Drive to Counter Computer Crime Aims at Invaders

By John Markoff
The New York Times

June 3, 1990

From Los Angeles to Atlanta, Federal and state law-enforcement agents have begun an intense battle against computer operators who break into government and business data systems.

The agents, under mounting pressure from corporations and lawmakers, say the crackdown is needed to halt a growing threat to commerce, research and national security.

But increasingly, civil liberties experts and even some computer industry executives say the crackdown is affecting computer users who are not breaking the law. These experts say such users are being intimidated and are suffering illegal searches and violations of their constitutional guarantees to free speech.

Crimes 'in the Blink of an Eye'

In many ways the computer crackdown parallels the campaign against drugs, with officials responding to an outcry over a serious problem only to confront another outcry over assaults on civil rights.

''It's a whole new era,'' said Stephen McNamee, United States Attorney for Arizona, who has been a central figure in Government efforts to counter computer crime. ''Computers are providing a new avenue for criminal activities. It is possible to transmit computer information for an illegal purpose in the blink of an eye.''

But Representative Don Edwards, a California Democrat, said the authorities had gone too far. ''Every time there is a perceived crisis, law-enforcement agencies and legislators overreact, and usually due process and civil liberties suffer,'' Mr. Edwards said. ''The Fourth Amendment provides strict limits on rummaging through people's property.''

40 Computer Systems Seized

The largest of several investigations under way around the country is a two-year-old Federal effort called Operation Sun Devil, in which about 40 personal computer systems, including 23,000 data disks, have been seized from homes and businesses.

The seizures, resulting from 28 search warrants in 14 cities, halted the operations of some computer bulletin boards, telephone-linked services that permit users to post and read messages. Little or any of the confiscated equipment has been returned. In all, seven people have been arrested so far.

One computer game maker who has not been charged says he is on the verge of going out of business since investigators seized his equipment.

In related inquiries, the Secret Service has surreptitiously eavesdropped on computer bulletin boards and telephone conversations, and in the process agents have entered these networks posing as legitimate users and traded information.

In an unrelated investigation of the theft of an important program from Apple Computer Inc. last year, dozens of experts and hobbyists have recently been interrogated by the Federal Bureau of Investigation.

Civil libertarians and some business executives have begun to organize defenses. Among them is Mitchell D. Kapor, creator of the nation's most popular software program, the Lotus 1-2-3 spreadsheet, who is planning to help finance a legal defense fund of several hundred thousand dollars for some of those accused.

Legal Protections Are Unclear

Harvey Silverglate, a Massachusetts lawyer and civil liberties expert who is working with Mr. Kapor, said, ''You have innocent people who are being terrorized as well as investigations of people who have broken the law.'' He termed the Government actions a ''typical American solution: throw your best and brightest in jail.''

Officials of the Secret Service, which since 1984 has been the primary Federal enforcer of computer fraud laws, believe that an alarming number of bright young computer enthusiasts are using computers illegally.

''Often,'' said Gary M. Jenkins, Secret Service assistant director. ''a progression of criminal activity occurs which involves telecommunication fraud, unauthorized access to other computers, credit card fraud, and then moves on to other destructive activities like computer viruses.''

A 1986 Law on Computer Crime

A 1986 Federal law on computer fraud and abuse makes it a crime to enter computers or take information from them without authorization.

But Mr. Kapor of Lotus said he believed the danger posed by the computer joy riders had been greatly exaggerated. ''Now that the Communists aren't our enemies anymore, the American psyche has to end up inventing new ones,'' he said.

He and other experts are also alarmed by new investigative techniques that employ computers. The power of advanced machines multiplies the risk of search and seizure violations, these experts say, because they can perform so many simultaneous tasks and absorb and analyze so much information.

Moreover, civil liberties advocates say the perils are greater because legal precedents are not clear on how the First Amendment protects speech and the Fourth Amendment protects against searches and seizures in the electronic world.

Government Surveillance

In response to a court-enforceable request under the Freedom of Information Act, the Secret Service has acknowledged that it has monitored computer bulletin boards. In its answer to the request, made by Representative Edwards, the agency said its agents, acting as legitimate users, had secretly monitored communications on computer bulletin boards. The agency also disclosed it had a new Computer Diagnostic Center, in which the data on computer disks seized in raids is evaluated by machines operating automatically.

Civil liberties specialists view such practices as potentially harmful.

''Computer mail unrelated to an investigation could be swept up in the Government's electronic dragnet if the law is not carefully tailored to a well-defined purpose,'' said Marc Rotenberg, the Washington director for the Computer Professionals for Social Responsibility.

The Government's Operation Sun Devil was set up primarily to fight a loose association of several dozen computer hobbyists, including teen-agers, who referred to themselves as the Legion of Doom. Members in various cities stayed in touch through computer networks and bulletin boards and exchanged technical information on how to break into computer systems.

In February a Federal grand jury in Chicago indicted two members, Craig Neidorf, 20 years old, and Robert J. Riggs, 21, for exchanging a six-page document describing the operation of the Southern Bell 911 emergency system.

Private Document Distributed

The indictment, under the 1986 computer fraud law charges that in December 1988 Mr. Riggs broke into a company computer and stole the document, which the company valued at slightly more than $76,000. He transferred it to Mr. Neidorf by electronic mail on a bulletin board in Lockport, Ill., the indictment said, and Mr. Neidorf later reproduced it in an electronic newsletter.

Computer security experts say documents like the 911 description are usually not taken for profit, but rather for the challenge of doing it. Some members of the computer underground create elaborate manuals on how to violate computer security as a sport or hobby.

But law-enforcement officials do not see it as a game. Because modern society has come to depend on computers for so much of its government and commercial business, officials view intrusions as threats not only to private property, but also to the very operations of the systems.

In another part of the Sun Devil investigation, Secret Service agents in March confiscated computers and other equipment from Steve Jackson Games, a small Austin, Tex., company.

Mr. Jackson, the company's president, said the agents were seeking a rule book for a fantasy game that deals with ''cyberpunk,'' the science fiction world where high technology and outlaw society intersect.

Mr. Jackson said he still did not know why his company had been searched. He said Secret Service officials had promised three times to return his equipment and software but still had not done so. He said that he had been forced to lay off 8 of his 17 employees and that the company was on the verge of going out of business.

''It raises First Amendment questions,'' said Mr. Jackson. ''It's a frightening precedent. I don't think they would have done it to I.B.M.''

Law-enforcement officials say they have difficulty returning seized computers and softwear promptly; William J. Cook, an assistant United States Attorney in Chicago, said thorough examinations took a long time because of the ''levels of information you find in a computer.''

A Sweep in 14 Cities

The largest operation in the Sun Devil investigation came on May 8 when more than 150 Secret Service agents, plus state and local law-enforcement officers, served the 28 search warrants in 14 cities: Chicago, Cincinnati, Detroit, Los Angeles, Miami, Newark, New York, Phoenix, Pittsburgh, Plano, Tex.; Richmond, Va.; San Diego; San Jose, Calif., and Tucson, Ariz. In all, seven people, including Mr. Riggs and Mr. Neidorf, have been arrested.

In a separate investigation, the F.B.I. has been searching for a year for members of a group that stole basic programming information from Apple Computer and mailed copies to people in the press and the computer industry. The group said it stole the software, which is fundamental to the operation of Macintosh computers, to protest Apple's refusal to let other makers copy the Macintosh.

The group calls itself the Nuprometheus League, from the character in Greek mythology who stole fire from the gods.

Organizers of an annual West Coast computer meeting known as the Hackers' Conference said at least a dozen of the several hundred people who attended last year's event had reported being recently questioned by F.B.I. agents about the Apple theft.

The Hackers' Conference began in 1984 after the publication of the book ''Hackers'' by Steven Levy, Anchor/ Doubleday, an account of computer industry pioneers at M.I.T. and in Silicon Valley.

There is no evidence that the Apple theft was linked to people who attended the Hackers' Conference, and Leo Cunningham, assistant United States Attorney in San Jose, Calif., would not comment on any facet of the case.

Copyright 1990 The New York Times Company