Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 03 Issue 42

  



Computer underground Digest Sun, Nov 30, 1991 Volume 3 : Issue 42

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.42 ( November 30, 1991)
File 1-- Moderators' Corner
File 2-- CPSR FOIAs Secret Service
File 3-- Responses to CPSR's FOIA Requests
File 4-- Why Covert Surveillance is Wrong

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Thu, 30 Nov 91 9:39:58 EST
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1-- Moderators' Corner

We promised Sheldon Zenner's response to Bill Cook's opening statement
in the Phrack/Knight Lightning trial, but a backlog of material will
delay it for about two issues. This issue is devoted to the revelation
of Secret Service covert surveillance of legal public activity
announced by CPSR (see Craig Neidorf's file below). A lively
discussion appeared in Telecom Digest (to subscribe via e-mail,
contact moderator Pat Townson at: telecom@eecs.nwu.edu), which we
reprint for the many readers who lack Usenet access.

From information slowly emerging from FOIA requests by CPSR, Glen
Roberts (publisher of _Full Disclosure_), and CuD, it appears that the
Secret Service clearly overstepped its bounds. Gordon Meyer, co-editor
of CuD, was investigated as a "hacker" on the basis of his association
with "suspected hackers" when collecting information for his M.A.
thesis. It is clear from released files that Secret Service
investigators had little understanding of what the information they
obtained, and this led to exaggerated interpretations and demonizing
of activity that was otherwise legal.

Because cyberspace is a new frontier in which the norms and laws
governing it are still emerging, it is crucial that the limits
establishing what law enforcement may or may not do in the new frontier
be examined and debated. For those who feel that Constitutional
protections should extent into computer-mediated communication, the
Secret Service actions are of special concern.

------------------------------

Date: Fri, 22 Nov 1991 16:51:43 -0500
From: Craig Neidorf <knight@EFF.ORG>
Subject: File 2-- CPSR FOIAs Secret Service

*** *** *** *** *** *** *** *** *** *** *** *** ***

Craig Neidorf - Washington Intern
Electronic Frontier Foundation
666 Pennsylvania Avenue, SE
Suite 303
Washington, D.C. 20003
(202)544-9237 Voice
(202)547-5481 FAX

*** Attribute no comment contained in this message to the ***
*** Electronic Frontier Foundation unless explicited stated! ***

The Secret Service's response to Computer Professionals for Social
Responsibility's (CPSR) Freedom of Information Act (FOIA) request has
raised new questions about the scope and conduct of the agency's
"computer crime" investigations. The documents disclosed to CPSR
reveal that the Secret Service monitored communications sent across
the Internet. The materials released through the FOIA include copies
of many electronic newsletters, digests, and Usenet groups including
"comp.org.eff.talk," "comp.sys.att," "Computer Underground Digest"
(alt.cud.cu-digest)," "Effector Online," "Legion of Doom Technical
Journals," "Phrack Newsletter," and "Telecom Digest (comp.dcom.
telecom)". Currently, there is no clear policy for the monitoring of
network communications by law enforcement agents. A 1982 internal FBI
memorandum indicated that the Bureau would consider monitoring on a
case by case basis. That document was released as a result of a
separate CPSR lawsuit against the FBI.

Additionally, we have found papers that show Bell Labs in New Jersey
passed copies of Telecom Digest to the Secret Service.

The material (approximately 2500 pages) also suggests that the Secret
Service's seizure of computer bulletin boards and other systems may
have violated the Electronic Communications Privacy Act of 1986 and
the Privacy Protection Act of 1980.

Two sets of logs from a computer bulletin board in Virginia show that
the Secret Service obtained messages in the Spring of 1989 by use of
the system administrator's account. It is unclear how the Secret
Service obtained system administrator access. It is possible that the
Secret Service accessed this system without authorization. The more
likely explanation is that the agency obtained the cooperation of the
system administrator. Another possibility is that this may have been
a bulletin board set up by the Secret Service for a sting operation.
Such a bulletin board was established for an undercover investigation
involving pedophiles.

The documents we received also include references to the video taping
of SummerCon, a computer hackers conference that took place in St.
Louis in 1988. The Secret Service employed an informant to attend the
conference and placed hidden cameras to tape the participants. The
documents also show that the Secret Service established a computer
database to keep track of suspected computer hackers. This database
contains records of names, aliases, addresses, phone numbers, known
associates, a list of activities, and various articles associated with
each individual.

CPSR is continuing its efforts to obtain government documentation
concerning computer crime investigations conducted by the Secret
Service. These efforts include the litigation of several FOIA
lawsuits and attempts to locate individuals targeted by federal
agencies in the course of such investigations.

For additional information, contact:

dsobel@washofc.cpsr.org (David Sobel)

------------------------------

Date: Thu, 30 Nov 91 10:44: 41 CST
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 3--Responses to CPSR (Reprinted from Telecom Digest)

((Moderators' note: The following responses to the CPSR FOIA notice
appeared in Telecom Digest. The posts raise crucial issues of
monitoring public behavior in the grey area of legitimate
investigation and unacceptable law enforcement behavior).

Date: Sat, 23 Nov 1991 15:43:39 -0600
From: TELECOM Moderator <telecom>
Subject: Re: CPSR FOIAs U.S. Secret Service

In TELECOM Digest V11 #953, Craig Neidorf <knight@eff.org> tells of
efforts by the Computer Professionals For Social Responsibility to
seek out evidence of U.S. Secret Service activity relating to
investigations that agency has undertaken. TELECOM Digest was
mentioned as one electronic journal apparently examined as part of one
or more investigations. Perhaps Craig thought that seeing this journal
in the agency's files would somehow excite (or incite?) me to action.
Well, he is right. I was motivated to write this response.

> The Secret Service's response to Computer Professionals for Social
> Responsibility's (CPSR) Freedom of Information Act (FOIA) request has
> raised new questions about the scope and conduct of the agency's
> "computer crime" investigations. The documents disclosed to CPSR
> reveal that the Secret Service monitored communications sent across the
> Internet.

Since the Internet is a government-owned and managed resource in
cooperation with numerous publicly funded institutions and others, it
is fair game for anyone who wishes to 'monitor' its traffic, provided
that traffic is intended for public consumption and display, as are
the various e-journals and newsgroups.

Anyone is free -- even members of CPSR -- to interconnect with this
network and read the newsgroups or subscribe to the various
e-journals. Craig makes it sound, in his context, like the Secret
Service did something wrong. In this instance, they did not.

> The materials released through the FOIA include copies of
> many electronic newsletters, digests, and Usenet groups including
> "comp.org.eff.talk," "comp.sys.att," "Computer Underground Digest"
> (alt.cud.cu-digest)," "Effector Online," "Legion of Doom Technical
> Journals," "Phrack Newsletter," and "TELECOM Digest (comp.dcom.
> telecom)".

Well I don't know about those other guys mentioned here, but I have no
problem with TELECOM Digest being in anyone's files.

> Currently, there is no clear policy for the monitoring
> of network communications by law enforcement agents. A 1982 internal
> FBI memorandum indicated that the Bureau would consider monitoring on a
> case by case basis.

Well, why should there be a 'clear policy'? That which is available
to the public is available to anyone, including employees of
government agencies. If I can read it, take offense to it and (feeling
it might be a criminal action) report it to authorities, then why
can't an employee of the Secret Service read something here, feel the
same way and report the matter? Or conversely, why can't any member
of the public read something here, be disinterested in it or bored by
it and forget the matter.

> Additionally, we have found papers that show Bell Labs in New
> Jersey passed copies of TELECOM Digest to the Secret Service.

FYI, I have numerous names on the mailing matrix for TELECOM Digest of
people associated with various government agencies, including the
Secret Service, the IRS and many others. I ask for one thing from
people who wish to subscribe: an interest in telecommunications policy
and practice; and an enthusiasm for understanding telecommunications
in an intellectually and ethically honest way. I specifically forbid
and repudiate copyright of TELECOM Digest in the hopes people will
share their understanding and ideas with others.

If Craig's implication here is that there was something sneaky about
the passing of the Digest to the Secret Service, then he is entitled
to think that way; my answer is that had I known someone at Bell Labs
was going to all that trouble (passing along issues of the Digest) I
would have added the names of the interested parties to the matrix
here, or started yet another expansion mailing list (there are
currently over 100 such expansion mailing lists serviced from the main
list here).

> Another possibility is that this may have been a bulletin board set
> up by the Secret Service for a sting operation. Such a bulletin board
> was established for an undercover investigation involving pedophiles.

I think that's an admirable goal ... investigating pedophiles.

> The documents we received also include references to the video
> taping of SummerCon, a computer hackers conference that took place in
> St. Louis in 1988. The Secret Service employed an informant to attend
> the conference and placed hidden cameras to tape the participants.

Well again, a public event is a public event. It was advertised widely
and people were invited to attend. That which can be seen with the
eyes does not become forbidden to view later through the lens of a
camera for strictly that reason alone.

> The documents also show that the Secret Service established a computer
> database to keep track of suspected computer hackers. This database
> contains records of names, aliases, addresses, phone numbers, known
> associates, a list of activities, and various articles associated with
> each individual.

Not that you would ever keep any computer database of people with
interests like your own ....:)

> CPSR is continuing its efforts to obtain government documentation
> concerning computer crime investigations conducted by the Secret
> Service. These efforts include the litigation of several FOIA lawsuits
> and attempts to locate individuals targeted by federal agencies in the
> course of such investigations.

Fine ... you do your thing. But let me make it perfectly clear you do
not speak for Patrick Townson and/or TELECOM Digest, although you may
speak for various readers of the Digest who have asked you to
represent them or speak for them. I have no problem whatsoever with
the Secret Service or any other government agency reading what I
publish here. They don't have to sneak around reading it.

> For additional information, contact:
> dsobel@washofc.cpsr.org (David Sobel)

By all means, dear readers, contact CPSR if you want more information,
but as for myself, I support government efforts to crack down on
computer crime, and electronic invasion of computers by unauthorized
users. I do not support organizations which would deny the government
the right to participate in any public forum.
Email is a whole different matter ... notice I have not mentioned it
once today. I am talking about newsgroups and public mailing lists.

Patrick Townson

++++++++++++++++++++++++++++++++++++++

Date: Sat, 23 Nov 1991 21:09 EST
From: Paul Coen <PCOEN@drew.drew.edu>
Subject: Re: CPSR FOIAs U.S. Secret Service

Sorry, Pat. While I often agree with what you say, I'm going to have
to disagree on a few points here.

> Since the Internet is a government-owned and managed resource in
> cooperation with numerous publicly funded institutions and others, it
> is fair game for anyone who wishes to 'monitor' its traffic, provided
> that traffic is intended for public consumption and display, as are
> the various e-journals and newsgroups.

That's a matter of perception. My description is that the Internet
started as a DARPA project, and quickly grew. Now, only a portion of
it is under government control. The international sites certainly
aren't. While I agree that the federal government has a vested
interest in what's on the .mil and .gov sites, or what is going over
lines that the federal government is paying for, that's not a whole
lot of the net these days. I'd certainly stop short of saying that it
is "government owned."

> Anyone is free -- even members of CPSR -- to interconnect with this
> network and read the newsgroups or subscribe to the various
> e-journals. Craig makes it sound, in his context, like the Secret
> Service did something wrong. In this instance, they did not.

You're right -- anyone is free, including the Secret Service. More on
this later, as this actually raises questions about the Secret
Service's behavior.

> Well I don't know about those other guys mentioned here, but I have no
> problem with TELECOM Digest being in anyone's files.

Yes, but did all of the people who made contributions realize that it
could end up in a file pertaining to a Secret Service investigation?

> Well, why should there be a 'clear policy'? That which is available
> to the public is available to anyone, including employees of
> government agencies. If I can read it, take offense to it and (feeling
> it might be a criminal action) report it to authorities, then why
> can't an employee of the Secret Service read something here, feel the
> same way and report the matter? Or conversely, why can't any member
> of the public read something here, be disinterested in it or bored by
> it and forget the matter.

This is a tough issue -- if the net is considered "public behavior,"
and statements made here are not criminal in nature (none in TELECOM
Digest have been to date -- ie, no credit card numbers :), then why
should it end up in a Secret Service file? Doesn't it then become
government monitoring legal public activities/statements by citizens?
Sorry, that's a bit too much like a police state for my liking, in
flavor if not degree.

> FYI, I have numerous names on the mailing matrix for TELECOM Digest of
> people associated with various government agencies, including the
> Secret Service, the IRS and many others. I ask for one thing from
> people who wish to subscribe: an interest in telecommunications policy
> and practice; and an enthusiasm for understanding telecommunications
> in an intellectually and ethically honest way. I specifically forbid
> and repudiate copyright of TELECOM Digest in the hopes people will
> share their understanding and ideas with others.

Do you really think the people who placed those excerpts in the files
were interested in telecom issues? Or in who was saying what? Not
the people who passed them on, but the "investigators." (Using the
term loosely -- Foley certainly wasn't much of an investigator IMO.)

> Not that you would ever keep any computer database of people with
> interests like your own ....:)

Of course, who knows how many people are in that database that
shouldn't be -- considering that the Secret Service seemed to think
that the statement that Kermit is a file transfer protocol used on
mainframes was so serious. I'm surprised that they haven't busted
Digital Press and confiscated the MS-Kermit User's Guide :).

> By all means, dear readers, contact CPSR if you want more information,
> but as for myself, I support government efforts to crack down on
> computer crime, and electronic invasion of computers by unauthorized
> users. I do not support organizations which would deny the government
> the right to participate in any public forum.

The problem is that you are dealing with two different entities here.
On the one hand, you have the individual government employee, who has
a right to participate in a public forum, and on the other, you have a
governmental investigation agency, represented by that individual.

Unless it clearly relates to the commission of a crime, or it falls
under the heading of "expert opinion," relating to an issue under
investigation (and no copyrights are violated), the government should
not be placing legal, public statements in the record of a criminal
investigation is out of line. Sure, they can read it -- but to place
it in that file implies that there is something wrong with the
statement. Considering law-enforcement infiltration of legal lobbying
groups who disagree with policy, and other abuses, you really have to
wonder who is more paranoid -- extreme privacy advocates who would
deny the government any role, or the agents of the government. These
folks really seem to feel that anyone is a potential threat. And
winding up, even by accident or chance, in one of their files is not a
trivial matter. It can cost you security clearance, it can cost you a
job, a promotion, or an appointment.

It's very easy for a paper-pusher to get the idea that "it's all
criminals on these here groups," based on the appearance of excerpts
in files (why else would they be there -- remember Ed Meese's
"innocent people aren't accused of crimes" comment?) -- so anyone who
posts must not be trustworthy. The government understanding of the
net is not yet mature enough to assume that they're not going to react
that way. So far, they've been pretty predictable.

Paul Coen, pcoen@drew.drew.edu, pcoen@drew.bitnet

++++++++++++++++++++++++++++++++++++++

Date: Sun, 24 Nov 91 01:09 PST
From: john@zygot.ati.com (John Higdon)
Subject: Re: CPSR FOIAs U.S. Secret Service

On Nov 23 at 16:46, TELECOM Moderator writes:

> I have no problem whatsoever with
> the Secret Service or any other government agency reading what I
> publish here. They don't have to sneak around reading it.

They why do they behave in this manner? The fact is they DO sneak
around when indeed getting a subscription would be no problem at all.
After dealing with FBI and telco security types for the past couple of
years, I have come to believe that they would figure out a complex and
covert way to glean some information even if it was painted in
ten-foot high letters on Shasta Dam.

The fact of the matter is that many of these gum shoes are in way over
their heads on a lot of this computer stuff and it is a full time job
to keep from looking like the horse's ass. And most of the time they
are not successful. Secret Service and FBI types have no idea what is
"sensitive" and what is garbage. I have seen agents pore over
documents in a case that I would not even fish out of the trash. Most
amusing was watching a telco security person fawn over a box of
"evidence" that was filled with stuff supposedly "stolen" from
Pac*Bell that I would pay you to remove from my garage. It was garbage
that even Pac*Bell has not used in any way for over thirty years.

Unlike Patrick, I have little or no faith and confidence in law
enforcement when it comes to "hackers". Even the "experts" I have met
on that side of the fence tend to drool a bit and would have not a
clue concerning who and what was "dangerous" or not. For all the
seizures and raids that have occurred we have seen precious little in
terms of court action and that which actually has landed in court has
proven my point.

It is unfortunate that more enlightenment has not managed to find its
way into government's enforcement arm in the form of knowledgeable
personnel. But what can you expect when even the laws dealing with
these "crimes" are confusing and inadequate. You have policemen
enforcing laws they do not understand, serving warrants issued by
judges who have not a clue, and occasionally, courts dispensing
justice in the dark.

Until you have personally witnessed the wheels of enforcement and
justice grind away on the field of computers and telecommunications,
you cannot grasp the pitiful nature of these processes, nor comprehend
the damage that is being done to rights and protections that we all
used to take for granted. I cannot believe that Patrick would be so
gung-ho on this matter if he could see the reality of what he
euphemistically refers to as "enforcement" and "justice". It could not
be a bigger joke.

> By all means, dear readers, contact CPSR if you want more information,
> but as for myself, I support government efforts to crack down on
> computer crime, and electronic invasion of computers by unauthorized
> users.

Surely you cannot be referring to any of the efforts to date. I have
personally looked into many of these efforts, some in great detail,
and am horrified at what misguided efforts these are. To be honest,
these efforts are also as ineffective as they are unnecessarily harsh.

> I do not support organizations which would deny the government
> the right to participate in any public forum.

Since when is sneaking around obtaining covert copies of a forum's
output "participation"? I support organizations that strive to ensure
that the government operate within the framework of laws and the
constitution, regardless of how "important" and "urgent" the matters
under investigation may be represented by that government.

> Email is a whole different matter ... notice I have not mentioned it
> once today. I am talking about newsgroups and public mailing lists.

A thin line, to be sure. A line that most (if not all) enforcement
agencies have no problem crossing.

++++++++++++++++++++++++++++++++++++++

Date: Sun, 24 Nov 1991 10:22:27 -0500 (EST)
From: NIEBUHR@BNLCL6.BNL.GOV (Dave Niebuhr, BNL CCD, 516-282-3093)
Subject: Re: CPSR FOIAs U.S. Secret Service

Pat's rebuttal to Craig Neidorf's article fits my perspective 100%
when it comes to using a public access media such as Usenet. I feel
that if I put something onto it, then I'm willing to have anyone read
what I want to say.

Conversely, if I don't want anyone to see it, then I don't post it.

Good show, Pat.

++++++++++++++++++++++++++++++++++++++

From: Mike Godwin <mnemonic@eff.org>
Subject: Re: CPSR FOIAs U.S. Secret Service
Date: Sun, 24 Nov 91 11:52:16 EST

Pat writes:

> By all means, dear readers, contact CPSR if you want more
> information, but as for myself, I support government efforts to
> crack down on computer crime, and electronic invasion of computers by
> unauthorized users. I do not support organizations which would deny
> the government the right to participate in any public forum.

It should be noted that the Electronic Frontier Foundation has never
argued that there is a principled rationale for denying the government
access to public forums. Moreover, both EFF and CPSR have hosted
public forums on computer crime, civil liberties, and privacy matters
at which government representatives have been informative and
enthusiastic participants.

> But let me make it perfectly clear you do not speak for Patrick
> Townson and/or TELECOM Digest, although you may speak for various
> readers of the Digest who have asked you to represent them or speak
> for them.

This seems to me to be an odd comment. I don't know of anyone,
including Craig Neidorf, who has claimed to "speak for" TELECOM Digest
or Pat Townson.

You seem to be expressing opposition to CPSR's efforts to find out the
contours of the government's efforts to fight computer crime. This
surprises me, since I'd have thought that anyone in a democratic
society would be interested in knowing how the government is spending
our tax money -- not to mention whether some of its efforts might affect
the exercise of the Constitutional right to free speech in a public
forum.

[Telecom Moderator's Note: Readers who are interested in more information
about the Electronic Frontier Foundation and/or membership should
contact Mike Godwin <mnemonic@eff.org>. PAT]

++++++++++++++++++++++++++++++++++++++

From: mcovingt@athena.cs.uga.edu (Michael A. Covington)
Subject: Re: CPSR FOIAs U.S. Secret Service
Date: Sun, 24 Nov 91 19:08:46 GMT

In article <telecom11.953.4@eecs.nwu.edu> knight@eff.org (Craig
Neidorf) writes:

> The Secret Service's response to Computer Professionals for
> Social Responsibility's (CPSR) Freedom of Information Act (FOIA)
> request has raised new questions about the scope and conduct of the
> agency's "computer crime" investigations. The documents disclosed to
> CPSR reveal that the Secret Service monitored communications sent
> across the Internet. The materials released through the FOIA include
> copies of many electronic newsletters, digests, and Usenet groups
> including "comp.org.eff.talk," "comp.sys.att," "Computer Underground
> Digest" (alt.cud.cu-digest)," "Effector Online," "Legion of Doom
> Technical Journals," "Phrack Newsletter," and "TELECOM Digest
> (comp.dcom.telecom)". Currently, there is no clear policy for the
> monitoring of network communications by law enforcement agents.

Two of these are unfamiliar to me, but all the rest are forums which
everyone is welcome to read. You might as well complain that the
Secret Service reads your local newspaper.

Seriously, I am concerned about possible violations of people's rights
by over-zealous agents. But reading comp.dcom.telecom hardly counts
as snooping!

In article <telecom11.959.1@eecs.nwu.edu> PCOEN@drew.drew.edu (Paul
Coen) writes:

>> Anyone is free -- even members of CPSR -- to interconnect with this
>> network and read the newsgroups or subscribe to the various
>> e-journals. Craig makes it sound, in his context, like the Secret
>> Service did something wrong. In this instance, they did not.

>> Well I don't know about those other guys mentioned here, but I have no
>> problem with TELECOM Digest being in anyone's files.

> Yes, but did all of the people who made contributions realize that it
> could end up in a file pertaining to a Secret Service investigation?

This is something we have had a hard time hammering into the heads of
the users here at the University of Georgia. A newsgroup is a public
forum. Posting something in a newsgroup is like publishing it in a
major newspaper. The person posting it should expect that it will be
read by practically anybody anywhere.

"I've just posted this for 100,000 people, but don't tell anybody!" is
unfortunately a common attitude. People seem to think that the
newsgroups are some kind of underground society where everyone is
sworn to secrecy.

++++++++++++++++++++++++++++++++++++++

From: fulk@cs.rochester.edu (Mark Fulk)
Subject: Re: CPSR FOIAs U.S. Secret Service
Date: Sun, 24 Nov 1991 21:27:49 GMT

In article <telecom11.954.6@eecs.nwu.edu> telecom (TELECOM Moderator)
writes:

> In TELECOM Digest V11 #953, Craig Neidorf <knight@eff.org> tells of

...Long inclusion deleted, consult the previous articles...

I think Pat is attacking a straw man here. Craig Neidorf's posting
offered no evaluation of the purpose, danger, or legality of the
included material; Pat only assumed that CPSR/CN/EFF object to the
government keeping such files. A more appropriate response would be
"why should this matter?", since no reason for caring was offered.
I'll offer two reasons I care:

1) Further evidence that the government investigators are operating in
the dark.

2) The use by demagogues of "presence in a file" as evidence for
guilt. "Ah, yes, Mr. Townson, but we have seen your name in the FBI's
computer crimes file. Now stop telling us you don't know any credit
card thiefs." This tactic is the reason the John Birch society used
to send out postcards accusing people of being communists. The
postcards were sometimes used by HUAC as evidence of guilt. Among the
people who were the subject of such postcards were John Kenneth
Galbraith and Amitai Etzioni (they weren't investigated by HUAC).

>> was established for an undercover investigation involving pedophiles.

> I think that's an admirable goal ... investigating pedophiles.

On the surface. I must admit that I know next to nothing about
pedophilia. However, I'm fairly certain that it is a condition
requiring treatment more than a crime requiring punishment. And it
seems likely to me that the Secret Service's bulletin board would very
likely be an entrapment; would very likely result in the arrest of
people who never touch a child despite their condition; and almost
certainly will do nothing whatsoever to contribute to the safety of
children. On the other hand, an investigation of the Diocese of
Chicago would, it seems, be of great value. For some reason, that
investigation has not yet begun.

>> The documents we received also include references to the video
>> taping of SummerCon, a computer hackers conference that took place in
>> St. Louis in 1988. The Secret Service employed an informant to attend
>> the conference and placed hidden cameras to tape the participants.

> Well again, a public event is a public event. It was advertised widely
> and people were invited to attend. That which can be seen with the
> eyes does not become forbidden to view later through the lens of a
> camera for strictly that reason alone.

Not all events at a conference are public. Most of the interesting
work goes on in private meeting rooms and bedrooms. People have a
right to privacy where they might reasonably expect it; if a meeting
room is labelled private, taping there would violate privacy. Taping
in anyone's hotel room would certainly be a violation of privacy,
lacking the permission of the people present. It has been a long time
since Summercon '88 was a current topic, but I recall that the taping
occurred in someone's hotel room.

>> The documents also show that the Secret Service established a computer
>> database to keep track of suspected computer hackers. This database
>> contains records of names, aliases, addresses, phone numbers, known
>> associates, a list of activities, and various articles associated with
>> each individual.

> Not that you would ever keep any computer database of people with
> interests like your own ....:)

Again, no evaluation of the data was offered, Pat. You're barking at
the mailman. The point was to give a clear idea of the amount of effort
the Secret Service has expended. I would expect them to construct
such a database. What concerns me is the quality of information in
the database.

I think CPSR's efforts are clearly worthwhile.

>> CPSR is continuing its efforts to obtain government documentation

> Fine ... you do your thing. But let me make it perfectly clear you do
> not speak for Patrick Townson and/or TELECOM Digest, although you may

> By all means, dear readers, contact CPSR if you want more information,
> but as for myself, I support government efforts to crack down on
> computer crime, and electronic invasion of computers by unauthorized
> users. I do not support organizations which would deny the government
>the right to participate in any public forum.

The straw is flying now!

Of course the government has a right to participate in c.d.t, and to
record articles. Of course it should crack down on computer crime,
provided that in so doing it respects the Constitution and the law,
and provided (1) that the crackdown is directed at substantial crimes,
not at teenage pranks that should be dealt with by parents and
relevant local authorities, and (2) that the crackdown has some chance
of success.

The problem with Secret Service efforts is that they SEEM to be a
bunch of Keystone Kops. Since they are apparently unable to approach
the real problems, they are spending time collecting massive
quantities of irrelevant material to pad their files. I suspect that
they are also padding their suspect lists, which makes the matter of
their database of suspected hackers AND ASSOCIATES a bit of a worry.

One might ask, "How SHOULD the SS proceed?" My prescription: for
decades there have been persistent rumors of computer thefts by
insiders. The perpetrators, once caught by their employers, would be
let go for minimal restitution and silence. The SS should track some
of those rumors down, and if any turn up correct, prosecute. The
effort, of course, would be substantial. The probability of success
is not 100%. But, by all accounts known to me, this is the best way
to get at the real bulk of computer crime.

[Telecom Moderator's Note: One glaring inaccuracy in your response was your
comment that 'an investigation of (pedophilia in) the Archdiocese of
Chicago would be of great value and it has not begun.' The truth here
is that following several detailed articles in the %Chicago Sun Times%,
the %Chicago Reader%, a couple articles by myself in misc.legal which
drew considerable attention, and several news reports on television,
the 'pedophilia problem' in the Archdiocese of Chicago WAS investigated
at the church level and IS being investigated by the Cook County State's
Attorney now. During the past two weeks, six priests have been removed
from their positions, and more are expected to be removed soon. PAT]

------------------------------

Date: Mon, 25 Nov 91 01:20 CST
From: TK0JUT1@NIU.BITNET
Subject: File 4-- Why Covert Surveillance is Wrong

Criticism of Craig Neidorf's report of CPSR's investigation into
Secret Service covert surveillance of net-media, use of informants,
and other intrusive observations justifies law enforcement actions on
several grounds, including:

1) Anything public is fair game for covert surveillance.
2) People with nothing to hide shouldn't worry about what they say in
public.
3) Computer crime isn't cool, and the government has both the right
and the responsibility to target evil-doers. Therefore, law
enforcement need not have clear policies circumscribing the limits
of covert intrusion.

First, it is categorically false that *anything* done in public is
fair game for covert surveillance. As anybody from the Chicago area
should know, Judge Getzendammer (US District Court, Northern District)
made it quite clear in several rulings against the Chicago police in
political surveillance cases that covert surveillance of lawful
activity in public is not to be tolerated in a free society. Further,
anybody with even a high school civics knowledge of covert
surveillance in the US understands the distinction between legitimate
participation in a public event and participating in that event for
the purpose of collecting, analyzing, and storing information on
law-abiding citizens.

Scrounging through Usenet traffic to compile dossiers on people not
under investigation for wrongdoing is as reprehensible as targeting
license plate numbers from cars in a parking lot at an anti-nukes
rally as a way of creating a list of possible "subversives." Frank
Donner's _Protectors of Privilege_ lays out the the historical
consequences of and responses to covert law enforcement surveillance.
Blanket intrusion by agents into Constitutionally protected realms
that include freedom of speech, privacy, and assembly, are not only a
demonstrable threat to democracy -- they are not generally tolerated
by the courts.

Second, while law enforcement agents have every right to read whatever
public document they wish, this misses the point. It is not that
agents subscribe to and/or read documents. The point is what they do
with what they read. A 1977 class action suit against the Michigan
State Police learned, through FOIA requests, that state and federal
agents would peruse letters to the editor of newspapers and collect
clippings of those whose politics they did not like. These news
clippings became the basis of files on those persons that found there
way into the hands of other agencies and employers. The preliminary
CPSR information suggests that the Secret Service is conducting their
investigation in an analogous manner. This has a chilling effect on
free speech that is arguably (judging from court cases) not only
illegal, but dangerous. As somebody wrote in CuD recently:

The basis of a democratic society rests on the ability of
citizens to openly discuss competing ideas, challenge political
power and assemble freely with others. These fundamental First
Amendment rights are subverted when, through neglect, the state
fails to protect them.

Covert collection of information, whether from TELECOM Digest, CuD, or
newspaper editorials, and the subsequent compilation of secret
dossiers moves us from a democracy to a police state. The issue isn't
whether any specific person has something to hide, but rather whether
somebody might, because of secret information gathering, wish they had
hidden what they had previously said. We shouldn't have to worry
about whether what we say pleases law enforcement lest we become
entries in some database of undesireables.

Finally, few people disagree with the claim that computer crime is
wrong. But, because a given behavior is wrong hardly justifies carte
blanche to investigate that behavior. The government should have clear
policies about the scope of surveillance because it protects *all*
citizens from the dangers of intrusion by law enforcement into
Constitutionally protected behavior. Like gravity, specific
limitations on covert intrusion by law enforcement into our lives
isn't just a good idea, it's the law.

Computer-mediated communication is relatively new, and the law has not
caught up with changing technology. CPSR should be commended for its
efforts to track what appear to be clear violations of existing laws
and policies in investigation of "computer crime." There is nothing
noble in acquiescing to the erosion of Constitutionally protected
activity as those who defend the Secret Service actions seem willing
to do.

------------------------------

End of Computer Underground Digest #3.42
************************************



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT