Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Courts Government News

Michigan "Anti-Hacker" Law's First Felony Charges 263

styles writes: "According to this article, two young men have been accused of gaining unauthorized access to third party computer systems. "The charges are the first under a Michigan law which makes the unauthorized alteration, damage or use of a computer system a felony." I have been a user on m-net (one of the two systems compromised) for a year and some change, and the fact that someone went and took the machine down for at least a month (more? I forget...), and that someone also hacked sshd to steal my password just kills me." And this raises the ever-sticky question of determining who is harmed, how much -- and then the stickier issue of what to do about the first. (Use your judgement in interpreting the source of this news, too.)

[Updated 19:00 GMT by timothy] As several readers have pointed out in comments, and as reader Conan Ford e-mailed, if that funny address sets your nose twitching suspiciously, note that http://www.ag.state.mi.us/AGWebSite/press_release/pr10189.htm does get you to the same place.

This discussion has been archived. No new comments can be posted.

Michigan "Anti-Hacker" Law's First Felony Charges

Comments Filter:
  • Don't you feel there's a difference between intentionally breaking into someone's computer system, and slightly speeding? In the first case, it's an intentional, willful act. In the second case, it's simply a matter of not being able to completely control your muscles to maintain a certain speed. Even the police officers give a grace speed. Don't get me wrong, I'm not endorsing speeding at all. However, it's much easier to plead your way out of a speeding ticket, than pleading your way out of an offense against cracking.

    --
  • by deep_magic ( 137913 ) on Thursday September 14, 2000 @09:13AM (#779768)
    ...I have unfortunately. I would venture to say that most of them are *not* just the curious garden variety hacker types. In some sense, they are pretty much sociopaths. The ones that I have known (crakers, that is) don't necessarily *want* to destroy information -- its just that it truly doesn't matter to them. They don't see months or years of work, all they see is a way to fulfill their need to break into a system and anything that gets in their way is expendable.

    There was a cracker that used to work for my company -- once management found out about him, they let him go. But during lunch, he used to go on and on to me about the new virii he was creating. I kid you not, there was a certain passion to his voice about it. (much like pyros, I'm told). Anyway, you really got the sense talking to him that people simply didn't matter -- all that mattered was cracking as many systems as possible.

    I don't know if these kids in MI were just a little too curious or if there's something more to it. But often times, this goes beyond a simple "boys will be boys" explanation.

  • If you enjoy homo-sexual encounters, and you are large enough to be the 'male' of such encounters then I encourage you to do so.

    As to computers in prison, I'm quite sure that the other things are tax dollars paid for are far more of a waste (like the ever popular weight training programs for prisoners) than adding a computer to the cell of inmates.


    Behold the Open Source Sloth...
  • Granholm said: "Hacking is the dark side of high technology's power and progress. For every person using a computer or the Internet for research, commerce or communication, there may be another person using that technology to commit a crime. The Internet, unfortunately, has become one more tool to pick the locks of companies across the country."

    Well, although I think it's great that we can get info on products we want, or even buy them, I also feel that all of these "victim" companies are the same companies that are destroying the net with their petty patents, and greed grabs at cash (although this comment is not directed at this company, who I'm really not familiar with, I'm making a generalization about MOST companies, and no, I don't condone cracking). These companies have done everyhting in their power to make the net a nice fat Lazy-boy for buisness, and practically ruined it for the end users. Then they cry boo-hoo when people retaliate. I hate crackers too, but sometimes I get overjoyed when I see some fat-cat buisness, who has contributed to these "process patents" or "IP" lawsuits, get whacked by a cracker.

    The M-Net system remained down into July and became available only after M-Net replaced the system's equipment.

    Doesn't this sound more like random hardware failure? In all seriousness, it doesn't sound like the cracker was trying to damage the hardware, and it's pretty unlikely that hardware damage would occur without a malicous user's intent. Could this just be ordinary failure on a system that wasn't properly fault tolerant? I'm just wondering if this is another un-tech-savvy, bone-headed, government move, that is going to end up convicting a person for a crime he didn't do (although if he hadn't cracked in the first place blah blah blah...you get the point).

  • You forget one point: Even though police catch 1 in a 1000 window breakers. However that 1000th window breaker gets a big spread on the news: Window breaker gets 10 years. Sub-headlines: Police cracking down on window breaking problem.

    The fact that police have a poor record in catching these people is down played and the concequences are hyped up. Remember window breaking is a common problem in this senerco. Every month you get at least one window broken by vandals. (Take kids playing baseball accidently breaking the window out of this!) This will mean that there are plenty of vandals caught, and so there is plenty for the media to hype up.

  • Systems cracking is NOT just vandalism. It's breaking and entering. The crackers don't just spray-paint their names on the pages, they have to subvert the security of the webserver itself to do so.

    IANAL, but I've heard from residents of some states in the US that if you catch someone breaking into your home you are allowed to use deadly force to protect your property. In this case, if they get caught cracking your system, their life is pretty much over (from a professional point of view). Works for me.

    If systems cracking remains a crime that can be gotten away with, then companys will be more likely to accidentally hire some of these people who will likely go on to use the company's systems for their illicit adventures.

    Screw 'em. If I had my way, I'd be allowed to shoot anyone I caught breaking into my cable modem connected PC at home. The ones banging on my firewall at work would be another story altogether; I'd keep them alive in extreme pain for a long time.

    (Sorry to sound so venemous, but I really really really hate krad fuckoffs.)

    The real Threed's /. ID is lower than the real Bruce Perens'.

    --Threed
  • Logically, this should be the case--it's a simple cost-benefit analysis. If the rate of catching the criminals stays the same, you can increase the "cost" by making a harsher penalty. The flaw in this reasoning is that the criminal isn't doing a cost-benefit analysis for something like breaking windows--after all, what's the real benefit? For that matter, people who break windows are generally unable to imagine consequences anyway.

    Not true. Malicious vadalism tends not to occur in public view, which proves that the vandals have some understanding of the risk levels involved. While imagining the consequences may be a bit fuzzy, even anti-social types do recognize levels of severity of punishment, and are able to relatively accurately assess risks.


    This is OT, but relavant to this discussion.
    Harsh punishments have never been proven to decrease the activity. One of the most famous example was during the Middle Ages, pickpocketing was rampant. It was a crime that was punishable by death, and in that time that meant public hanging. Now, where do you think the most pickpocketing took place? That's right, at the hanging themselves, because that was an easy place to do it. Most criminals never consider getting caught. They do take normal precautions, but they don't think about what will happen if they get caught, because they think they won't. I mean come on, if they thought they might get caught they wouldn't do it.

  • Right on!

    I too have had my fill of the arguments defending these actions. I also agree with several posts I've seen that mention the owner of the server could be help responsible. It would seem, however, that to hold the owner responsible would require a client of the system to sue the owner. Another poster made the analogy of one's car being stolen from a mechanic's garage. The police won't arrest the mechanic, but the person can sue the mechanic. Same should be permissable.

  • Consider this: If someone broke into your house, while you were watching TV, romped through the kitchen naked, and left out the back door, but didn't take anything, would the courts care? No -- the police officer who showed up would say that since nothing was stolen, and no one was hurt, it's probably not worth the hassle to take it to court. But if someone were to enter your computer system it's a felony?
    I think you're deliberatly misunderstanding here. When I see a compromised system with no apparent damage other than an obvious exploit, say a spare inetd running, I may have a clueless script kiddie, or I may have a more sophisticated intruder who has installed his rootkit, but didn't get rid of the initial hole yet. Rootkits can be *quite* good. In theory, they can be made undetectable short of offline examination of the data on disk. I don't know that anyone's done this yet, but the major building blocks are definitely available. Your example leaves out the reality that when someone breaks in you typically don't get to see what they've done. You get evidence which they've quite possibly altered.

    The question to ask, is if you come home, find your door unlocked, find fingerprints inside, and have to have every object in your house painstakingly examined to make sure, for example, that your TV isn't really a time bomb that looks like a TV, your phone isn't bugged, or bulldoze your house and build a new one, what sort of penalty should attach to the perpatrator? Should an act that costs you thousands of dollars carry a lesser penalty than stealing your $300 TV? I don't think so.

    There simply is no harmless way to compromise a system. Minimally there's time and expense involved in returning the system to a trusted state, which involves careful determination of what, EXACTLY, the intruder did. Reinstalling is all well and good, and necessary, but will only restore you to the state which left you vulnerable in the first place. No obvious damage means either none was done, or it was well hidden. If the system does anything at all important, there's cost associaed with the system being unavailable for its design purpose. Please lets not go down the path of blaming the SA unless you'd also blame yourself if someone broke the windows of your car and filled it with cement. After all, you know you should properly secure your car. Lexan windows, perhaps?

    I think a severe penalty is just fine. If you're breaking into someone else's computer, potentially rendering it unusable for some period of time, with NO regard for what the consequences are, you deserve a severe penalty. It's rather like drunk driving. It's an irresponsible act that sometimes doesn't hurt anyone, but often enough the consequences are severe. People who break into systems don't care what the consequences are because they typically don't attach to them. It's time to change that.

  • Why should I have to buy a lock in the first place? Punishment must be strong enough to discourge the behavior in the first place

    I'm assuming this means you're in favour of television/movie/internet censorship by legislation, then? After all, why should a parent have to monitor their children when punishment could be strong enough to discourage producers of violence/sex/thoughtcrimes from producing objectionable material in the first place.

    The moral flaws in your argument alone astound me.

  • The issue is pretty simple: the techniques used by crackers are legitmate techniques used by security concscious sysadmins every day. Will clueless legislation start to put honest, hardworking sysadmins at risk?
    It has already happened to me. See the story about my ongoing legal case [stonehenge.com] on how I became a triple-felon while doing my job.
  • I mean lets say you steal a candy bar at a store. They're not gonna throw you in jail for 10 years and charge you 10,000$ in fines, because of a 60|cent candy bar.
    They can and, in some localities, will if it's your "third strike". Or, rather, they won't fine you, but there are people in .us prisons serving life sentences whose proximate crime was on the level of stealing a handful of cookies.
    So lets say you only do like 100$ worth of damage in some cracking incident.
    And lets acknowledge that not all damage can (or should) be given a financial value.
    Then because of that you gotta start putting that on your job aplications and such. OUCH! Punishment should fit the crime.
    And what punishment would, in your opinion, fit the crime?
  • Fair enough, but in this specific case we're talking about a school. No customers to lose.
  • "Don't you feel there's a difference between intentionally breaking into someone's computer system, and slightly speeding?

    Absolutely. I didn't mean to give the wrong impression. I was talking about trends, not current events. My point was that as laws and restrictions pile up, it becomes harder and harder to even be aware of every law, let alone keep them. It is at that point that you get the situation I was talking about.

    I am not condoning breaking into computer systems, but I do have issues with that being a felony except in the most egregious of cases. And yes, it's an entirely different thing to be caught speeding. For one thing, you won't make national headlines for doing so. For another, it's not a felony.
    ________________

  • Granholm said: "Hacking is the dark side of high technology's power and progress. For every person using a computer or the Internet for research, commerce or communication, there may be another person using that technology to commit a crime. The Internet, unfortunately, has become one more tool to pick the locks of companies across the country."

    Thank you for not saying "a criminal using the same technology". They could have resorted to labeling everyone who commits crimes as a "criminal", but they chose a more responsible wording. (They still screwed up the sentence order, though, to make it seem like most of the crimes committed using computers involve cracking.)

    --

  • by Silver A ( 13776 ) on Thursday September 14, 2000 @08:23AM (#779782)
    Logically, this should be the case--it's a simple cost-benefit analysis. If the rate of catching the criminals stays the same, you can increase the "cost" by making a harsher penalty. The flaw in this reasoning is that the criminal isn't doing a cost-benefit analysis for something like breaking windows--after all, what's the real benefit? For that matter, people who break windows are generally unable to imagine consequences anyway.

    Not true. Malicious vadalism tends not to occur in public view, which proves that the vandals have some understanding of the risk levels involved. While imagining the consequences may be a bit fuzzy, even anti-social types do recognize levels of severity of punishment, and are able to relatively accurately assess risks.

    The real benefit is that it's fun, if you're of the right mindset.

  • Under the common law, it was permissible for police to use deadly force to apprehend any felon. Since then, felonies have been expanded to include nonviolent crimes, and such a categorical permission is no longer constitutional. How lives could be "in danger" from someone's cracking into a corporate website is uncertain.
  • Do what I have started doing. Type up a document all legal sounding, thanking them for choosing your Document Storage Company (give it a cool name) and invoice them for the storage space. Give them an address to send the money to, and explain about the your monthly fee (per document) and the processing fee for either returning their document to them or deleting it from your system.

    I am not a lawyer, so don't take that as legal advice, but my theory is, you have the right to charge someone for storing their car in your garage, or boxes in your attic - this is no different.

    --
  • I didn't make any suggestions to punishment. I just think that deterrence works better than nothing. You are totally right regarding the severity, though. I think the punishment should fit the crime. What would you suggest as a penalty for someone who simply cracked into a computer and did nothing vs. someone who cracked in, stole users passwords and trashed the web page? Or credit card numbers and bought 50 new cars?
  • by Anonymous Coward

    I'm suprised they (at least the guy over 18) weren't charged with a federal felony [cornell.edu] for this. They'd be facing a mandatory minimum 6 months' imprisonment. All it takes is causing damage in excess of $5,000 (including clean-up costs) to a computer connected to the internet.

  • I was going to comment on that, seeing as I was the one who did the recovery. There were quite a few reasons why m-net was down so long. The main one being that we're all volunteers. M-Net was recovered entirely in my free time, which I didn't have much of. M-Net's hardware was replaced simply because it was old. There was hardly any data lost during this time. I would have brought it right back up, but I really didn't have any idea what was used to do the break in, and modifications were made to the login procedure that I wasn't able to fix, or even track down. So, since we needed it anyway, we upgraded the OS and the hardware.
  • If a company allows public access to some parts of it's office, then what stops you from just walking in and opening another door to someones office.

    Many offices have employees only beyond this point signs, but if you delve deeper than a company wishes without seeing a sign, have you committed breaking and entering?

    If I come to a login prompt and it does not specify who can and cannot enter, then am I free to assume that any password that lets me enter that I can come up with is fair to use? Should there be explicit statements about who may legaly enter a part of a system, or should we all just know not to poke around where people leave doors open.
    Where is the line drawn between a publicly accessable palce and somewhere that the public is not invited? If I can access it and do not come across any warnings forbidding me to, have I broken and entered? Where does security through obscurity fit in here?

    Real world examples rarely make perfect analogies for computer networks.
  • For some reason the links on www.ag.state.mi.us just use the IP. http://www.ag.state.m i.us/AGWebSite/press_release/pr10189.htm [state.mi.us] takes you to the same place.
  • Murder is a really poor example. Most murders are committed as a one-time crime of passion. They're seldom committed as a deliberate planned act, and when they are committed this way its often ancillary to some other crime or criminal enterprise, demonstrating that the people involved really don't have any sense of ethics, morality or concern for outcomes.

    Most people don't get the death penalty, and many murders are pleaded down to lesser homicides, manslaughter, and the perp gets 5-7 with time off for good behavior, and is actually back on the streets in 3 years. Given that the ACTUAL penalty is not the ADVERTISED penalty, is it any surprise that capital punishment isn't effective?

    When I was in college I had an internship in our state senate and I worked on corrections issues -- the average time served for all offenses, including murder, kidnapping, rape, and assault was LESS THAN 5 YEARS. Committing serious crimes doesn't mean you will go to jail for very long if at all. Career criminals and those exposed to that lifestyle know this.

    Except in the case of mentally ill people, cracking isn't a one-time act of passion. It's a deliberate, calculated behavior which has a great deal of forethought.

    And the people involved in cracking, are, generally speaking, higher on the socioeconomic foodchain than many people involved in murder, and hence are presumed to have a better developed sense of ethics, personal responsibility, and should also have a greater fear of involvement with the criminal justice system and the costs involved.

    I find it hard to believe that exposure to the criminal justice system, and the consequences of prison (it's a violent, dangerous place, in college the prison surgeon said he sewed 3 rectums up per month on average) would not have a very real, very significant impact on "crackers" if those that were caught were given manditory jail sentances, stiff fines and long probation periods.

  • I don't like new laws, and if we can avoid creating new ones for the Digital Revolution, that's a Good Thing.

    I don't like the "vandalism" arguments. That implies a monetary damage, which is difficult to determine. So how about trespassing? We have property laws and private property rights, correct? (Okay, we don't, not really. But theoretically we do)

    So why can't crackers be convicted on tresspassing laws?

  • by jheinen ( 82399 ) on Thursday September 14, 2000 @07:29AM (#779798) Homepage
    Gotta admit, when I first read the headline I thought Taco and CowboyNeal were headed for the slammer.

    -Vercingetorix
  • He's anything but a script kiddie, trust me. I know the guy. What bothers me is that the "meeting" with the M-net people doesn't sound anything like what he described. I'll post specifics when I get a chance to talk to him.

    What bothers me is this line: On May 31, while Salcedo had access to the M-Net system, the system crashed and did not recover.

    That's what they're charging him with. The hardware took a shit shortly after he got in, and they're using /that/ as the monetary basis for the charges. They're a nonprofit with essentially no budget. They had no way to fund new hardware, until this came along. Hey, let's blame it on the guy who /approached us/ and told us about a security hole!
  • Of course, the very definition of criminal trespass which you have quoted STILL says that the perpetrator has to be PHYSICALLY PRESENT in your property to be guilty of trespass.

    That's going to be a little difficult to extend to hacking when said hacker is living 2000 miles away from you!

    Suffice to say, using B&E to describe hacking is only suitable as a METAPHOR - and not as a particularly good one either, since the resultant damage is not the same. Making laws based on such a bad metaphor is a really bad idea, even if hacking my computer makes me more pissed off than finding out that somebody was checking through my sock drawer :)
  • Since then, felonies have been expanded to include nonviolent crimes, and such a categorical permission is no longer constitutional. How lives could be "in danger" from someone's cracking into a corporate website is uncertain.

    Police must be prepared to use deadly force at any and all times, even traffic tickets can get them killed. If they police are serving a warrant, and you reach for some unknown object, you WILL get shot.

    LK
  • Salens on the other hand is just a punk kid to did a little digital graffiti. It's ironic that Jennifer can make the connection to real world graffiti, but then go on to push for the digital version (which is cheaper and easier to clean up) to be a felony.


    You seem to forget he didn't do this graffiti out in the open. HE first broke into someone's system, and then did the graffiti. If I spraypaint the outside of an office building, I get charged with vandalism. If I break into the office building and spray paint the CEO's office, I get charged with breaking and entering (and vandalism or whatever else I did while inside). It's not like the kid wrote a naughty note on a message board somewhere, he broke into a system and left the note all over.

  • When they are killing children for stealing lollipops, and the children start shooting back, the authoritarians will wonder, "What kind of monster would kill for a lollipop?"

    That's one of the most succinct and insightful statements about society I've ever seen.

    And to think I found it on /.

    The noise doesn't totally overpower the signal

    yet.

    regards,

    -l

  • Calm down. I see where you're coming from, but let's look at this logically:

    Breaking and entering causes real damage. Someone has to pay to replace or repair what got broken during the entry. Trespassing, on the other hand, is just sneaking in through an existing hole. When someone cracks the security of a system, they haven't physically touched anything. They've just found a hole that was always there, and exploited it. The hole was caused by the software designer who didn't bounds-check, or the system admin who didn't secure something. The cracker didn't cause the hole, and if it gets fixed after the crack, then it needed fixing in the first place.

    Follow me so far? That's Salcedo's case.

    Now let's talk about what happens once someone's in. Malicious destruction of property is when you deliberately go break things just to break them, and it has a monetary value assigned to it. Vandalism is kid stuff, it's stupid, and it's usually trivial to clean up. So let's say some intruder changes some HTML. The sum total cleanup effort involves restoring the previous versions of the pages, which most vandals just rename in the first place.

    Sounds like Salens is being charged with a FELONY, think about it, a felony, for defacing a web site from his own Earthlink account. Stupid, yes, but not a felony.
  • (Use your judgement in interpreting the source of this news, too.)

    You don't have to tell me that; I'm reading this on Slashdot...

  • Umm yeah I wasn't meaning to criticise them at all, I kinda hinted at this in the post. It's just that when I first read hackers/prosecuted/felony I thought that the company hacked was commercial, and if they were then a month would be a long time. Given that it was not only a volunteer run service, but also a public access shell system (more complex to repair than just a web server) then it's not unreasonable at all.

    I was actually considering taking the first para out before submitting, but then hey, probably no one would have actually read the post then.

    I also missed out "...until the plates met" . "just to impress their little friends."

    And nope, hope I never have to, it's bad enough rebuilding after a crash without worrying about what they've done to any custom software you might have.

  • by Greyfox ( 87712 ) on Thursday September 14, 2000 @09:48AM (#779824) Homepage Journal
    Now I can start prosecuting the fuckers who portscan me! Oooh baby look at me go! Except for the ones located abroad. There's always some wiseass in Brazil or Malaysia or somewhere. For them, I usually E-Mail the offending ISP demanding footage of the caning of the perpetrator (in the case of Malaysia) or the head of the perpetrator in a box (in the case of Brazil.) I offer not to declare war on them in return for this. Thus far I have not had any replies and am now at war with half the countries of the world.
  • The people at M-Net are pretty reasonable people, and will probably not overstate damages (unless one of their parent companies or sponsors makes them). Thanks for the kind words!We don't have any parent companies or corporate sponsors. M-Net is run by Arbornet, Inc, a non-profit with directors elected by the M-Net contributor base. We're a small, all-volunteer group, with virtually all of our income coming from donations by individual users. We operate on a shoestring. I don't know that any large corporations would really be willing to support us, given our extremely strong pro-free-speech stance. ;-) It would't be appropriate for me to comment on the case itself, but I wanted to clear that issue up.
    Joe Saul, Executive VP, Arbornet seldon@arbornet.org
  • death penalty isn't supposed to be a deterent, it's a safety measure.

    Life without parole would be an equally good safety measure, and it avoids the small drawback of killing innocent people [amnestyusa.org].

    Given the treatment of "hackers" in the US media, we should be almost as worried about unjust ramrod prosecutions as underprivileged murder suspects are now.

    Uh oh, my SpiderKatz Sense is tingling. Jon could easily turn this topic into another epic, so I better stop now...

  • Still, the penalty is too high. A lot of cases are vandalism. Kids wanting to show that they can hack a server, or get some sort of message out. But in the end, it's just vandalism, but it's being treated like it's something waaaay more serious.. spending years in jail for defacing a website is ludicrous, when vandalism is simply a fine.

    Say I am looking to buy a Coke somewhere.. if I see 2 stores, one with graffiti all over it, and one clean and nice-looking, I'll probably head to the latter to get my coke.

  • Ok, I'll bite. How is replacing a program with a trojan on an open source system any easier than doing so on a close sourced system?

  • Really, there is no 100% effective lock. Read the MIT Building Hacker's guide some time to get an idea of exactly how sad some lock mechanisms are.

    This applies to computers and software too. No net connected machine is 100% secure. Even disconnected, placed in a steel room, buried in a mountain, it's still not 100% secure. When you bring people (admins and users) into the picture you really shoot your security to shit.

    I'm gonna put a foot down here and give an absolute: I refuse to believe that anyone should be held liable for the laws of the universe. If it's impossible to make a 100% secure lock then you shouldn't be able to sue the lockmaker unless they purposefully introduced a flaw into the mechanism.

    Of course, that doesn't mean that you can't publicly deride a lockmaker or software house for bad security.

    (Begs the question: Has a software house ever been sued for a security flaw?)

    The real Threed's /. ID is lower than the real Bruce Perens'.

    --Threed
  • There are few ways to describe (in the current, rather than classic, sense of the word) hacking as anything other than breaking into someone's "property" without leave.

    Oh please, hacking is only similar to B&E as information is to physical presence.

    Somebody who has hacked into your computer is hardly as physically dangerous (unless they've hacked into something controlling a life support system!) as if they're standing in your house ready to brain you with a crowbar.

    This is exactly the kind of reasoning which equates copying a CD with stealing cargo from ships on the high seas.

  • It took me 2 mintues to come up with that speelling, which was as close as I could get. It took me 5 minutes to find it in a dictionary (For starters because I was looking for sE, not sC.

    Anyway, the proper spelling is scenario

    Generally when someone asks me how to spell something I respond i-n-c-o-r-r-e-c-t-l-y. This just goes to prove I'm right there.

  • I have no idea who originally came up with "hacking" as being someone who codes, but they're way off base. Hackers are people who compromise security on other systems. Crackers remove rotection/limitations on software. That's the way it's always been. Quit trying to change it.

    You're wrong, and YOU're the one trying to rewrite history. See Steven Levy's book "Hackers" for some of the documentation.

    "Hacker" was MIT AI-lab slang for an exceptionally talented and persistent programmer - someone who could substitute that talent and persistence for a lack of tools and achieve impressive results. (This was particularly important at the time, beacuse to a large extent there WEREN'T any tools yet...)

    One possible precursor was a Yiddish term meaning approximately "someone who builds furniture with an axe", and carrying the same positive connotation. (Contrast vs. a "hack" writer.)

    To hack a problem was to attack it with all the skill you had and find a way to solve it. Yes, it could apply to hacking through a security barrier - but only to the extent that defeating a security barrier was a member of the set of all difficult software problems.

    Saying "hacker" when you mean "(computer security) cracker" is like saying "sailor" when you mean "(sea) pirate" or "cowboy" when you mean "cattle rustler". Yes, crackers tended to be a subset of hackers, just as cattle rustlers were a subset of cowboys and sea pirates a subset of sailors. (Or at least that was true before the script-kiddie phenomenon lowered the bar on cracking.) But the misuse is exactly the same.

    The misuse apparently began with an early self-appoionted security expert's presentation to early information-system management. He went on a lecture circuit trying to alert MIS people to the dangers of crackers (and to drum up consulting business). He used "hackers" as a term for crackers - much to the confusion of the techies in the audience (who recognized the misuse but considered it a sign of the cluelessness of the presenter).

    But for many of the MIS executives (and the members of the trade press) this was their first in-depth exposure to both the threat of crackers and the term "hacker". So the misuse quickly caught on among the suits, and from there spread to the general media.

    To this day one of the most effective ways to separate the technically literate from the hangers-on is to determine how they use the term "hacker".
  • by theonetruekeebler ( 60888 ) on Thursday September 14, 2000 @10:18AM (#779860) Homepage Journal
    Breaking and entering is a property crime; the presence or absence of a homeowner is irrelevant. B&E does, however, typically stipulate that damage ("breaking") was done pursuant to trespass ("entering").

    Even if no damage was done, breaking into someone else's computer is sure as hell an act of criminal trespass.

    Here's how the State of Georgia, for example, defines criminal trespass [ganet.org]:

    (b) A person commits the offense of criminal trespass when he or she knowingly and without authority:
    (1) Enters upon the land or premises of another person or into any part of any vehicle, railroad car, aircraft, or watercraft of another person for an unlawful purpose;

    (2) Enters upon the land or premises of another person or into any part of any vehicle, railroad car, aircraft, or watercraft of another person after receiving, prior to such entry, notice from the owner, rightful occupant, or, upon proper identification, an authorized representative of the owner or rightful occupant that such entry is forbidden; or

    (3) Remains upon the land or premises of another person or within the vehicle, railroad car, aircraft, or watercraft of another person after receiving notice from the owner, rightful occupant, or, upon proper identification, an authorized representative of the owner or rightful occupant to depart.

    If a computer is an extention of my premeses, this sounds like cracking to me; frankly I'd be much more upset with you if you were going through my computer files than my tool shed.

    One important difference, though, between criminal tresspass and whatever tough-on-crime bullshit they've got going on in Michigan, is that criminal tresspass is a misdemeanor, not grounds for a five year prison term.

    --

  • Hmm maybe I was not clear in my point or maybe you missed it.
    Alot of the debate here centers on how much damage is actually done by this and the relative severity of the punishment and I think that's the appropriate place for the debate to be.
    When you ask how much damage is done, well think of it this way. If someone hacks into a computer system and then posts the credit cards of all the users to a web site, then ALL those users have to get new credit card numbers. There is nothing wrong with someone being different in society. That is nowhere near my point. Being different is fine. We have asian, african american, caucasion, hispanic, catholic, jew, hebrew, protestant, gay, straight, etc. or whatever. There is nothing wrong with being differnt in any way shape or form.

    The problem arises when someone acts on out against society in a hurtful maner. Hacking systems is just as destructive as breaking into a bank or house. How would it feel if someone broke into your home. I'll tell you. I no longer felt safe in my old place. There is emotional damage. When someone hacks a computer system, the punishment shoudl probably be the same as breaking an entering. If they takes something the punishement shoudl prbably be theft.

    Being different does not give you the right to harm others, and that is what you do when you hack systems. That was my point. You don't just hurt the corporation, you hurt everyone that uses that computer system. Hackers or maybe I should say "Crackers" which is the proper term should be punished.

    I don't want a lot, I just want it all!
    Flame away, I have a hose!

  • It seems that this may give the term "hacking" a legal definition.

    This could be bad for those who would define hacking as simply playing with advanced settings and programs on their own software and hardware.

    -Ben
  • by Nezumi-chan ( 110160 ) on Thursday September 14, 2000 @07:31AM (#779874)
    Perhaps despite having worked for lawyers for several years I still don't have an astute legal mind, but Granholm's contention that regardless of damage, hacking should (and will) be considered a felony is a bit odd, considering that she then compares it to vandalism, which definitely does depend on the amount of damage involved.

    Yet another case of saying the net is like the real world as a justification for not treating it like the real world, I guess.

  • If a couple of bozos hack your site, yeah, it sucks, but if they are using a day zero exploit and you weren't there on Sunday,
    Notice I said: If he doesn't do that and gets cracked. Checking for new security issues should be part of the sysadmin's daily routine, and it he's doing that, but gets hit before he's able to find out about the kiddies' new whiz-bang 'sploit, then it isn't his fault.

    Yes, I will blame the sysadmin for poor security if he doesn't work at keeping his boxes safe from crackers - this is just plain common sense. Putting a computer onto a network entails responsibility that needs to be taken seriously. Would you have a child and not bother to educate him/her about the dangers present in society so that s/he will take common-sense precautions to remain safe?

    No, this does not excuse the actions of the cracker - just like a pedophile who kidnaps your son because you didnt teach him about perverts can't use that as an excuse - but it also does not excuse the lack of responsibility on the part of the sysadmin.

  • by Auckerman ( 223266 ) on Thursday September 14, 2000 @07:32AM (#779885)
    If you bought a deadbolt for your front door and it had a defects in it so often you had to buy a new lock every other day to prevent some kid with a stick of gum from getting in your house and steal all your stuff, what would you do?

    Buy a different lock.

    There are two parts to this. The server maker is responsible for not being as carefull as OpenBSD has proven that you can, the Admin is responsible for not doing his job right, and the script kiddie is responsible for breaking in.

    Admins are unsaveable at this point, any fool can install a server and set up shop these days. Companies and kiddies should be punished. If you sold me a shit lock and some kid broken in my house, I would have the kid arrested and you, the lock seller, would be sued for any damage the kid did to my house.

    If only our legislators could see that. But, noooo, MS is an 'innovator', Macs are 'toys', and Unix is for 'hobbists'. Great.

  • by StenD ( 34260 ) on Thursday September 14, 2000 @10:36AM (#779889)
    First of all, you are not allowed to use deadly force to protect your property.
    You don't know that. You may not be, but I am, and Threed may be allowed to as well. As Threed said, in some .us states, you are allowed to use deadly force to protect property. In Texas, chapter 9, subchapter D, section 9.42 [state.tx.us] of the Penal Code defines the conditions in which "[a] person is justified in using deadly force against another to protect land or tangible, movable property".
  • by Private Essayist ( 230922 ) on Thursday September 14, 2000 @07:32AM (#779890)
    Theft is wrong regardless of the medium used. However, I found Michigan's Attorny General stated matters in the usual exaggerated tone that the government uses to smear technology users:

    Granholm said: "Hacking is the dark side of high technology's power and progress. For every person using a computer or the Internet for research, commerce or communication, there may be another person using that technology to commit a crime. '

    She probably didn't mean that literally (how stupid would she have to be in order for that to be the case), but using such inflammatory language is wrong. Does she really mean to give the impression that half of the Net users are legitimate, and half are criminals? That would mean hundreds of millions of criminals!

    (sarcasm)No wonder law enforcement has to work so hard to make the Net safe for us!(/sarcasm)
    ________________

  • I'm gonna put a foot down here and give an absolute: I refuse to believe that anyone should be held liable for the laws of the universe. If it's impossible to make a 100% secure lock then you shouldn't be able to sue the lockmaker unless they purposefully introduced a flaw into the mechanism.

    I am not a lawyer (and I doubt you are one either) [IANALAIDYAOE], but I take issue with your pronouncement. Parties should, in principle, be held responsible for incompetence or negligence that harms others. The matter should not hinge on "intent to harm," as this would give carte blanche for corporations to produce most anything under any claims whatsoever provided you couldn't prove a willful introduction of deleterious flaws into the product. Most people would see no problem with holding responsible, say, a factory that inadvertantly contaminates a town's groundwater with heavy metals or a contractor who builds a bridge that falls down under a normal traffic load due to corners that were cut during the construction process. Neither is technically a purposeful introduction of a flaw nor a violation of physics, yet both are examples of negligence.

    Begs the question: Has a software house ever been sued for a security flaw?)

    Negligence itself in the U.S. has a curious definition. In essence (if I recall correctly--lawyers, please correct my errors), the criterion is the answer to "In hindsight, would you have done anything different to have prevented this from happening?" If the answer is "yes," then one is negligent. This, like many USian laws, seems to leave little room for common sense, and it is a system that can be easily abused: Of course McDonalds employees would warn a person of hot coffee if they knew she would later injure herself. Of course the soda machine company would warn people that it is dangerous to try tipping the machine over to get a free soda.

    Software companies are different, however, since they have a shrink-wrap licensing agreement that disavows them of any responsibility for damages resulting from potential use or misuse of their products. If I'm not mistaken, one generally cannot even pose the negligence question to a software company since they make no claims whatsoever on the suitability of their products for any purpose, much less the purpose that led to damages to a party. This is yet another way that software differs from the "real world."
  • by swb ( 14022 ) on Thursday September 14, 2000 @07:33AM (#779896)
    I think harsh penalties -- perhaps harsher than any individual crime may call for -- are sometimes necessary to bring under control a problem that's really widespread.

    For example, if breaking windows on houses was so widespread to be considered a real problem but so easy to get away with due to the sheer number of houses and the inability of law enforcement to track the criminals to their crimes then maybe a harsh law against window breaking will provide some kind of deterrant effect in the minds of those breaking windows.

    The same may be true about cracking -- the odds of getting caught may not be that great, but if the penalty is really severe and people are getting charged and convicted then it might make some people think twice about it.

    I also don't have any sympathy for crackers caught in someone else's system who didn't want them there -- you're breaking the law. You might find safecracking a challenge, too, but if its not your safe you're going to jail. A common criminal is a common criminal, and intellectual justification doesn't make it ethical.

  • by TWX_the_Linux_Zealot ( 227666 ) on Thursday September 14, 2000 @07:33AM (#779897) Journal

    In other news today, a new Denial of Service attack, The Slashdot Effect was announced. To activate the DoS, the malicious user sends a story to the popular Slashdot [slashdot.org] web site, who posts this story, containing links to a web site that the story references. Slashdot users try to access the site with such frequency that the load causes general use of the site to be unavailable. This can effectively cripple the site for hours or days on end.

    Fixes/Workarounds:
    To prevent The Slashdot Effect, avoid doing anything noteworthy to "Nerds" or any technological group. Avoid getting into legal trouble with the Motion Picture Association of America, and most definitely, avoid anything to do with Linux, FreeBSD, X Windows, or Distributed File Sharing. Also, avoid interacting with the following companies professionally:

    IBM
    Micron
    RedHat
    Rambus
    NEC
    Compaq
    Amazon
    Yahoo
    Google
    id Software
    AMD
    Intel

    Doing such could be hazardous, and increase the potential of being hit with this crippling DoS attack.

  • If this were a public warehouse that was only giving the appearance of some level of security, but in fact was leaving it's doors open all night with nobody bothering to check for intrusions, over months, they would be heald to some level of culpability themselves (along with the intruders).
    EVEN if they had a piece of paper saying that they were not responsible.

    Same goes with a mechanic that lets someone else drive off with your car (even if strangers just "borrow" it for a little while and you get it back).

    Why does this have to be any different?

    Until both the person messing with someone else's public server AND the owner of the server itself are heald accountable for their actions, this activity will not even begin to slow down.

    Caviat: there is no telling if anybody accused even did anything in this story because the FBI is involved and they seem to skip over or invent "facts" as it suits them, ref. Kevin Mitnick damage assessment.

    Visit DC2600 [dc2600.com]
  • I think that merely "accessing" a system illegally should not be a criminal offense, and should incur only minor civil damages. I am very disturbed by the trend towards legislation that allows people to collect damages that were never actually incurred. Giving a punitive award in addition to a actual award is one thing; allowing a plaintiff to collect damages when none were actually suffered is another. Since they did take m-net down, there were damages suffered in this case, however I think that the vague language used in the applicable law leaves it open to abuse.
  • Felonys are things like Grand Larceny, and Killing Grandma. Serious repercussions and lots of damages are required for something to be a Felony, right?

    Nope, not in the US. You forgot the national motto. A Government by the People in the Corporation's pockets, of the People in the Corporations Pockets and for the Corporations.

    Why do you think the line denoting dollar totals is the _Bottom_ line. It has the final word in any debate. Period.

    Steven
  • I find it a highly unlikely contention that M-NET is the first public access UNIX systems. I remember public access UNIX systems in the early 80's. And, incidentally, they weren't protected by computer trespassing laws.

    From what has transpired so far, I'd stay away from M-NET. I'd worry that they might misinterpret even more benign activity as "trespassing". What they should have done is learned their lesson, made their system more secure, and left it at that. There was no need to get the police involved.

  • Unlike the physical world, where making secure homes and cars is very expensive and very difficult, computers are neither hard nor expensive to secure if you pick the right tools.

    If companies can avoid responsibility for making their systems secure, they won't bother. They'll keep using outdated software and intrinsically insecure infrastructure. If there is a break-in, they just point the finger at the guy who broke in. The consumer is still at a high risk from the theft of their data, but the company is free and clear.

    Yes, breaking into someone's computer system is wrong and should be punishable in serious cases. But more important is that companies should face stiff fines and criminal charges if they expose personal or private data through insufficient security. On balance, companies don't have to be protected from crackers--they can easily protect themselves if they have half a clue. People need to be protected from companies that venture out into the Internet without the technical competency to protect their customers' data.

  • Name: www.ag.state.mi.us

    Address: 167.240.254.37

    According to ARIN, it's in the Michigan State Government's net block. Unless this is someone having a happy time on the State's servers, or an trigger happy State person, it's legit.

  • I know a lot of folks are going to defend what was done here as just "showing where there are holes in a system" or "kids just playing around." I'll tell you what, why don't you just give me your address and I'll wander down to your house and see what security holes you have. Oh, it's a deadbolt. Well, with my trusty Cro-bar Mk. 1 , I can get around that. You need a stronger lock. Hrm, still got the other lock on the door. I'll just borrow that key under the mat (hey it's a security hole, and someone needs to show you that) and let myself in. Now, while I'm here, just to show you how easy it was and to show what coulkd happen if someone truly malicious (not me, oh Heavens no, I'm just showing you where there might be problems in your security), I'll trash your stereo or some other nonessential component of your living space and borrow your credit cards.
    But I'm not a criminal, oh no. I'm just a more 733+ home security expert than you. You should thank me.

    I say that if they've got proof beyond a reasonable doubt here that these little twits should be sent away for a few years to cool their heels. I'm so sick of people going "Well, I mean, I did these same things when I was a kid and I wasn't a criminal." No, you weren't, because there wasn't a law in place before. If you did some of the same things today, you would be. And don't give me the "well, they were just curious, kids are" line. There are plenty of legal ways to learn more about computers and systems security. Hell, do what we did. Have your friends set up a system hey think is secure and try to crack it. Learn. Repeat. But don't try to tell me that these kids aren't little thugs, because they are. Screw 'em, and I hope they get along with their new cellmates.
  • There is already a legally simple way to decide this. Was there a door involved? If you enter a business and walk down an open hallway towards the back of the building, assuming that there are no "Keep Out" or "Employees Only" signs, then it is legally not a B&E. However, if you must open a closed door to enter that hallway, even if that door is unlocked, then you have broken the law. Since User/Pass prompts are analogous to doors, passing through one without authorization is (and should be) illegal.

    How would you feel if you found someone in your living room, and the police couldn't arrest him because he found a key to your front door? Should everyone blame you and suggest better deadbolts?
  • To answer the question " Who is harmed?", I'd say we all are. We are a society and when member go astray like this it hurts the whole society.

    In this particular case it hurts all the users of the system that was hacked and had there passwords stolen. It also hurts the people running the system. No not just the admins the whole organization is affected. Why? The admins are affected, cause they were not on top of there job, securing the system and maintenance and all that stuff (at least that is how some will percieve it). The owner looses his credibility to run a secure operation. Uses loose there passwords and possibly the system. Well we know it is not necessarily the admins fault. There is no perfectly secure system. Alsost all systems can or do get hacked weather by DDOS or what not somebody with nothing else to do trys to screw up someone else's life, cause they can and they are pissed off at the world for no real reason.

    Someone recently told me that there will always be security breaches in software cause software today has so many lines of code. THere will always be hackers too.

    I don't want a lot, I just want it all!
    Flame away, I have a hose!

  • Then they go to court and state their case.

    As you said, a large company may have much more to lose, and the damage done may be much more costly than if a small non-profit site is hacked.

    Are you implying they should receive the same in damages? That all depends on what happens.
  • by titus-g ( 38578 ) on Thursday September 14, 2000 @07:39AM (#779927) Homepage
    Well my first thought was A MONTH???.

    If I were to let any of my clients sites go down for more than a day, I'd be dead, I already suffer from telephone phobia from times when servers have crashed/email has gone weird. These days there is no excuse for not having backups and at least some idea of an alternative if you do lose a machine (he sez hypocritically).

    Having said that this was a public access system run by volunteers, and given it's nature pretty hard to recover.

    And as for the people who hacked it (and kuro5hin) they really have to rank in the intelligence stakes with people who would put their own balls in a vice and slowly turn the wheel until the plates met. You don't attack people who are helping the net remain open, and a community, many of whome may previously have had some sympathy for (h|cr)ackers, or at least draw from the same knowledge base.

    Also stupid acts like this are just making it so much easier for various governments to sneak in with legislation that is inthe end just going to make it harder for everyone, and turn the internet into little more than a commercial, monitored service (anyone ever used aol?).

  • We have really got to get a handle on what qualifies for felony credit in this country. Now grafitti and cracking are felony crimes? Let's remember that felony convicts are forever forbidden fromholding public office, or more importanty VOTING! We're to deprive someone of their sacred rights to vote just because they hacked their high school? I can see doing it for causing bodily harm, but for a little computer security issue?

    All metaphors and analogies aside, is cracking really a felony offense? Will we put people in jail for 10 years, effectively ending any chance they had to be productive (if a bit subversive) members of society, simply because they pissed AT&T off? Waving a gun at old people, abusing little kids. That's really despicable stuff. But breaking someone's precious computer? Put them in the can for 3 months, fine them good, and put them back out on probation. Get them a computer security job where they can play their security games in a supervised environment and get them back in to life. A 17 year-old kid, prosecuted for felony hacking? Give me a break... They fear what they can not begin to understand.

    Bennu
  • The Slashdot Cruiser is due for a tune-up. I need a mechanic.

    Who should work on the Crusier?

    Richard M. Stallman
    Pros: Works for free (specifically, for contributions and government grants)
    Cons: Long-winded politically-charged explanations of any problems.
    Biggest Concern: If he does anything to the Cruiser, I have to let anyone drive it who wants to.

    Eric S. Raymond
    Pros: Does same work as RMS, but calls parts by different names.
    Cons: Wants to own a piece of the Cruiser when he's done working on it.
    Biggest Concern: Liable to use the Cruiser for target practice and put several .45 caliber holes in my ride.

    Bruce Perens
    Pros: Will try to calm me down if he finds anything wrong with the Cruiser.
    Cons: Needs someone to calm him down.
    Biggest Concern: Will want to file lawsuit against oil companies and auto makers if the Cruiser is out of gas.

    Rob (CmdrTaco) Malda
    Pros: Will get Cruiser running eventually.
    Cons: May continue to add parts until problem is fixed or nobody cares anymore.
    Biggest Concern: Wiring mistakes may cause radio to change stations whenever I turn on the wipers.

  • How on earth do website defacements (in the Jesse Salens case) constitute monetary damages? I work as a web developer, and while fixing a website is work, it isn't that much work - a few minutes, max.

    While the 'altered' web site is up, how many customers will read it, expecting to find the company's normal site? How much business will this cost the company? Not to mention the labor costs and lost productivity (however small) involved in having a web site maintainer repair the damage.

    =================================
  • by Kostya ( 1146 ) on Thursday September 14, 2000 @07:40AM (#779939) Homepage Journal

    My question is simple: what is unauthorized use? Does authorized mean "written permission"? Or is it implied?

    I ask because of a simple case of sendmail: if it is running, is that an implicit authorization to send email to the owner via that port? I saw an article over at rootprompt [rootprompt.org] where a sysadmin tried to contact the owner of a box by sending him email via the sendmail port of the box (the box was apparently on a DSL line). The owner got all pissed because he didn't "authorize" the sysadmin to use that machine. The sysadmin argued that sendmail was PRECISELY for doing exactly what he did--sending email.

    This may seem stupid to most of you, but remember that many people do not understand the technology they use, let alone legislate about. Could this law be used for suing people who connect to your machine? If you have sendmail up, and someone connects to it, is it their fault or yours? What about FTP and HTTP? If you do a base install of RedHat, you get FTP, HTTPd, Sendmail and a bunch of others. If someone connects to your web page or your FTP server, is that unauthorized?

    There are obviously two sides to this issue. I personally get all paranoid when people connect to my box--it is a firewall with nothing running but ssh and ident. If someone tries to connect to my RPC port (i.e. NFS), I am a bit suspicious of their intentions. So this is unauthorized? But what about someone who gets hacked and my machine's address is used as a decoy (or in the case of ADSL with PPPoE, I'm now at the address that was used to attack them, but I'm a different person) and they run a port scan in an attempt to figure out if I am hostile. Does a port scan count as "unauthorized"?

    The issue is pretty simple: the techniques used by crackers are legitmate techniques used by security concscious sysadmins every day. Will clueless legislation start to put honest, hardworking sysadmins at risk?

    My feeling is "yes". And that bothers me. Sigh.

  • by naught ( 16634 ) on Thursday September 14, 2000 @07:40AM (#779941) Homepage

    What's the real story here? Beats me. Felonys are things like Grand Larceny, and Killing Grandma. Serious repercussions and lots of damages are required for something to be a Felony, right?

    Or it may be that any crime which is so unknown that its damages may not be easily talliable becomes a felony as a deterrent. It may be that making laws banning data theft and hacking become 'cutting edge politics', and all the street savvy politicians want their name on that bill.

    Probably, the severity of the law is caused by the blinding fear the average luser has about his machine being hacked, or all the dirty emails he sends his mistress being looked at by someone.

    Theft is theft -- and if its information, how that information is used should determine the crime, or how much the (unrecoverably) destroyed data is worth.

    Consider this: If someone broke into your house, while you were watching TV, romped through the kitchen naked, and left out the back door, but didn't take anything, would the courts care? No -- the police officer who showed up would say that since nothing was stolen, and no one was hurt, it's probably not worth the hassle to take it to court. But if someone were to enter your computer system it's a felony?

    Case of sexy politics here, methinks. I could be wrong, but everyone runs that risk. Bugs me, though that while I can't get a guy who threatens to kill me sent to jail when I provide the officers with his name and address, as well as a witness to the event, laws exists that state unauthorized access to a system is a felony.

    I don't dispute that charges should be brought -- it's the severity that gets me down.

    • The word "hacker" will probably now acquire a legal definition, which is just going to make life difficult for the programmers, beta testers, overclockers and other misfits such as ourselves. I think that the law should use the world "1337 h4x0r" instead.
    • There is now a precedent for busting low-level crackers. This means that the little guys have to watch out, because the law isn't going to ignore them as much as they have in the past (when only 1337est had to worry).
    • What counts as unauthorized access to a computer? Technically speaking, if you falsify your name or address when setting up a Hotmail account, you are providing fraudulent information and you could technically be busted for unauthorized access to the Hotmail servers. They got Al Capone for taxes; How are they going to get you?

  • We could always start with the guys who try to use fake email addresses and put at the bottom of the message: According to the proposed bill, this is not SPAM. They know a bill is not law, until after signed by the president, or the president's veto is overidden.

  • But the Attourney's General office in Michigan.

    The same office that gave us the Michigan State Riot Tip Website "hack".

    In that case, the State of Michigan had a website up for folks to give anonymous tips on who was rioting. However, all of the information was wide open to the public because the webmaster set it up that way.

    BUT, the State said the site was "hacked" and were going to prosecute anybody that passed along the URL to the info.

    Sorry, my bad, not an FBI thing this time.

    Visit DC2600 [dc2600.com]
  • I run a webserver that hosts a number of domains, some for friends, some for non-profits, some slightly e-commercial. I do it mostly for myself, but since I'm already doing it adding the extra ips and domains is no big deal.

    My server has been compromised twice. Once trojans are installed, it's pointless to try to figure out what's safe and what's compromised. That sort of analysis takes a day or more, a day which could be spent reinstalling, which course is guaranteed to get finished. All of this activity takes place uncomfortably hunched among the racks in a closet during which time I and a bunch of other people can't get our mail. Dealing with the emergency takes place at some random time the black hats choose, and I have to immediately take several days out of my schedule fixing things.

    So, my feeling is: death penalty is not harsh enough. People are doing it on purpose, and they're fucking up my life. The commercial losses are not measurably large, which is what gets the authorities involved, but the stress and disruption to me is huge.

    Yeah, I know that teenagers are prank-prone, I was, but that's why their heads need to be put on stakes outside the gates of every town, so the other little twerps will see what they'll get too. It's not funny, it's not even a challenge, and the punishments should be very harsh.

  • That's why I keep the latest issue of 2600 displayed on my desk. The funny thing is, most people who look at it end up wanting a subscription :)

    -Vercingetorix
  • Comment removed based on user account deletion
  • Granholm added: "In the future, any hacking, regardless of the amount of financial damage it causes, will be a felony. A vandal is a vandal whether you are a virtual vandal putting graffiti on a web site or a real world vandal putting graffiti on a wall. Both are illegal. And using a computer to break into a company from the comfort of your living room is just as illegal as using a hammer to break down that company's front door. Because the Internet makes the crime easier doesn't mean that it makes it right. These are the first hacking charges in this state; you can bet that they won't be the last."

    This is an honest question: is vandalism a felony or misdemeanor? If it is the latter, you'd think that based on this prosecutor's line of logic that "virtual vandalism" ought to be a misdemeanor, too. OTOH, if it's a felony, then why are there specific resources devoted to "virtual vandalism" when physical vandalism is still a real problem in many areas?

    Not to say this isn't a good thing, however.
  • (rant)

    Well, Something that I doubt they are thinking about, and they _really_ should, is that many people in computing are staying within the current laws because there are some things that they can still do legally, or they can work around the restrictions. Eventually, they will have too many restrictions, and if they force people to break laws to do things that they are legally doing at this moment, what is to make these people not do other illegal things? I try to think that I do a pretty good job with not breaking laws; I run all open source software, so I'm not pirating, I don't go intentionally knocking people's PCs and servers out, I don't destroy property. What happens if they start restricting based on content, or other things? What happens when more commercial products are reverse engineered in GPL, and more companies start chopping down forests to send enough cease and desist orders? what happens when these are upheld in court as IP when all the reverse engineering people did was the _SAME THING_ that compaq did to IBM's bios back in the '80s? I don't think many of us will really care what the laws are, we'll do what we want anyway. Obviously, the MPAA's rabid enforcement of their faulty product's restrictions aren't affecting Joe User, who probably has the DeCSS code. Back before Linux was really an option, and we were all running (shudder) DOS, did we care if we made many systems boot if whe had only one copy of the OS? I doubt it... We generally seem to do what we want, and the more difficult they make it to do this legally, the harder they'll have to enforce. It may become almost impossible.

    (/rant)
  • by rexroof ( 125632 ) <rexNO@SPAMrexroof.com> on Thursday September 14, 2000 @07:48AM (#779966) Homepage
    M-Net isn't an ISP, we're a conferencing system. M-Net is the first public-access unix machine, or so some people claim. We give out free firewalled shell accounts with our primary focus being on our YAPP bbs conferencing system. If newuser was up, which it's not, due to some password locking issues with FreeBSD's pw command, you could create an account and be dropped into a shell. I'd encourage you all to drop by once we have it back up, and if you want to support a public access unix machine, use paypal to give us money at treasure@arbornet.org. Also, you can send us a check here:
    • Arbornet Accounting Department P. O. Box 7938 Ann Arbor, MI 48107-7938
  • by Vassily Overveight ( 211619 ) on Thursday September 14, 2000 @07:58AM (#779971)
    After all, I only 'license' the software, I don't own it. Since I hacked my TiVo by cracking the sealed case, added a 75GB second drive, and modified the boot files, am I going to have to stay out of Michigan? Man, there goes my vacation!
  • by MattW ( 97290 ) <matt@ender.com> on Thursday September 14, 2000 @07:58AM (#779972) Homepage
    These laws can be as dangerous as they are helpful, however. I'm in the network security business, and I've been running boxes on the net for 4 years now, and in this time I've seen a lot of complaints which go something like:

    Dear root, I received the following ping packet at 13:13:13 on Jan 30. Per USC blah blah, unauthorized access to a computer system is a felony....

    And it goes like that. In the past, these ignorant people would cite the US law which applies to unauthorized access to government systems. It didn't apply either way, but the point of the stupid email is this: "unauthorized use" and "unauthorized access" do not take into account the implicit permission for connections when you hook a box to the net. Knowing people in ISP/NSP abuse departments, I've seen way too many complaints along the lines of: "Someone connected to my webserver and this isn't a public server!" Could you call it unauthorized? Technically, yes. But shouldn't connecting a machine to the net be implicit authorization if you don't take steps with a tcpd, ipfilter, ipchains, firewall, etc? Absolutely. Or a password on your web pages. The same goes for pings -- people will get a single ping packet, and complain that they are "being hacked".

    This brings me to an even stickier anecdote: someone has a box on the net running an irc server. Someone hacks a box at a government agency, connects to their irc server. The irc server, as many do, autoconnects to the client box on port 1080, maybe port 23, looking for (1) Wingate and (2) stupidity. Not much later, someone (maybe Nasa, maybe the SS) manages to unlink and postmortem the box, seeing the auto connects logged, and goes after THAT person. Thankfully, they were never dragged into court or anything, but the government actually believed that the person had a hand in the hacking of the box, and that even if not the mere autoconnects were a violation of the law.

    That said, I think the "uproar" over hacking is causing laws that also may be too harsh. Removing the $1000 cap on the michigan law is irrelevent -- any hacked system can easily generate a $10k tab, just by citing expert recovery time for dozens of hours at >$100/hr. The simplest 1-machine hacks of companies have generated 6+ figure "damages" in the past.

    Even as a security professional, and agreeing that cracking a system when not invited should be a crime, cracking should be a reparation case. If someone spends $5k in time and loses $10k in business because of your crack, you should pay that back, do a few hundred hours community service. It's rough, but it is a crime. It should remain a misdemeanor, unless things are done to multiple systems, with malicious intent to cause harm to the system(s), etc. I'm sure there's a lot of room for discussion, but felonizing script kiddies is not, in my opinion, what we need to do. At least the original bill seems to allow for _10 year_ sentences for "damages" of >20k. Sending some 18 yr old to jail for 10 years over a hacked box is absolutely insane. As a network security professional, I'm also fully cognizant about how easily most of these boxes ARE compromised, and replacing security precautions on shared machines with draconian laws with absurd sentences is absolutely unacceptable.
  • by FascDot Killed My Pr ( 24021 ) on Thursday September 14, 2000 @07:59AM (#779974)
    "...maybe a harsh law against window breaking will provide some kind of deterrant effect in the minds of those breaking windows."

    Logically, this should be the case--it's a simple cost-benefit analysis. If the rate of catching the criminals stays the same, you can increase the "cost" by making a harsher penalty. The flaw in this reasoning is that the criminal isn't doing a cost-benefit analysis for something like breaking windows--after all, what's the real benefit? For that matter, people who break windows are generally unable to imagine consequences anyway.

    Making a stiffer penalty will not lower the crime rate--the few people put off by the increased danger will be more than offset by the people turned on by the increased danger.
    --
    Linux MAPI Server!
    http://www.openone.com/software/MailOne/
  • I work as a web developer, and while fixing a website is work, it isn't that much work - a few minutes, max.

    I always find this argument baffling. Just because it's not that hard to change a tire, doesn't mean I easily dismiss the fact that someone took it upon themselves to slash it. If someone knowingly breaks the law, then they should pay the consequences. Pure and simple. Nowhere in any state of federal statutes do I read that small corrective action allows anyone a free pass.

    --
  • I'd imagine it means bypassing an obvious access mechanism, like trying out passwords on default accounts, sending obvious buffer overrun packets, and other known and/or obvious script kiddie attacks. I can't imagine anyone getting done for a innocuous sendmail or http packet. Not even in Michigan.
  • Additionally, the nature of the system that is compromised is a key factor. For instance (from one of my computer ethics books) an individual used a Boeing computer system as a stepping stone on his 'travels'. After noticing that their system had been compromised Boeing spent over $300,000 verifying that no damage had occured to any of their data. Why? Because the system compromised was part of the development of Boeing planes.

    And don't forget that the *only* sure way to secure a box after being cracked is to reinstall the whole system. That means restoring all accounts (with new passwords), restoring backups, downtime for reinstall, etc.
  • To me this seems like cruel and unusual punishment.
    I mean lets say you steal a candy bar at a store. They're not gonna throw you in jail for 10 years and charge you 10,000$ in fines, because of a 60|cent candy bar. Thats just cruel. So lets say you only do like 100$ worth of damage in some cracking incident. Then because of that you gotta start putting that on your job aplications and such. OUCH! Punishment should fit the crime.
  • I think harsh penalties -- perhaps harsher than any individual crime may call for -- are sometimes necessary to bring under control a problem that's really widespread.

    Do some research before you fix your mind in this state. Murder carries the harshest of penalties, and numerous studies have shown that the death penalty is not a deterent.

    If you want to keep them from commiting a crime, the chance that you are caught doing it has to be very great.
  • by Art Popp ( 29075 ) on Thursday September 14, 2000 @08:04AM (#779998)
    These are two very different cases that should have two very different treatments.

    First I would like to point out Jennifer's poor sense of perspective:

    For every person using a computer or the Internet for research, commerce or communication, there may be another person using that technology to commit a crime.

    The suggestion that there "may be" one "criminal user" out there for every legitimate user is nothing less than retarded. If there were 10 million+ hackers out there it seems unlikely that Jennifer's toaster would remain unhacked after a display of such blatant prejudice.

    But reactionary posturing aside, the ugly part of this mess is that these two people can be mentioned on the same page.

    Salcedo is likely a criminal under non-computer law. And additionally, he's an idiot. If he's responsible for intentionally, irrecoverably (to the novice of course) crashing a business system, there is no need for computer-oriented law to prosecute him.

    Salens on the other hand is just a punk kid to did a little digital graffiti. It's ironic that Jennifer can make the connection to real world graffiti, but then go on to push for the digital version (which is cheaper and easier to clean up) to be a felony.

    Obviously to people with so little sense of the spirit of the law, anything their afraid of should be a felony.

    When they are killing children for stealing lollipops, and the children start shooting back, the authoritarians will wonder, "What kind of monster would kill for a lollipop?" The bell tolls for thee.
  • >you, the lock seller, would be sued for any damage the kid did to my house.

    Ah, but you implicity agreed to the End User Locksmith Agreement when you opened the shrink-wrapped package for the Micro-lock Deadbolt 2000 product you used and are now claiming to be defective.

    The EULA clearly states that Deadbolt 2000 is not guaranteed to be fit for any particular purpose and that Micro-lock cannot be held liable for damages resulting from improper installation or or use of the product. Deabbolt 2000 uses Java technology, and as such should not be used in any critical application such as medical devices, manufacturer processing control or securing your front door.

    (sorry, I'm bored at work. Moderators, please help me bleed off excess karma!)
  • by MillMan ( 85400 ) on Thursday September 14, 2000 @07:54AM (#780005)
    now being applied to the internet. Wonderful. "Hacking" crimes should charged based on the actual damage done. Creating a law that states any "hacking" is automatically a felony is not a good implementation. Sounds a lot like the drug laws where you can be put away for a good long time just for possestion.

    It probably won't be too many years now before some "hacking" task force has a budget along the lines on the drug war. I've seen more than a few "between the lines" suggestions by politicians that this is exactly what we need. With a mostly ignoranat public, the politicians will probably get what they want.

    I wonder how much it will take to piss off the public though. Seeing a 13 year old skinny white kid from the suburbs being hauled off to jail for "hacking" might have a different effect on the public than some poor hippie or black pot smoker being thrown into jail on drug charges.
  • by dirk ( 87083 ) <dirk@one.net> on Thursday September 14, 2000 @08:06AM (#780007) Homepage
    Perhaps despite having worked for lawyers for several years I still don't have an astute legal mind, but Granholm's contention that regardless of damage, hacking should (and will) be considered a felony is a bit odd, considering that she then compares it to vandalism, which definitely does depend on the amount of damage involved.


    I think vandalism is a really poor comparison. It may be good for when a hacker actually defaces a website, but the actualy hack itself is much more akin to breaking and entering. B&E is (I think) a felony, no matter what you are breaking into. Anything else you do while you are there is a seperate crime, with it's own charges. I think this is the same approach that should be taken to hacking. Hacking into a system is a crime. Anything you do while you are there may be another. If you just look around, all you get is hacking. If you deface a website, you might get the electronic equivalent of vandalism. If you destroy files, that's another charge. But the hacking into a system is a crime unto itself. Unlawful entry is unlawful entry, no matter if it's a house, business, or a computer system.

  • by arete ( 170676 ) <xigarete+slashdot@nosPam.gmail.com> on Thursday September 14, 2000 @08:06AM (#780009) Homepage
    " The M-Net system remained down into July and became available only after M-Net replaced the
    system's equipment. "

    What in the hell did they do to make it require NEW EQUIPMENT to recover from a crack? I understand lost data, etc. I know it used to be possible to spin a HD until it blew up or set a monitor resolution that burned it out, but I haven't heard anything of the sort in a long, long time. What's up with this? Is the AG wrong? Did M-Net not know how to reinstall a system? Or is this kid really lucky or some kind of jedi master and made all the chips explode in a fiery blaze destorying the MBs?

    I agree that unathorized cracking is wrong; there are also ample ways to set up practice if you really want. Cracking free sites is not only wrong and illegal, it's evil and stupid.

    I was going to moderate this dicussion, but no one brought up my first point, and I'm really curious.

  • Well why don't you just buzz on over to kuro5hin [slashdot.org] and tell them that .....
  • Maybe this can be used to stop SPAM.

    You do not authorized SPAMMERS to put spam on your system. You do not authorize SPAMMERs to take use your POP3 server. Now, a SPAMMER used your POP3 to send data to your POP3 client without your authorization.

    A stretch, yes.

  • by _Sprocket_ ( 42527 ) on Thursday September 14, 2000 @08:08AM (#780015)
    Granholm's contention that regardless of damage, hacking should (and will) be considered a felony is a bit odd, considering that she then compares it to vandalism, which definitely does depend on the amount of damage involved.
    That really stuck out to me too. To quote:
    Granholm added: "In the future, any hacking, regardless of the amount of financial damage it causes, will be a felony. A vandal is a vandal whether you are a virtual vandal putting graffiti on a web site or a real world vandal putting graffiti on a wall. Both are illegal. And using a computer to break into a company from the comfort of your living room is just as illegal as using a hammer to break down that company's front door. Because the Internet makes the crime easier doesn't mean that it makes it right. These are the first hacking charges in this state; you can bet that they won't be the last."
    So then the question becomes - when does vandalism constitute a felony (and I expect there IS a point that it does)? If vanalism in the physical world does not constitute an immediate felony charge, why should it in digital form? Once again, we have existing laws that can easily apply without writing up a new mess of digital laws.

    Granted, that doesn't allow for the political "get tough" and Internet buzzphrase newsbites.

  • "...numerous studies have shown that the death penalty is not a deterent."

    Really? Imagine that, dead convicts rising from their graves to commit crimes. Scary stuff.

    To me, the death penalty isn't supposed to be a deterent, it's a safety measure. Replacing a blown tire doesn't deter the others from blowing--but it makes driving the car a lot safer.
    --
    Linux MAPI Server!
    http://www.openone.com/software/MailOne/
  • by Shotgun ( 30919 ) on Thursday September 14, 2000 @08:13AM (#780025)
    Granholm said: "Hacking is the dark side of high technology's power and progress. For every person using a computer or the Internet for research, commerce or communication, there may be another person using that technology to commit a crime. The Internet, unfortunately, has become one more tool to pick the locks of companies
    across the country."

    And long license agreements full of mumbo-jumbo legalese has become one more tool to pick the locks of the average computer user across the country.

    If I install a program, say a graphics program, would this law cover behavior that sereptiously sends valuable personal information to the company that wrote the program? We know the info is valuable (the company plans to sell it), but they haven't paid me for it and I haven't given it to them. Isn't this crime analogous to workplace theft? ie, I gave you permission to work here, but I didn't give you permission to take what you wanted home with you.

    How can digital graffiti be a felony, but digital theft is winked at?
  • I look at it this way. Companies can seem to make more money being cracke and sue in the billions of dollars(in damage claims) than to have business as usual.

    Expect this to be the future's new form of insurance fraud.
  • abhorringly exaggerated is right. I've ben using M-net off and on for about 6 months now, and it wasn't just a matter of "go re-image the server(s)." If you haven't read rootprompt.org's "Cracked" section, please do so now as it mirrors what happened to m-net to a T. while the system was down the admins also decided that an upgrade was in order, so a new machine was purchased to add to the collective.

    M-net is also all voulenteer, and the timing couldn't have been worse, as most of the admins were overloaded at their real jobs. Poor timing, a collection of ghod only know what kind of equipment, and admins who couldn't be pulled from their real jobs resulted in the month long downtime. fortunatly the community (grudgingly) understood and let the admins do their job when they could.

    --
  • It's constitutional for police to use deadly force against ANYONE if they believe that lives are in danger.

    LK

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...