Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 10 Issue 45

  


Computer underground Digest Sun Aug 9, 1998 Volume 10 : Issue 45
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.45 (Sun, Aug 9, 1998)

File 1--Security Researchers oppose pending copyright legislation
File 2--WIPO Letter From the InfoSec Community []
File 3--Cu Digest Header Info (unchanged since 25 Apr, 1998)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sat, 1 Aug 1998 12:04:30 -0500
From: Gene Spafford <spaf@CS.PURDUE.EDU>
Subject: File 1--Security Researchers oppose pending copyright legislation

Sat, Aug 1, 1998

LEADING SECURITY RESEARCHERS URGE CONGRESS TO RECONSIDER
PENDING COPYRIGHT LEGISLATION

Washington, DC - A group of nearly 50 of the nation's top security
researchers and practitioners have delivered a letter to Congressional
leaders urging them to reconsider provisions of controversial legislation
concerning copyright protection. Several versions of the bill, H.R. 2281
(the "Digital Millennium Act"), are currently under consideration by the
House of Representatives, and one version has already passed the Senate.
The bill would make it illegal to circumvent "technological protection
measures" that could be used to protect digital works on the Internet.
However, those same technologies are also employed to protect users against
computer viruses, perform security tests of commercial network
installaions, and conduct basic security education and research in
universities and government labs. The experts assert that if the bill is
passed in its current form, many vital forms of security testing may be
rendered illegal.

Realizing that scientists need to circumvent systems to conduct effective
research, the House Commerce Committee recently amended the bill to permit
circumvention for the puposes of encryption research. However, according to
security experts, such a provision simply does not go far enough.

"[The Commerce Committee bill] fails to further recognize that encryption
research is simply one aspect of security research, and that research is
different from actual practice. While [the bill] may exempt encryption
research, it still criminalizes other crucial techniques used in security
research and practice," wrote Eugene Spafford, the author of the letter,
and a world-leading expert in information security. "If passed in anything
similar to its present form, [the Digital Millenium Copyright Act] has the
potential to imperil computer systems and networks throughout the United
States, criminalize many current university courses and research in
information security, and severely disrupt a growing American industry in
information security technology. The result would be grave damage to the
U.S. economy and to national security."

Ironically, the letter comes at a time when security researchers are
working to alert the public to a significant security flaw found in three
of the most popular e-mail systems in use in the Internet. On Tuesday, the
U.S. Energy Department's security team issued an emergency bulletin,
confirming reports that Microsoft Outlook Express, Outlook 98, and
Netscape's Messenger Mail all contain serious security flaws. Identified,
in part, through processes of reverse engineering -- one of the techniques
that would be prohibited by the pending legislation -- the security hole
allows booby-trapped e-mail messages to cause havoc on a user's computer
system. Security researchers have noted that such serious security flaws
are often uncovered only because the public is able to freely test the
security of such programs. Public scrutiny and outcry are sometimes the
only way that such security flaws are identified and quickly fixed before
criminals can identify and exploit the flaw themselves. However, the
Digital Millenium Copyright Act could very well prohibit the processes of
public scrutiny. reverse engineering, and public notice that have
successfully identified these flaws to date.

Bruce Schneier, noted cryptography expert and author, described the
situation as "In our country there is a long tradition of consumer
advocacy. Organizations like Consumer Reports regularly evaluate products
and make those evaluations available to buyers. The WIPO provision against
encryption research would make it illegal for companies to evaluate
security products. If a company asked me which firewall was good, it would
be illegal for me to tell them. This is like the meat industry getting a
law passed making it illegal for someone to publicize that a particular
brand of hamburger has rat hair in it."

Spafford drafted the letter on Wednesday, July 29, after becoming aware of
the full import of the pending legislation. Within hours, 48 experts agreed
to act as co-signers. Spafford noted "If we had more time to solicit
supporters, we might have doubled the number of prominent names on the
letter. The community is gravely concerned that this legislation will
endanger information security in the U.S. Although we are against
violation of valid copyrights, we believe that legislation should be
designed to punish the violators rather than criminalize tools that are
also necessary to the protectors."


An electronic copy of the security researchers' letter is available at:
<http://www.cs.purdue.edu/homes/spaf/WIPO/>. Contact details and pointers
to background information are also present at this location.

------------------------------

Date: Mon, 3 Aug 1998 23:57:08 -0500
From: jthomas@VENUS.SOCI.NIU.EDU(Jim Thomas)
Subject: File 2--WIPO Letter From the InfoSec Community []

SOURCE - http://www.cs.purdue.edu/homes/spaf/WIPO/

[] WIPO Letter From the InfoSec Community []

What this is about

The World Intellectual Property Organization (WIPO) produced a new
treaty in 1996 for the protection of intellectual property. The U.S.
signed the treaty, and Congress has been considering enabling
legislation to bring U.S. law into alignment with treaty provisions.

As part of this legislative process, a number of major trade groups
and industry lobbyists have weighed in with their desires for the
legislation. It appears as if only content producers and providers
(e.g., entertainment companies and software publishers) have had
significant influence, and the resulting law is very biased in their
favor.

In particular, the law in its current form appears to:

[] Ban reverse engineering of software in almost all cases
[] Restricts or eliminates traditional fair-use provisions on
intellectual property
[] Prohibits research and production of technology that might
be used to defeat copyright protection measures
[] Criminalizes many currently accepted practices in
information security.



Thus, either directly or as unintended (?) consequences, the bill
could severely restrict what professionals can do in education,
research, and the practice of information security.

The biggest problem with the bill is that it outlaws technology and
research rather than simply criminalizing violations of copyright.
This is roughly analogous to outlawing automobiles and research into
engine design to prevent the possibility of drunk driving.

A number of prominent lawyers have reviewed this bill and communicated
their findings to me: they all agree (as much as any group of lawyers
can agree) that the bill is as dismal as I have outline here.

The bill has passed the Senate. In the House, it has passed two major
committees: Judiciary and Commerce. The Judiciary version is basically
the version that passed the Senate. The version that passed the
Commerce committee has had a few small amendments attached, including
one that exempts some encryption research from the law -- but no
general exemptions exist for other work in security.

What I Have Done About It



After consulting with personnel on the ACM's Public Policy committee
(of which I am a member), and staff of the Computing Research
Association's Washington office (I am on the board of CRA), I wrote a
letter to several members of Congress -- including the Speaker of the
House, the chairs and ranking minority members of several involved
House committees, and some key Senators. This is not a letter from
either ACM or CRA, but a letter from me as a senior security
professional.

The letter outlines why I think the law is damaging to the profession,
and encourages the Congressmen to do what they can to either have the
bill reconsidered or simply not considered on the floor of the House
this term.

I decided to ask other security professionals if they wanted to be
co-signers. 48 leading professionals agreed to add their names to the
letter, despite there being only a few days to respond.

What You Can Do



You can read my letter. If you agree with what I wrote in the letter,
then you can write your own letter to your representative and senators
expressing your opinion on the legislation. A phone call, or a
personal visit to their local offices might also be beneficial.

More Information



You can obtain more information on the Digital Millennium Act, H.R.
2281, by consulting these pages:

[] A PCWeek article on the bill
[] Background material at dfc.org
[] Material from the EFF on the bill
[] For actual text of the bill, go to Thomas and search for
'Digital Millennium Act'
[] Article from the current issue of the Chicago Lawyer

Letter Recipients Who Why

Representative Newt Gingrich Speaker

Representative Richard Armey Majority Leader

Representative Tom DeLay Majority Whip

Representative Richard Gephardt Minority Leder

Representative David E. Bonior Minority Whip

Representative Gerald B.H. Solomon Rules Committee Chair

Representative Joe Moakley Rules Committee Ranking Member

Representative Thomas J. Bliley Commerce Committee Chair

Representative John D. Dingell Commerce Committee Ranking Member

Representative W.J. "Billy" Tauzin Subcommittee on Telecommunications, Trade,
and Consumer Protection Chair

Representative Edward J. Markey Subcommittee on Telecommunications, Trade, and
Consumer Protection Ranking Member

Representative Edward Pease Representative of my District in Indiana

Representative Henry J. Hyde Judiciary Committee Chair

Representative John Conyers, Jr. Judiciary Committee Ranking Member

Representative Howard Coble Subcommittee on Courts and Intellectual Property
Chair

Representative Barney Frank Subcommittee on Courts and Intellectual Property
Ranking Member

Representative F. James Sensenbrenner, Jr. Science Committee Chair

Representative George E. Brown, Jr. Science Committee Ranking Member

Senator Orrin G. Hatch Judiciary Committee Chair

Senator Patrick J. Leahy Judiciary Committee Ranking Member

The Text of the Letter



August 1, 1998



Dear Representative/Senator X:

We, the undersigned, are a group of the nation's leading scientists
and technologists in computer and network security with (collectively)
hundreds of years of service in academia, industry and government. We
are writing to express our profound concerns about both versions of
H.R. 2281, the Digital Millennium Act. If passed in anything similar
to its present form, H.R. 2281 has the potential to imperil computer
systems and networks throughout the United States, criminalize many
current university courses and research in information security, and
severely disrupt a growing American industry in information security
technology. The result would be grave damage to the U.S. economy and
to national security. We recently became aware of provisions of this
legislation, and we are now seeking to have H.R. 2281 recast to
address our concerns, or prevented from being passed into law.

The growing use of network-based information sources does indeed
create new opportunities that require updated protections. As
producers ourselves of articles, books and software, we are in favor
of appropriate copyright regulations. However, H.R. 2281 takes an
approach that has damaging side-effects: rather than criminalizing
inappropriate actions, it would restrict technology and techniques
that have legitimate and vital uses in information security, such as
reverse-engineering. By analogy, the approach taken in 2281 is akin to
banning the development and sale of automobiles to curtail drunk
driving, or criminalization of the sale of paper and ink to prevent
the possibility of libel. While sometimes of potential use to
infringers, most information security-related technologies are also
essential for security practitioners to maintain the protection of the
public. Ironically, the provisions of H.R. 2281 may actually hinder
researchers in developing and deploying future copyright protection
technologies.

We believe that the damage that would be wrought by H.R. 2281 is
unintentional. For instance, by amending H.R. 2281 to permit
encryption research, the Commerce Committee evidenced recognition of
the great importance of that sub-field of research. However, their
version of the bill fails to further recognize that encryption
research is simply one aspect of security research, and that research
is different from actual practice. While that version of H.R. 2281 may
exempt encryption research, it still criminalizes other crucial
techniques used in security research and practice.

Here are four examples of how security practice and research consists
of much more than encryption research and depends on technologies and
techniques that H.R. 2281 would prohibit:
* When a new computer virus is discovered, it is necessary to
reverse-engineer the programs that are affected to discover how
the virus spreads, how to remove it to disinfect the programs, and
how to build defenses against future encounters with the same
virus. However, H.R. 2281 only allows reverse engineering for the
purposes of interoperability. This legislation would thus
criminalize anti-virus efforts because they include examination of
copyrighted code for other than the "sole purpose" of
interoperability. Furthermore, it would criminalize the
development, refinement, and sale of any software tools that would
make such virus analysis more effective.
* Penetration analysis is a time-tested method of examining networks
and computers for unnoticed security flaws. Regularly used by
major accounting firms, government agencies, and independent
consultants in assessing security, penetration analysis is the
practice of breaking into a system to see if it resists attack.
Because penetration analysis is not encryption research, H.R. 2281
might criminalize the teaching, the performance, and the
development of supporting technology for many forms of this
valuable approach to security research and practice.
* Several universities offer detailed coursework in software
disassembly, reverse-engineering, penetration analysis, and
related fields as a means of training information security
professionals. This is not done to violate the property rights of
any software owners but to provide an appropriate education in an
area of critical national need; this is similar to medical
students learning dissection and anatomy on real bodies to hone
fundamental skills. H.R. 2281 could be interpreted as prohibiting
such education, labeling it as "trafficking in certain
technologies... that can be used to circumvent a technological
protection measure."
* Major vendors are often unable (or unwilling) to adequately test
mass-market software packages. When these packages are released
into the marketplace, they are adopted by thousands of businesses.
With the significant emphasis on cost-cutting and
interoperability, these "COTS" (commercial, off-the-shelf)
packages are also widely adopted by U.S. government agencies and
the military. Upon release, these packages are intensely
scrutinized by hackers, spies, and criminals throughout the world
as they search for flaws they can exploit. The same packages are
also examined by hundreds of computer users, searching for flaws
so as to protect their own systems. When these "good guys" find
flaws, they report them to the vendors and the user community so
that the flaws can be fixed. While real criminals will not be
dissuaded, H.R. 2281, in any of its forms, will almost certainly
restrict those who wish to search and report flaws in "good
faith."



We are law-abiding citizens who work in a leading-edge area of science
and technology; we are not seeking to infringe others' valid economic
interests protected by copyright. However, to advance the state of the
art, it is necessary for us to have freedom of inquiry and
experimentation. It is essential that we be able to freely conduct
security research so that stronger and more robust technology
protection measures will be developed. Thereafter, professionals need
the freedom to apply the results of our research to protect the
interests of copyright owners, the privacy of citizens, and the
security of U.S. business and government.

We urge Congress to reconsider H.R. 2281 -- both the version passed by
the Committee on the Judiciary and the Commerce Committee. We believe
the best approach is to criminalize inappropriate behavior and intent,
and not ban technology with multiple uses in this fast-moving field of
critical, national importance. If such a reconsideration is not
possible, we strongly recommend that the bill not be passed this
legislative session. Several of us are willing to assist Congress in
developing an appropriate replacement or modification of the
legislation, if asked.

(N.B. Titles. affiliations and city of residence below are provided
for identification only; the material presented in this letter is the
personal and professional opinion of the people listed, and not
necessarily the official position of their employers or
organizations.)

Signed,

Eugene H. Spafford, Ph.D., FACM
Professor of Computer Sciences
Director, Center for Education and Research in
Information Assurance and Security (CERIAS)
Director, the COAST Laboratory
Purdue University
West Lafayette, IN 47907-1398
(765) 494-7825
<spaf@cerias.purdue.edu>

Co-Signers





Ronald L. Rivest, Ph.D.
Edwin S. Webster Professor of Electrical Engineering and Computer
Science
EECS Dept., MIT
Associate Director of the MIT's Laboratory for Computer Science
Member, National Academy of Engineering
Arlington, Mass

Peter S. Browne
Senior Vice President and Division Head
First Union Corporation
Information Technology Services and Information Security
Charlotte, NC

Howard O. Halpin III
Vice President, Information Technology
Motorola Computer Group
Tempe, Arizona

Peter J. Denning, PhD, FACM, FIEEE, FAAAS
Past President, Association for Computing Machinery
George Mason University
Fairfax, VA

Lance J. Hoffman, Ph. D., FACM
Professor of Computer Science
Director, Cyberspace Policy Institute
The George Washington University
Washington, D. C.

Thomas A. Berson, Ph.D.
President, Anagram Laboratories
Past-President, International Association for Cryptologic Research
Chair-Elect, IEEE Computer Society Technical Committee on Security and
Privacy
Palo Alto, CA

Joan Feigenbaum, PhD
Editor-in-Chief, Journal of Cryptology
Division Manager, Algorithms and Distributed Data Research
AT&T Labs - Research
New York, NY

Andrew W. Appel, Ph.D., FACM
Professor of Computer Science
Princeton University
Princeton, NJ

Keith A. Marzullo, Ph.D.
Associate Editor, IEEE Transactions on Software Engineering
Associate Professor, Dept. of Computer Science and Engineering
University of California, San Diego
La Jolla, CA

William J. Cook
Intellectual Property Attorney & Co-Chair of ABA Science & Technology
Global Network Committee
Winston & Strawn
Chicago, IL

Daniel E. Geer, Jr., Sc.D.
Vice President & Senior Strategist
CertCo, LLC
55 Broad Street
New York, N.Y.

Virgil D. Gligor, Ph.D.
Professor of Electrical Engineering
University of Maryland
College Park, Maryland

J. Douglas Tygar, PhD
Professor of Computer Science and Information Management
University of California,
Berkeley, CA

Kevin S. McCurley, Ph.D.
President, International Association for Cryptologic Research
and Research Staff Member, IBM Research
San Jose, CA

Dr. J. Thomas Haigh, Ph.D.
Vice Presidant and Chief Technologist
The Secure Computing Corporation
Minneapolis, MN

Ross Stapleton-Gray, Ph.D.
President, TeleDiplomacy, Inc.
Adjunct Professor, Georgetown University
Arlington, VA

Edward W. Felten, Ph.D.
Assistant Professor of Computer Science
Director, Secure Internet Programming Laboratory
Princeton University

Bruce Schneier
President, Counterpane Systems
Author, Applied Cryptography
Minneapolis, MN

David P. Maher, Ph.D.
Division Manager and Head, Secure Systems Research Department
AT&T Labs
Livermore, CA

Bennet S. Yee, PhD
Assistant Professor of Computer Science
Co-director, Cryptography and Security Laboratory
University of California
San Diego, CA

Karen F. Worstell
Principal, SRI Consulting
Director, Research and Technology
International Information Integrity Institute (I-4)
Houston, TX

Michael Merritt, PhD
Division Manager, Specification and Algorithm Research Department
AT&T Labs -- Research
Mendham, NJ

Stuart Haber, Ph.D.
Chief Scientist,
Surety Technologies
New York, N.Y.

Jack V. Leifel
Senior Director, Information Technology Services
Cellular Infrastructure Group, Communications Enterprise
Motorola, Inc.
Arlington Hts., Il.

Gary Garb,
Director, Corporate Computer & Information Security
Unisys Corporation
Bensalem, PA

Jonathan K. Millen, Ph.D.
Senior Computer Scientist
SRI International
Palo Alto, CA

Susan Swope, CISSP
Deputy Program Director,
International Information Integrity Institute (I-4)
Senior Consultant
SRI Consulting
Menlo Park, CA

Barbara J. Pease
Senior Scientist
Information Warfare and Secure Systems Engineering
MITRE Corporation
Somerville, MA

Hilary H. Hosmer
President
Data Security, Inc.
Bedford, MA

Michael K. Reiter, Ph.D.
Principal Technical Staff Member
AT&T Labs - Research
Raritan, NJ

Jonathan Trostle, PhD
Senior Software Engineer
Cisco Systems
Cupertino, CA

John J. Kinyon
Manager, Corporate Information Security and Risk Management
Motorola, Inc.
Lake Zurich, IL

Becky Bace
President/CEO Infidel, Inc.
Security Engineering Services
Scott Valley, CA

Douglas R. Steinbaum
Electronics Engineer
Network Security Section, Naval Research Laboratory
Alexandria, VA

James Cannady
Research Scientist
Georgia Institute of Technology
Atlanta, GA

Julie L. Connolly
Lead Information Systems Security Engineer
The MITRE Corporation
Nashua NH

Daylan Darby
Lead Software Engineer
Information Warfare - The Boeing Company
Seattle, WA

Joseph C. Konczal
Computer Scientist
National Institute of Standards and Technology
Mount Airy, MD

William Hill
Lead INFOSEC Engineer
The MITRE Corporation
Vienna, VA

Daniel Thomas Grove
HP Software Security Team Coordinator
Hewlett-Packard Company
San Jose, CA

Steven W. Lodin
Manager, Information Security Services
Ernst & Young LLP
Indianapolis, IN

Robert H. Bagwill
Computer Specialist
National Institute of Standards and Technology
Montgomery Village, MD

Roger A. Safian
Information Security Coordinator
Northwestern University
Evanston, Il

Carl M. Ellison
Senior Security Architect
(organization withheld)
Portland, OR

David R. Campbell, CNE
CIO
WireX Communications, Inc.
Vancouver, WA

Puck-Fai
Senior INFOSEC Engineer
The MITRE Corporation
Mitchellville, MD

Amgad Fayad
Sr. INFOSEC Engineer
The MITRE Corporation
Springfield, VA

David Wagner
Founding Member, ISAAC Security Research Group
University of California, Berkeley
Berkeley, CA Return to the top

[]

Gene Spafford
spaf@cs.purdue.edu
Date Last Modified: 7/30/98

------------------------------

Date: Thu, 25 Apr 1998 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 3--Cu Digest Header Info (unchanged since 25 Apr, 1998)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

CuD is readily accessible from the Net:
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #10.45
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT