1030(a)(5)(A)(1988). That act targeted
a certain class of individual:
- ...anyone who intentionally accesses without authorization a category of computers
known as "[f]ederal interest computers" and damages or prevents authorized
use of information in such computers, causing loss of $1,000 or more...
For those of you who aren't attorneys, some explanation is in order. Most criminal
offenses have several elements; each must be proven before a successful case can
be brought against a defendant. For example, in garden-variety civil fraud cases,
the chief elements are
- That the defendant made a false representation
- That the defendant knew the representation was false
- That he or she made it with intent that the victim would rely on it
- That the victim did rely on the representation
- That the victim suffered damages because of such reliance
If a plaintiff fails to demonstrate even one of these elements, he or she loses.
For example, even if the first four elements are there, if the victim lost nothing
in the fraud scheme, no case will lie (that is, no case brought upon such a claim
will successfully survive a demurrer hearing).
NOTE: This is different from criminal
law. In criminal law, even if the fifth element is missing, the defendant can still
be tried for fraud (that is, damages are not an essential requirement in a criminal
fraud case).
To bring any case to a successful conclusion, a prosecutor must fit the fact pattern
of the case into the handful of elements that comprise the charged offense. For example,
if intent is a necessary element, intent must be proven. Such elements form the framework
of any given criminal information filing. The framework of the Morris case was based
on the Computer Fraud and Abuse Act of 1986. Under that act, the essential elements
were
- That Morris intentionally (and without authorization) accessed a computer or
computers
- That these were federal interest computers
- That in his intentional, unauthorized access of such federal interest computers,
Morris caused damage, denial of service, or losses amounting to $1,000 or more
The arguments that ultimately went to appeal were extremely narrow. For example,
there was furious disagreement about exactly what intentionally meant within
the construct of the statute:
- Morris argues that the Government had to prove not only that he intended the
unauthorized access of a federal interest computer, but also that he intended to
prevent others from using it, and thus cause a loss. The adverb "intentionally,"
he contends, modifies both verb phrases of the section. The government urges that
since punctuation sets the "accesses" phrase off from the subsequent "damages"
phrase, the provision unambiguously shows that "intentionally" modifies
only "accesses."
Morris' argument was rejected by the Court of Appeals. Instead, it chose to interpret
the statute as follows: that the mere intentional (unauthorized) access of the federal
interest computer was enough (that is, it was not relevant that Morris also intended
to cause damage). The defense countered this with the obvious argument that if this
were so, the statute was ill- conceived. As interpreted by the Court of Appeals,
this statute would punish small-time intruders with the same harsh penalties as truly
malicious ones. Unfortunately, the court didn't bite. Compare this with the UK statutes
discussed later, where intent is definitely a requisite.
The second interesting element here is the requirement that the attacked computers
be federal interest computers. Under the meaning of the act, a federal interest computer
was any computer that was intended:
- ...exclusively for the use of a financial institution or the United States Government,
or, in the case of a computer not exclusively for such use, used by or for a financial
institution or the United States Government, and the conduct constituting the offense
affects such use; or which is one of two or more computers used in committing the
offense, not all of which are located in the same State.
The first and second requirements were exclusive. The following description was
a second paragraph:
- ...which is one of two or more computers used in committing the offense, not
all of which are located in the same State.
In other words, from the government's point of view, any two or more computers
located in different states were federal interest computers within the construct
of the act. This characterization has since been amended so that the term now applies
to any action undertaken via a computer in interstate commerce. This naturally has
broad implications and basically reduces the definition to any computer attached
to the Internet. Here is why:
The legal term interstate commerce means something slightly different from
what it means in normal speech. The first concrete legal applications of the term
in the United States followed the passing of the Sherman Act, a federal antitrust
bill signed by President Benjamin Harrison on July 2, 1890. The act forbade restraint
of "...trade or commerce among the several states, or with foreign nations."
As defined in Blacks Law Dictionary (an industry standard), interstate commerce is
- Traffic, intercourse, commercial trading, or the transportation of persons or
property between or among the several states of the Union, or from or between points
in one state and points in another state...
From this, one might conclude that interstate commerce is only conducted when
some physical, tangible good is transferred between the several states. That is erroneous.
The term has since been applied to every manner of good and service. In certain types
of actions, it is sufficient that only the smallest portion of the good or service
be trafficked between the several states. For example, if a hospital accepts patients
covered by insurance carriers located beyond the borders of the instant state, this
is, by definition, interstate commerce. This is so even if the patient and the hospital
are located within the same state.
However, there are limitations with regard to the power of Congress to regulate
such interstate commerce, particularly if the activity is intrastate but has only
a limited effect on interstate commerce. For example, in A. L. A. Schecter Poultry
Corp. v. United States (1935), the Supreme Court:
- ...characterized the distinction between direct and indirect effects of intrastate
transactions upon interstate commerce as "a fundamental one, essential to the
maintenance of our constitutional system." Activities that affected interstate
commerce directly were within Congress' power; activities that affected interstate
commerce indirectly were beyond Congress' reach. The justification for this formal
distinction was rooted in the fear that otherwise "there would be virtually
no limit to the federal power and for all practical purposes we should have a completely
centralized government."
In any event, for the moment, the statute is sufficiently broad that the government
can elect to take or not take almost any cracking case it wishes, even if the attacking
and target machines are located within the same state. And from inside experience
with the federal government, I can tell you that it is selective. Much depends on
the nature of the case. Naturally, more cracking cases tend to pop up in federal
jurisdiction, primarily because the federal government is more experienced in such
investigations. Many state agencies are poorly prepared for such cases. In fact,
smaller county or borough jurisdictions may have never handled such a case.
This is a training issue more than anything. More training is needed at state
and local levels in such investigations and prosecutions. These types of trials can
be expensive and laborious, particularly in regions where the Internet is still a
new phenomenon. If you were a prosecutor, would you want to gamble that your small-town
jury--members of which have little practical computer experience--will recognize
a crime when they hear it? Even after expert testimony? Even though your officers
don't really understand the basic nuts and bolts of the crime? Think again. In the
past, most crackers have been stupid enough to confess or plea bargain. However,
as cracking becomes more of a crime of financial gain, plea bargains and confessions
will become more rare. Today, cracking is being done by real criminals. To them,
the flash of a badge doesn't mean much. They invoke their Fifth Amendment rights
and wait for their lawyer.
Cross Reference: You can find the full
text version of the Computer Fraud and Abuse Act of 1986 at http://www.law.cornell.edu/uscode/18/1030.html.
On the question of damages in excess of $1,000, this is a gray area. Typically,
statutes such as the Computer Fraud and Abuse Act allow for sweeping interpretations
of damages. One can claim $1,000 in damages almost immediately upon an intrusion,
even if there is no actual damage in the commonly accepted sense of the word. It
is enough if you are forced to call in a security team to examine the extent of the
intrusion.
This issue of damage has been hotly debated in the past and, to the government's
credit, some fairly stringent guidelines have been proposed. At least on a federal
level, there have been efforts to determine reliable formulas for determining the
scope of damage and corresponding values. However, the United States Sentencing Commission
has granted great latitude for higher sentencing, even if damage may have been (however
unintentionally) minimal:
- In a case in which a computer data file was altered or destroyed, loss can be
measured by the cost to restore the file. If a defendant intentionally or recklessly
altered or destroyed a computer data file and, due to a fortuitous circumstance,
the cost to restore the file was substantially lower than the defendant could reasonably
have expected, an upward departure may be warranted. For example, if the defendant
intentionally or recklessly damaged a valuable data base, the restoration of which
would have been very costly but for the fortuitous circumstance that, unknown to
the defendant, an annual back-up of the data base had recently been completed thus
making restoration relatively inexpensive, an upward departure may be warranted.
This to me seems unreasonable. Defendants ought to be sentenced according to the
actual damage they have caused. What would have been, could have been, and should
have been are irrelevant. If the intention of the commission is that the loss be
measured by the cost to restore the file, this upward departure in sentencing is
completely inconsistent. Effectively, a defendant could be given a longer prison
sentence not for what he did but what he could have done. Thus, this proposed amendment
suggests that the actual loss has no bearing on the sentence, but the sentencing
court's likely erroneous notion of the defendant's intent (and his knowledge of the
consequences of his actions) does.
At any rate, most states have modeled their computer law either on the Computer
Fraud and Abuse Act or on principles very similar. The majority treat unauthorized
access and tampering, and occasionally, some other activity as well.
California
California is the computer crime and fraud capital of the world. On that account,
the Golden State has instituted some very defined laws regarding computer cracking.
The major body of this law can be found in California Penal Code, Section 502. It
begins, like most such statutes, with a statement of intent:
- It is the intent of the Legislature in enacting this section to expand the degree
of protection afforded to individuals, businesses, and governmental agencies from
tampering, interference, damage, and unauthorized access to lawfully created computer
data and computer systems. The Legislature finds and declares that the proliferation
of computer technology has resulted in a concomitant proliferation of computer crime
and other forms of unauthorized access to computers, computer systems, and computer
data. The Legislature further finds and declares that protection of the integrity
of all types and forms of lawfully created computers, computer systems, and computer
data is vital to the protection of the privacy of individuals as well as to the well-being
of financial institutions, business concerns, governmental agencies, and others within
this state that lawfully utilize those computers, computer systems, and data.
Cross Reference: Visit http://www.leginfo.ca.gov/
to see the California Penal Code, Section 502 in full.
The statute is comprehensive. It basically identifies a laundry list of activities
that come under its purview, including but not limited to any unauthorized action
that amounts to intrusion or deletion, alteration, theft, copying, viewing, or other
tampering of data. The statute even directly addresses the issue of denial of service.
The penalties are as follows:
- For simple unauthorized access that does not amount to damage in excess of $400,
either a $5,000 fine or one year in imprisonment or both
- For unauthorized access amounting to actual damage greater than $400, a $5,000
fine and/or terms of imprisonment amounting to 16 months, two years, or three years
in state prison or one year in county jail
As you might expect, the statute also provides for comprehensive civil recovery
for the victim. Parents should take special note of subsection (e)1 of that title:
- For the purposes of actions authorized by this subdivision, the conduct of an
unemancipated minor shall be imputed to the parent or legal guardian having control
or custody of the minor...
That means if you are a parent of a child cracking in the state of California,
you (not your child) shall suffer civil penalties.
Another interesting element of the California statute is that it provides for
possible jurisdictional problems that could arise. For example, say a user in California
unlawfully accesses a computer in another state:
- For purposes of bringing a civil or a criminal action under this section, a person
who causes, by any means, the access of a computer, computer system, or computer
network in one jurisdiction from another jurisdiction is deemed to have personally
accessed the computer, computer system, or computer network in each jurisdiction.
I do not know how many individuals have been charged under 502, but I would suspect
relatively few. The majority of computer cracking cases seem to end up in federal
jurisdiction.
Texas
In the state of Texas, things are a bit less stringent (and far less defined)
than they are in California. The Texas Penal Code says merely this:
- A person commits an offense if the person knowingly accesses a computer, computer
network, or computer system without the effective consent of the owner.
Cross Reference: Find the Texas Penal
Code on the Web at http://www.capitol.state.tx.us/statutes/pe/pe221.htm.
In all instances where the defendant's actions are undertaken without the intent
"to obtain a benefit or defraud or harm another," the violation is a Class
A misdemeanor. However, if the defendant's actions are undertaken with such intent,
this can be a state jail felony (if the amount is $20,000 or less) or a felony in
the third degree (if the amount exceeds $20,000).
There is one affirmative defense:
- It is an affirmative defense to prosecution under Section 33.02 that the actor
was an officer, employee, or agent of a communications common carrier or electric
utility and committed the proscribed act or acts in the course of employment while
engaged in an activity that is a necessary incident to the rendition of service or
to the protection of the rights or property of the communications common carrier
or electric utility.
It is also interesting to note that the term access is defined within the
construct of the statute to mean the following:
- ...to approach, instruct, communicate with, store data in, retrieve or intercept
data from, alter data or computer software in, or otherwise make use of any resource
of a computer, computer system, or computer network.
Does this suggest that scanning the TCP/IP ports of a computer in Texas is unlawful?
I believe that it does, though the statute has probably not been used for this purpose.
Other States
Most other states have almost identical laws. Nevertheless, there are a few special
points that I would like to focus on, by state. Some are interesting and others are
amusing. Table 31.1 offers a few examples.
Table 31.1. Interesting United States computer crime
provisions.
State |
Provision |
Alaska |
One can commit the crime of (and be subject to punishment for) deceiving a machine.
This is so even though a machine is neither a sentient being nor capable of perception.
Hmmm. |
Connecticut |
Provides for criminal and civil penalties for disruption of computer services (even
the degradation of such services). Clearly, ping and syn_flooding are therefore crimes
in Connecticut. |
Georgia |
Crackers, take note: Do not perform your cracking in the state of Georgia. The penalties
are stiff: 15 years and a $50,000 fine. Ouch. |
Hawaii |
The system breaks unauthorized use and access into two different categories, and
each category has three degrees. Just taking a look inside a system is a misdemeanor.
Fair enough. |
Minnesota |
This state has a special subdivision that provides for penalties for individuals
who create or use destructive computer programs. |
Information about computer crime statutes can be obtained from the Electronic
Frontier Foundation. EFF maintains a list of computer crime laws for each state.
Of particular interest is that according to the EFF's compilation, as of May 1995,
the state of Vermont had no specific provisions for computer crimes. This would either
suggest that very little cracking has been done in Vermont or, more likely, such
crimes are prosecuted under garden-variety trespassing-theft laws.
Cross Reference: EFF's Web site is located
at http://www.eff.org/. EFF's list of computer crime laws for each state
(last updated in May, 1995) can be found at http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Legal/comp_crime_us_state.laws.
The Law in Action
Despite the often harsh penalties for computer crimes, crackers are rarely sentenced
by the book. The average sentence is about one year. Let's take a look at a few such
cases:
- A New York youngster named Mark Abene (better known as Phiber Optik) compromised
key networks, including one division of Bell Telephone and a New York television
station. A United States District Court sentenced Abene to one year in prison. (That
sentence was handed down in January 1994.) Abene's partners in crime also received
lenient sentences, ranging from a year and a day to six months in federal prison.
- John Lee, a young student in New York, was sentenced to a year and a day in federal
prison after breaching the security of several telecommunications carriers, an electronics
firm, and a company that designed missiles.
To date, the longest period spent in custody by an American cracker was served
by Californian Kevin Poulsen. Poulsen was unfortunate enough to crack one site containing
information that was considered by the government to be defense related. He was therefore
charged under espionage statutes. Poulsen was held for approximately five years,
being released only this past year after shaking those spying charges. As reported
in the L.A. Times:
- ...the espionage charge was officially dropped Thursday as part of the agreement
crafted by Poulsen's lawyer and the U.S. attorney's office. In exchange, he pleaded
guilty to charges of possessing computer access devices, computer fraud, and the
use of a phony Social Security card, according to his defense attorney, Paul Meltzer.
There is a strong unwillingness by federal courts to sentence these individuals
to the full term authorized by law. This is because, in many instances, to do so
would be an injustice. Security personnel often argue that cracking into a network
is the ultimate sin, something for which a cracker should never be forgiven. These
statements, however, are coming from individuals in constant fear that they are failing
at their basic occupation: securing networks. Certainly, any security expert whose
network comes under successful attack from the void will be angry and embarrassed.
Shimomura, oddly enough, has recovered nicely. (This recovery is no doubt therapeutic
for him as well, for he produced a book that had national distribution.) But the
basic fact remains: One of the most talented security specialists in the world was
fleeced by Kevin Mitnik. It is irrelevant that Mitnik was ultimately captured. The
mere fact that he cracked Shimomura's network is evidence that Shimomura was dozing
on the job. So, statements from security folks about sentencing guidelines should
be taken with some reservation.
In reality, the previous generation of crackers (and that includes Mitnik, who
was not yet old enough to drive when he began) were not destructive. They were an
awful nuisance perhaps, and of course, telephone service was often stolen. However,
damage was a rare aftermath. In contrast, the new generation cracker is destructive.
Earlier in this book, I discussed a university in Hawaii that was attacked (the university
left a gaping hole in its SGI machines). In that case, damage was done and significant
effort and costs were incurred to remedy the problem. Similarly, the theft of source
code from Crack Dot Com (the makers of the awesome computer game, Quake) was malicious.
This shift in the character of the modern cracker will undoubtedly trigger stiffer
sentences in the future. Social and economic forces will also contribute to this
change. Because the network is going to be used for banking, I believe the judiciary
will take a harsher look at cracking. Nonetheless, something tells me that American
sentences will always remain more lenient than those of, say, China.
China
China has a somewhat harsher attitude towards hackers and crackers. For example,
in 1992, the Associated Press reported that Shi Biao, a Chinese national, managed
to crack a bank, making off with some $192,000. He was subsequently apprehended and
convicted. His sentence? Death. Mr. Biao was executed in April, 1993. (Note to self:
Never crack in China.)
In any event, the more interesting features of China's laws expressly related
to the Internet can be found in a curious document titled The Provisional Regulation
on the Global Connection via Computer Information Network by the People's Republic
of China. In the document, several things become immediately clear. First, the
Chinese intend to control all outgoing traffic. They have therefore placed certain
restrictions on how companies can connect:
- A computer network will use the international telecommunications paths provided
by the public telecommunications operator of the Bureau of Posts and Telecommunications
when accessing the Internet directly. Any sections or individuals will be prohibited
from constructing and using independent paths to access the Internet.
Moreover, the Chinese government intends to intercept and monitor outgoing traffic:
- The existing interconnected networks will go through screening and will be adjusted
when necessary in accordance with the regulations of the State Council, and will
be placed under the guidance of the Bureau of Posts and Telecommunications. Construction
of a new interconnected network will require a permission from the State Council.
Cross Reference: The Provisional Regulation
on the Global Connection via Computer Information Network by the People's Republic
of China can be found on the Web at http://www.smn.co.jp/topics/0087p01e.html.
The Chinese intend to implement these controls in a hierarchical fashion. In their
scheme, interconnected networks are all screened through the government communications
infrastructure. All local networks are required to patch into these interconnected
networks. Lastly, all individuals must go through a local network. Through this scheme,
they have effectively designed an information infrastructure that is easily monitored.
At each stage of the infrastructure are personnel responsible for that stage's network
traffic.
Moreover, there are provisions prohibiting the traffic of certain materials. These
prohibitions naturally include obscene material, but that is not all. The wording
of the article addressing such prohibitions is sufficiently vague, but clear enough
to transmit the true intentions of the State:
- Furthermore, any forms of information that may disturb public order or considered
obscene must not be produced, reproduced, or transferred.
Reportedly, the Chinese government intends to erect a new Great Wall of China
to bar the western Internet. These reports suggest that China will attempt to filter
out dangerous western ideology.
China is not alone in its application of totalitarian politics to the Internet
and computers. Let's have a look at Russia.
Russia and the CIS
President Yeltsin issued Decree 334 on April 3, 1995. That decree granted extraordinary
power to the Federal Agency of Government Communications and Information (FAPSI).
The decree prohibits:
- ...within the telecommunications and information systems of government organizations
and enterprises the use of encoding devices, including encryption methods for ensuring
the authenticity of information (electronic signature) and secure means for storing,
treating and transmitting information...
The only way that such devices can be used is upon review, recommendation, and
approval of FAPSI. The decree also prohibits:
- ...legal and physical persons from designing, manufacturing, selling and using
information media, and also secure means of storing, treating and transmitting information
and rendering services in the area of information encoding, without a license from
FAPSI.
In the strictest terms, then, no Russian citizen shall design or sell software
without a license from this federal agency, which in fact acts as information police.
American intelligence sources have likened FAPSI to the NSA. As the article "Russian
Views on Information-Based Warfare" by Timothy L. Thomas notes:
- FAPSI appears to fulfill many of the missions of the U.S. National Security Agency.
It also fights against domestic criminals and hackers, foreign special services,
and "information weapons" that are for gaining unsanctioned access to information
and putting electronic management systems out of commission, and for enhancing the
information security of one's own management systems.
Cross Reference: "Russian Views on
Information-Based Warfare" can be found on the Web at http://www.cdsar.af.mil/apj/thomas.html.
Despite this cloak-and-dagger treatment of the exchange of information in Russia
(the Cold War is over, after all), access in Russia is growing rapidly. For example,
it is reported in Internetica in an article by Steve Graves that even CompuServe
is a large ISP within the Russian Federation:
- CompuServe, the largest American online service, has local access numbers in
more than 40 Russian cities, ranging from Moscow and St. Petersburg to Vladivostok.
Access is provided through SprintNet, which adds a surcharge to the connect-time
rate. Although CompuServe itself does not charge any more for connections than it
does in the U.S., the maximum connection speed is 2400 baud, which will greatly increase
the time required for any given access, particularly if Windows-based software is
used.
Cross Reference: Access Steve Graves's
article at http://www.boardwatch.com/mag/96/feb/bwm19.htm.
Despite Mr. Yeltsin's decrees, however, there is a strong cracker underground
in Russia. Just ask CitiBank. The following was reported in The St. Petersburg
Times:
- Court documents that were unsealed Friday show that Russian computer hackers
stole more than $10-million from Citibank's electronic money transfer system last
year. All but $400,000 of that has been recovered, says a CitiBank spokeswoman. None
of the bank's depositors lost any money in the fraud but since it happened, Citibank
has required customers to use an electronic password generator for every transfer.
The hackers' 34-year-old ringleader was arrested in London three months ago, and
U.S. officials have filed to have him extradited to the United States to stand trial.
Unfortunately, there is relatively little information on Russian legislation regarding
the Internet. However, you can bet that such legislation will quickly emerge.
The EEC (European Economic Community)
In this section, I address European attitudes and laws concerning computers and
the Internet. Nonetheless, although the United Kingdom is indeed a member of the
European Union, I will treat them separately. This section, then, refers primarily
to generalized EU law and proposals regarding continental Europe.
It is interesting to note that European crackers and hackers often have different
motivations for their activities. Specifically, European crackers and hackers tend
to be politically motivated. An interesting analysis of this phenomenon was made
by Kent Anderson in his paper "International Intrusions: Motives and Patterns":
- Close examination of the motivation behind intrusions shows several important
international differences: In Europe, organized groups often have a political or
environmental motive, while in the United States a more "anti-establishment"
attitude is common, as well as simple vandalism. In recent years, there appears to
be a growth in industrial espionage in Europe while the United States is seeing an
increase in criminal (fraud) motives.
Cross Reference: Find "International
Intrusions: Motives and Patterns" on the Web at http://www.aracnet.com/~kea/Papers/paper.shtml.
For these reasons, treatment of Internet cracking and hacking activity in Europe
is quite different from that in the United States. A recent case in Italy clearly
demonstrates that while freedom of speech is a given in the United States, it is
not always so in Europe.
Reportedly, a bulletin board system in Italy that provided gateway access to the
Internet was raided in February, 1995. The owners and operators of that service were
subsequently charged with some fairly serious crimes, as discussed by Stanton McCandlish
in his article "Scotland and Italy Crack Down on `Anarchy Files'":
- ...the individuals raided have been formally charged with terroristic subversion
crimes, which carry severe penalties: 7-15 years in prison...The BITS BBS [the target]
carried a file index of materials available from the Spunk [underground BBS] archive
(though not the files themselves), as well as back issues of Computer Underground
Digest (for which EFF itself is the main archive site), and other political and non-political
text material (no software).
Cross Reference: Mr. McCandlish's article
can be found on the Web at http://www.eff.org/pub/Legal/Foreign_and_local/UK/Cases/BITS-A-t-E_Spunk/eff_raids.article.
This might sound confusing, so let me clarify: The files that prompted the raid
(and subsequent indictments) were the type that thousands of Web sites harbor here
in the United States, files that the FBI would not think twice about. An interesting
side note: In the wake of the arrests, a British newspaper apparently took great
license in reporting the story, claiming that the "anarchy" files being
passed on the Internet and the targeted BBS systems were endangering national security
by instructing mere children to overthrow the government. The paper was later forced
to retract such statements.
Cross Reference: To read some of those
statements, see the London Times article "Anarchists Use Computer Highway
for Subversion" by Adrian Levy and Ian Burrell at http://www.eff.org/pub/Legal/Foreign_and_local/UK/Cases/BITS-A-t-E_Spunk/uk_net_anarchists.article.
In any event, the Europeans are gearing up for some Orwellian activity of their
own. In a recent report to the Council of Europe, proposals were made for techniques
dealing with these new technologies:
- In view of the convergence of information technology and telecommunications,
law pertaining to technical surveillance for the purpose of criminal investigations,
such as interception of telecommunications, should be reviewed and amended, where
necessary, to ensure their applicability. The law should permit investigating authorities
to avail themselves of all necessary technical measures that enable the collection
of traffic data in the investigation of crimes.
European sources are becoming increasingly aware of the problem of crackers, and
there is a strong movement to prevent cracking activity. No member country of the
Union has been completely untouched. The French, for example, recently suffered a
major embarrassment, as detailed in the article "French Navy Secrets Said Cracked
by Hackers," which appeared in Reuters:
- Hackers have tapped into a navy computer system and gained access to secret French
and allied data, the investigative and satirical weekly Le Canard Enchaine
said...Hackers gained access to the system in July and captured files with acoustic
signatures of hundreds of French and allied ships. The signatures are used in submarine
warfare to identify friend and foes by analyzing unique acoustic characteristics
of individual vessels.
The United Kingdom
The United Kingdom has had its share of computer crackers and hackers (I personally
know one who was recently subjected to police interrogation, search and seizure).
Many UK sources suggest that English government officials take a decidedly knee-jerk
reaction to computer crimes. However, the UK's main body of law prohibiting cracking
(based largely on Section 3(1) of the Computer Misuse Act of 1990) is admittedly
quite concise. It covers almost any act that could be conceivably undertaken by a
cracker. That section is written as follows (the text is converted to American English
spelling conventions and excerpted from an article by Yaman Akdeniz):
- A person is guilty of an offense if (a) he does any act which causes an unauthorized
modification of the contents of any computer; and (b) at the time when he does the
act he has the requisite intent and the requisite knowledge.
You will notice that intent is a requisite element here. Thus, performing an unauthorized
modification must be accompanied by intent. This conceivably could have different
implications than the court's interpretation in the Morris case.
A case is cited under that act against an individual named Christopher Pile (also
called the Black Baron), who allegedly released a virus into a series of networks.
Pile was charged with (and ultimately convicted of) unlawfully accessing, as well
as damaging, computer systems and data. The sentence was 18 months, handed down in
November of 1995. Pile is reportedly the first virus author ever convicted under
the act.
Akdeniz's document reports that English police have not had adequate training
or practice, largely due to the limited number of reported cases. Apparently, few
companies are willing to publicly reveal that their networks have been compromised.
This seems reasonable enough, though one wonders why police do not initiate their
own cracking teams to perform simulations. This would offer an opportunity to examine
the footprint of an attack. Such experience would likely prove beneficial to them.
Finland
Finland has traditionally been known as very democratic in its application of
computer law. At least, with respect to unauthorized snooping, cracking, and hacking,
Finland has made attempts to maintain a liberal or almost neutral position regarding
these issues. Not any more. Consider this statement, excerpted from the report "Finland
Considering Computer Virus Bill" by Sami Kuusela:
- Finnish lawmakers will introduce a bill in the next two weeks that would criminalize
spreading computer viruses--despite the fact that many viruses are spread accidentally--This
means that if someone in Finland brings a contaminated diskette to his or her workplace
and doesn't check it with an anti-virus program, and the virus spreads into the network,
the person will have committed a crime. It would also be considered a crime if a
virus spreads from a file downloaded from the Internet.
Cross Reference: Check out http://www.wired.com/news/politics/story/2315.html
to see Kuusela's report.
At this stage, you can undoubtedly see that the trend (in all countries and jurisdictions)
is aimed primarily at the protection of data. Such laws have recently been drafted
as proposals in Switzerland, the UK, and the United States.
This trend is expected to continue and denotes that computer law has come of age.
Being now confronted with hackers and crackers across the globe, these governments
have formed a type of triage with respect to Internet and computer laws. At this
time, nearly all new laws appear to be designed to protect data.
Free Speech
Users may erroneously assume that because the Communications Decency Act died
a horrible death in Pennsylvania, all manners of speech are free on the Internet.
That is false. Here are some examples:
- Hate crimes and harassment are against the law--In 1995, an individual at the
University of Irvine in California was indicted for such activity. According to the
article "Ex-student Indicted for Alleged Hate Crime in Cyberspace," prosecutors
alleged that the student sent "...a threatening electronic message to about
60 University of California, Irvine, students on Sept. 20." The student was
therefore "...indicted on 10 federal hate-crime charges for allegedly sending
computer messages threatening to kill Asian students."
Cross Reference: Visit http://www.nando.net/newsroom/ntn/info/111496/info15_1378.html
to see the article "Ex-student Indicted for Alleged Hate Crime in Cyberspace."
- Forwarding threats to the President is unlawful--In one case, a man was arrested
for sending messages to the President, threatening to kill him. In another, less
controversial case, seventh graders were arrested by the Secret Service for telling
Mr. Clinton that his "ass" was "theirs."
In reference to harassment and racial slurs, the law already provides a standard
that may be (and has been) applied to the Internet. That is the Fighting Words
Doctrine, which seems to revolve primarily around the requirement that the words
must be specifically directed toward an individual or individuals. Merely stating
that "all blondes are stupid" is insufficient.
The Fighting Words Doctrine can be understood most clearly by examining Vietnamese
Fisherman's Ass'n v. Knights of the Ku Klux Klan. The case revolved around repeated
harassment of Vietnamese fisherman by the KKK in Galveston Bay. The situation involved
the KKK members approaching (by boat) a vessel containing Vietnamese fisherman. According
to Donald A. Downs in his article "Racial Incitement Law and Policy in the United
States: Drawing the Line Between Free Speech and Protection Against Racism,"
the KKK:
- ...wore full military regalia and hoods on their faces, brandished weapons and
hung an effigy of a Vietnamese fisherman and circled within eyesight of the fisherman.
The court in that case found the actions of the KKK to amount to fighting words.
Such speech, when directed against an individual or individuals who are in some way
a captive audience to those words, is not protected under the First Amendment. Similarly,
threats against the President of the United States amount to unprotected speech.
And, such threats, where they are extortive or unconditional and specific to the
person so threatened, amount to unprotected speech.
These laws and doctrines can be applied in any instance. Whether that application
is ultimately successful remains another matter. Certainly, posting such information
on a Web page or even in a Usenet group may or may not be narrow enough of a directive
to call such laws (threats to the President are the obvious, notable exceptions).
The law in this area is not entirely settled.
Summary
Internet law is a new and exciting area of expertise. Because the Internet is
of such extreme public interest, certain battles, such as the dispute over adult-oriented
material, are bound to take a decade or more. All Netizens should keep up with the
latest legislation.
Finally, perhaps a word of caution here would be wise: If you are planning to
undertake some act upon the Internet and you are unsure of its legality, get a lawyer's
opinion. Not just any lawyer, either; talk to one who really knows Internet law.
Many attorneys may claim to know Internet law, but the number that actually do is
small. This is important because the Information Superhighway is like any other highway.
You can get pulled over, get a ticket, or even go to jail.
Resources
Berne Convention For The Protection Of Literary And Artistic Works.
EFF's (Extended) Guide to the Internet--Copyright Law.
Big Dummy's Guide to the Internet--Copyright Law.
Revising the Copyright Law for Electronic Publishing.
The E-Challenge for Copyright Law.
Copyright Law FAQ (3/6): Common Miscellaneous Questions.
Copyrights, Trademarks, and the Internet. Donald M. Cameron, Tom S. Onyshko,
and W. David Castell.
New U.S. Copyright Board of Appeals Established.
Copyright Law of the United States. US Code-Title 17, Section 107. Fair
Use Clause.
Copyright Law, Libraries, and Universities: Overview, Recent Developments,
and Future Issues. Kenneth D. Crews, J.D., Ph.D. Associate Professor of Business
Law. College of Business. This is an excellent source.
Recent Caselaw and Legislative Developments in Copyright Law in the United
States.
Copyright Law and Fair Use.
The First Amendment vs. Federal Copyright Law.
Software Copyright Law.
Electronic Copyright Law in France.
U.S. Copyright Office General Information and Publications.
Copyright Clearance Center (CCC).
Copyright Reform in Canada: Domestic Cultural Policy Objectives and the Challenge
of Technological Convergence.
10 Big Myths About Copyright Explained. An attempt to answer common myths
about copyright on the Net and cover issues related to copyright and Usenet/Internet
publication.
Intellectual Property and the National Information Infrastructure.
Sources for General Information
Section 3 of the Computer Misuse Act 1990: an Antidote for Computer Viruses!
Akdeniz, Y. Web Journal of Current Legal Issues, May 24, 1996.
The Computer Fraud and Abuse Act of 1986.
Crime on the Internet.
The U.S. House of Representatives Internet Law Library Computers and the Law.
EFF "Legal Issues and Policy: Cyberspace and the Law" Archive.
New Computer Crime Statutes Close Loopholes.
Federal Guidelines for Searching and Seizing Computers. U.S. Department
of Justice Criminal Division Office of Professional Development and Training. The
Report of the Working Group on Intellectual Property Rights.
National Information Infrastructure Protection Act of 1996.
Fraud and Related Activity in Connection with Access Devices.
Digital Telephony Bill.
Computer Law Briefs.
© Copyright, Macmillan Computer Publishing. All
rights reserved.
|