[fa.human-nets] HUMAN-NETS Digest V6 #85

Human-Nets-Request%rutgers@brl-bmd.UUCP (Human-Nets-Request@rutgers) (01/02/84)

HUMAN-NETS Digest       Thursday, 22 Dec 1983      Volume 6 : Issue 85

Today's Topics:
                 Humor - Passworking in BLOOM COUNTY,
               Computer Networks - Gateways to USENET,
          Computers and the Law -  Wiretap loophole concerns
                        Information - ZIP + 4,
----------------------------------------------------------------------

Date: Thu 22 Dec 83 07:00:32-CST
From: Werner Uhrig  <CMP.WERNER@UTEXAS-20.ARPA>
Subject: latest on Password-security in BLOOM COUNTY strip, Wed Dec 21

If you have missed it, you may want to dig for yesterdays paper, and
for those who don't know BLOOM COUNTY by Berke Breathed, former
cartoonist of the Daily Texan, UT-Austin's campus paper, or don't have
access to a paper, below comes attempt of describing in words what
can't be without loosing the "tickler":


FRAME 1:        Our black hero hacker/cracker, made famous in earlier
                strips for his attempts (and successes) to break into
                computer systems from his terminal, is once again
                glued to his CRT, fingers flying over the keyboard....


        "BEEP"  Password INCORRECT.     Entry Prohibited.

        tiptap, tipe-di-tap, (sound of touch-typist skills) ...

FRAME 2:        Hero's hands on his knees, slouched shoulders, head
                hanging slightly forward, glued to the screen,
                following the display with growing disgust ......

        "BEEP"  Password INCORRECT.     Entry Prohibited.

FRAME 3:        The inspired hero is standing on the table next to the
                CRT, his "powerful" fist comes flying down in a
                surprising move of which only "THE FEW" seemed to be
                capable of ..........

        WHAM!!!   the sound of shattering contact of fist and CRT body

FRAME 4:        The hero sits in a relaxed and satisfied posture,
                hands in his lap, face indicates concentration on his
                next steps, while his eyes follow the characters as
                they are displayed ....

        APPROVED.       Good Morning,  Secretary WEINBERGER !!!


[ hey , that wasn't that bad now, was it ?? ]

------------------------------

Date: Sat, 17 Dec 83 03:29:02 EST
From: seismo!rlgvax!allegra!hou3c!ka@BRL-BMD.ARPA
Subject: Gateways to USENET

Human-nets is still making it to USENET.  (Thank you, BRL!)

Robert Elton Maas talks about the problem of "dumb" messages appearing
on the SPACE mailing list from USENET.  This is a general problem with
USENET.  I get the impression that on the ARPANET, people who don't
know much about a subject are unlikely to subscribe to a mailing list
on that subject.  On the other hand, USENET users are likely to post
to any group with an appropriate sounding name.  We are currently
experimenting with dividing the discussion of astronomy between
net.astro.expert (for professional astronomers) and net.astro (for
everybody else), but it is not clear that users will follow the rules.

The reason that you don't see many submissions (good or bad) from
USENET on human-nets is that human-nets is gatewayed into a readonly
newsgroup.  While it is possible to respond by mailing to
...!brl-bmd!human-nets, most people discuss issues relevant to human-
nets in other newsgroups.  SPACE, on the other hand, appears as a
normal (writeable) newsgroup, and there is no way for USENET users
to know that it is gatewayed into an ARPANET mailing list unless
they happen to see this fact mentioned somewhere.
                                        Kenneth Almquist
                                        ka@hou3c.uucp
                                        ihnp4!hou3c!ka@Berkeley

------------------------------

Date: 20 Dec 1983 11:01-PST
Subject: Wiretap loophole concerns.
From: the tty of Geoffrey S. Goodfellow <Geoff @ SRI-CSL>

n089  1907  18 Dec 83
BC-TAP 2takes
(EXCLUSIVE: 10 p.m. EST Embargo)
A Loophole Raises Concern About Privacy in Computer Age
By DAVID BURNHAM
c.1983 N.Y. Times News Service
    WASHINGTON - Telecommunications experts are expressing concern
that the federal wiretap law does not make it a crime for anyone,
whether private citizen, law enforcement officer or foreign spy, to
intercept the millions of messages transmitted around the United
States each day by computer.
    The experts, who are in Congress, the American Telephone and
Telegraph Co., and the American Civil Liberties Union, say the
importance of the loophole in the 1968 law has been greatly magnified
in recent years with the increasing use of computers for storing and
transmitting personal, business, and government information.
    Three congressional panels are considering whether the law should
be rewritten to reflect the computer age. A major concern, both in
Congress and among the experts, is whether the loophole gives local,
state, and federal law enforcement officers an opportunity to conduct
computerized electronic surveillance without the court approval
required for wiretaps.
    There is no evidence of widespread exploitation of the law by
officers. But John Shattock, director of the national office of the
civil liberties union, said: ''The issue here is the privacy of
communications against secret government surveillance. The threat here
truly is Big Brother, not a group of little kids.''
    Some fear that any change in the current law, unless it is done
carefully, could inadvertently increase or decrease the power of law
enforcement officers.
    The wiretap law forbids the monitoring of conversations except for
law enforcement officers who have obtained a warrant from a judge. In
the age of the computer, however, more and more messages, including
those expressed by the human voice, are broken down into ''digital
bits'' in their transmission.
    But because of the way the 1968 law is written, the interception
of these bits is not a crime and the police are free to intercept them
without warrants.
    Most electronic surveillance is passive, making it impossible to
measure how much the loophole is being exploited, whether by the
authorities, by industrial spies, by organized crime figures trying to
make a killing in the stock market, by international spies seeking
government data, or by curious individuals with a personal computer.
    But in recent months a number of computerized data banks in
government and industry have become the targets of long-distance
telephone attacks by amateur computer experts working from their home
computers. In addition, indictments have charged foreign computer
concerns with attempting to purchase sensitive details about the
products of American companies.
    More seriously, perhaps, several years ago the Carter
administration announced that it believed the Soviet Union was using
antennas believed to have been set up on its grounds in Washington,
New York, and San Francisco to intercept digital information being
transmitted in microwaves by businesses and government agencies.
    The Carter administration took limited technical steps to prevent
the Russians from obtaining sensitive government data and ordered the
National Security Agency to help private corporations improve their
security. But it never took any formal legal action against the
Russians or formally asked Congress to amend the law.
    H.W. William Caming oversees privacy and corporate security
matters at AT&T. ''As we enter the year made famous by George Orwell's
book, 'Nineteen-Eighty-four,' computer crime is on the rise and may
well constitute a major crime threat of the 1980s,'' he said in a
recent interview. ''We therefore are encouraged by and vigorously
support current efforts in Congress and the states to enact suitable
legislation concerning computer crime. We believe that such
legislation should include provisions making it a crime to secretly
intercept non-voice communications.''
    AT&T is not the only company concerned about the wiretap law. In
response to an inquiry, Satellite Business Systems, a major new data
communications company jointly owned by International Business
Machines, the Aetna Life and Casualty Co., and Comsat, agreed that
some experts believed there was a ''potential loophole'' in current
law and that, to the extent this was so, ''legislation to make clear
that such unauthorized interception is prohibited would be useful.''
    The 1968 wiretap law makes it a federal felony for a third party
to intercept the conversations of others by placing an electronic
listening device, or a ''bug,'' in a telephone or other place such as
an office.
    The only exception is that federal, state, and local law
enforcement officers may use wiretaps in the investigation of certain
crimes but only with the approval of the senior prosecutor of a
particular jurisdiction and a special warrant from a judge.
    The law does not apply to computer tapping because Congress
defined the word ''intercept'' as the ''aural acquisition'' of
information.  In the opinion of a federal appeals court, the General
Accounting Office, and privacy experts such as Alan F. Westin of
Columbia University, this wording means that the wiretap law does not
prohibit the interception of computer transmissions because no sounds
are involved.
    ''Advancing telecommunications technologies which involve
non-aural interception techniques are being used more and more,'' the
GAO said in a report to the Senate in 1980. ''Therefore, modern
telecommunications are becoming less likely to be protected against
unauthorized interception by current statutory provisions.''
    In an age when more than a third of the nation's households are
hooked into cable television systems, when millions of people are
doing their banking by computerized tellers and their mailing
electronically as well, the limitations of the current law have become
increasingly obvious.
    David Watters, a telecommunications engineer who has served as a
consultant in both government and private industry, said the changing
technology may mean it is also not a crime to record certain telephone
calls secretly. ''There hasn't been a test case brought to court on
this question yet,'' he said, ''but increasing numbers of telephone
calls are being transmitted from point to point in the digital
language of computers, and the logic of the 1968 law would suggest
that such calls could be intercepted without penalty.''
    Two House Judiciary subcommittees, one headed by Rep. Don Edwards,
D-Calif., the other by Rep. Robert W. Kastenmeier, D-Wis., and a
Senate Judiciary Committee headed by Sen. Charles McC. Mathias Jr.,
R-Md., are considering the possibility of rewriting the wiretap law.
    Kastenmeier, whose subcommittee on courts, civil liberties, and
the administration of justice is to hold hearings on the question next
month, said such matters as how much statutes should protect against
actions like the unauthorized interception of electronic mail take on
great importance in this modern technological age.
    ''The implications of the ability of the new technology to go
beyond such definitions in terms of invading personal privacy make
consideration of this important issue by the subcommittee most
urgent,'' he said.
    Drafting a new law to close the gap in the old one, however,
presents complex legal and philosophical problems.
    In the past, when Congress has sought to limit the access of law
enforcement to banking and medical records, the Justice Department has
fought for the widest possible access.
    A congressional change in the law to require a warrant from a
judge for interception of computerized information, would represent a
diminution of officers' independent authority.
    In 1979 the Supreme Court ruled that local authorities in Maryland
did not violate the Fourth Amendment rights of Michael Lee Smith, a
Maryland resident, when they did not obtain a search warrant before
placing a device on his telephone to record the numbers he dialed.
    A majority of the Supreme Court held that such information could
be collected by the police without a warrant because Smith could not
have a reasonable expectation that the numbers he dialed were private.
But three justices dissented, arguing that the numbers were just as
deserving of legal protection as the substance of what Smith said.
    Electronic mail systems offer similar opportunity to gain
information about a person's dealings with others, according to
testimony before a House subcommittee in October by Willis H. Ware, a
member of the Rand Corp. and a leading privacy expert.
    As opposed to traditional mail, electronic mail systems, ''in
addition to the message content,'' he said, contain ''information
relating the addressee to the sender.
    In principle, such information could be used to establish
relationships among people, such as organized groups or circles of
acquaintance. Obviously, such information could be of high interest to
the law enforcement community, but the legal umbrella of protection
over such information is confused and probably incomplete.''
    Experts agree that, depending on how Congress revised the wiretap
law, it could lead to significant broadening in the mandate of federal
law enforcement agencies and possible changes in the expectation of
confidentiality in such broad areas of concern as medical records.
    ''The privacy questions raised by the new telecommunication age
represent the single most important issue facing Congress today,''
said Shattuck. ''Because computers are now essential to the operations
of hospitals, of law firms, and even of newspapers, a sloppily drafted
law could give the federal government greater search powers that it
ever has had in our history.''
    John Keeney, the deputy attorney general in the Justice
Department's Criminal Division, said Justice Department officials
believed changing the wiretap law was not the way to attack computer
crime.
    ''Our current feeling is that the 1968 wiretap law should not be
changed, that there would be simpler ways to take on computer crime,''
he said. He added that study groups in the Justice Department, the
Commerce Department, and the Department of Health and Human Services
currently were working on drafting a law to control computer crime.

nyt-12-18-83 2245est
***************

------------------------------

Date: 14 Dec 1983 1700-EST
From: John R. Covert <RSX-DEV at DEC-MARLBORO>
Subject: ZIP + 4  (If anyone uses snail-mail anymore)

You can obtain ZIP + 4 information from 800 228-8777.  The number is
staffed from 7-7 Central Time.

------------------------------

End of HUMAN-NETS Digest
************************